Обложка профиля
Фото профиля
StarForce
43 подписчика -
StarForce Technologies has extensive expertise in protecting digital information from copying, hacking and unauthorized use. Since 2000 we have been successfully developing and implementing our state-of-the-art software solutions to provide copyright and intellectual property protection worldwide.
StarForce Technologies has extensive expertise in protecting digital information from copying, hacking and unauthorized use. Since 2000 we have been successfully developing and implementing our state-of-the-art software solutions to provide copyright and intellectual property protection worldwide.

43 подписчика
О себе
Записи

Запись прикреплена.К записи прикреплен файл
Для всех
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
The Project Zero team at Google has made an automated security testing tool available to the public that helped them find 31 security bugs across the 5 major browsers. While not a story relevant to anyone except those interested in open source security testing tools, the group also revealed that they found most of these 31 bugs in Apple’s Safari, calling the browser a “clear outlier.”

Source: http://wccftech.com/safari-worse-security-than-internet-explorer/

#safari #google
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
StarForce Provides Protection for the Rosstandart Subordinate Organization

Details: http://www.star-force.com/press/news/index.php?news=2763
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
Meet the special page of StarForce C++ Obfuscator in Korean!

http://www.star-force.com/kr/
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
More than two million users of anti-malware tool CCleaner installed a version of the software that had been hacked to include malware, the app’s developer confirmed on Monday.

Piriform, the developer of CCleaner now owned by security firm Avast, says that its download servers were compromised at some point between 15 August, when it released version v5.33.6162 of the software, and 12 September, when it updated the servers with a new version.

In that period, a trojan was loaded into the download package which sent “non-sensitive data” from infected users’ computers back to a server located in the US. The data, according to Piriform, included “computer name, IP address, list of installed software, list of active software, list of network adapters”.

As well as the data leak, however, the infection also resulted in a “second stage payload” being installed on to the affected computer – another piece of malware, which Piriform says was never executed.

“At this stage, we don’t want to speculate how the unauthorised code appeared in the CCleaner software, where the attack originated from, how long it was being prepared and who stood behind it,” the company’s vice president, Paul Yung, said.

Source: https://www.theguardian.com/technology/2017/sep/19/ccleaner-2m-users-install-anti-malware-program-security-avast-supply-chain-attack-hack

#ccleaner
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
Meet the special page of StarForce C++ Obfuscator in Chinese!

http://www.star-force.com/cn/
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
More than four million records of users of Time Warner Cable’s MyTWC app were found unsecured on an Amazon server last month, digital security research centre Kromtech Security Center said in a blog post on Friday.

The files — more than 600 gigabytes in size containing sensitive information such as transaction ID, user names, Mac addresses, serial numbers, account numbers — were discovered on 24 August without a password by researchers of Kromtech.

“A vendor has notified us that certain non-financial information of legacy Time Warner Cable customers who used the MyTWC app became potentially visible by external sources,” Charter Communications Inc., Time Warner Cable’s parent, said in an email.

The information was removed immediately after the discovery and the incident is being investigated, Charter said.

The breach was eventually linked to BroadSoft Inc., a communications company, whose unit developed the MyTWC app.

Broadsoft did not immediately respond to a request for comment.

Source: http://ewn.co.za/2017/09/04/more-than-4-million-time-warner-cable-records-exposed-in-leak

#timewarner #MyTWC
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
A report from cybersecurity company Proofpoint says that it’s observed a “targeted email campaign” that is using details of leaked Game of Thrones episodes to try and spread malware to unsuspecting users.

The company first came across an e-mail on August 10th with the subject line "Wanna see the Game of Thrones in advance?" The emails contained some general details of upcoming episodes, as well as a Microsoft Word attachment with malware hidden in it. Once downloaded, it would attempt to install a “9002” remote access Trojan (RAT). Proofpoint says that similar attacks in the past have been attributed to groups associated with the Chinese government, and that it’s possible that this attack could be coming from the same actors.

At the end of July, hackers stole 1.5 terabytes of data from HBO, including contact information for the show’s stars, unaired episodes and scripts, while an unrelated accident allowed a pair of episodes to leak to the internet earlier this month.

Proofpoint isn’t saying that HBO’s breaches and these attacks are connected. The hackers behind these phishing attempts are using the leaks as a way to get people to click on and accidentally install their software, relying on natural human curiosity to carry out their attack.

Source: https://www.theverge.com/2017/8/26/16209308/hackers-game-of-thrones-spoilers-spread-malware-proofpoint-cybersecurity

#gameofthrones #GOT
Фотография
Добавьте комментарий…

К записи прикреплен файл
Для всех
It looks like there may have been a security breach at PlayStation today. The official PlayStation Twitter account today posted a message that said it had been taken over by the hacking group OurMine. The tweets were removed, but NeoGAF captured them. One of the tweets claimed that the PlayStation Network database had been potentially compromised.

It's a good idea to change your password semi-regularly anyway, but now seems like a good time to do that, if only just to be safe.

The official PlayStation support Twitter account, Ask PlayStation, has been responding to messages today as usual. However, it doesn't appear that Sony has responded to the reported Twitter takeover, at least not beyond deleting the tweets in question.

In 2011, the PlayStation Network suffered a massive cyberattack that brought the service down for an extended period of time. A United States Congressional subcommittee opened an inquiry into the attack, which compromised more than 70 million accounts.

Source: https://www.gamespot.com/articles/playstation-hack-affects-twitter-account/1100-6452688/

#playstation #psn
Фотография
Добавьте комментарий…
Дождитесь окончания загрузки