iPad phishing scheme advertised on Facebook

There is the new phishing scheme to fool the Facebook user.  The purpose remains the same, that is, to obtain the username and password.  Here how they do. This is the advertisement. Then, your address is required. Here you will have to fill in your username and password. Bingo, they get your personal information.  Please […]

Continue Reading

Top Ten Spam Botnet

According to Michael Kassner from TechRepublic bloged on Feb 25, 2010 that the top ten spam botnets are as following:- Grum (Tedroo) Bobax (Kraken/Oderoor/Hacktool.spammer) Pushdo (Cutwail/Pandex) Rustock (Costrat) Bagle (Beagle/Mitglieder/Lodeight) Mega-D (Ozdok) Maazben Xarvester (Rlsloup/Pixoliz) Donbot (Buzus) Gheg (Tofsee/Mondera) Each of these bots has certain characteristic, check 10 things for more detail. MouiJust say.More Posts […]

Continue Reading

Gmail by default activates https for all users now (gmail ปรับค่าให้ทุกอีเมลเป็น https แล้ว)

Default https access for Gmail Tuesday, January 12, 2010 9:14 PM Posted by Sam Schillace, Gmail Engineering Director In 2008, we rolled out the option to always use https — encrypting your mail as it travels between your web browser and our servers. Using https helps protect data from being snooped by third parties, such […]

Continue Reading

Top popular apps with vulnerabilities Application

Affected Versions 1. Mozilla Firefox 3.x, 2.x 2. Adobe Flash & Acrobat Flash: 10.0- 10.0.12.36 and 9.0- 9.0.151.0 Acrobat: 8.1.2, 8.1.1 3. EMC VMware Player, Workstation and other products ESXi 3.5 or earlier Workstation 5.5.x Player 2.0.x & 1.0.x ACE 2.0.x & 1.0.x 4. Sun Java Runtime Environment (JRE) Version 6 Update 6 5. Apple […]

Continue Reading

What are 10 things the Cybercriminals Want to Exploit

There are as followings:- 1. Broadband connectivity 2. Wi-fi networking 3. Removable media 4. The Web 5. E-mail and instant messaging 6. Unified communications 7. Peer-to-Peer (P2P) programs 8. E-commerce and online banking 9. Mobile computing 10. Universal connectivity Thanks to Bill Detwiler for his “10 technologies that cybercriminals love to exploit“ MouiJust say.More Posts […]

Continue Reading

Open seminar: "Underground Economy" at AIT

The Asian Institute of Technology (AIT) has arranged a free seminar about Underground Economy on Tuesday 16th October 2007. Everyone is invited. Seat is limited please register ahead. Open seminar: “Underground Economy” Venue: B 108, AIT Conference Center Date : 16 October 2007 Time : 09:30 – 12:45 09:00-09:30 Welcome and Introduction by AIT , […]

Continue Reading