Tech Thoughts Daily Net News – June 28, 2012

How to surf safely: From LastPass to tin foil hats, and everything in between – Don’t wait until it’s too late to implement a solid strategy for staying safe online. Here, one of our new writers — Paul Lilly — runs you through a dizzying array of safe surfing techniques.

Welcome to the soon-to-be enormous world of Facebook email spam – I am pissed off. Like most other Facebook users, I woke up recently to discover I had a Facebook email address. I don’t want a Facebook email address. Frankly, if I were King of the World, I’d boot Facebook into a giant black hole and laugh gleefully as the entire thing burned to a never-to-haunt-us again crispy hulk.

Hands-on with Android 4.1 Jelly Bean (pictures) – It’s not the full revamp that Ice Cream Sandwich was, but Android 4.1 Jelly Bean nonetheless adds a collection of new and useful features for Android enthusiasts. Using a Jelly Bean-equipped Samsung Galaxy Nexus that Google issued after the first day keynote of Google I/O, I was able to explore some of the enhancements and get a taste of what Jelly Bean will bring.

Malware As A Service: A New Twist? – Malware (or crimeware) as a service, has been around for a couple of years – and, is one of the main reasons cybercrime is spreading rapidly. However, there’s a new twist to the service.

Tech Thoughts Daily Tech News 2

Which is the most popular antivirus software? – In an over-crowded antivirus software market, end and corporate users are often finding it difficult to differentiate between a value-added market proposition, next to the “me too” vendors of solutions. As in every other market segment, any scientific insight into the market share of various vendors offers an invaluable perspective into the market dynamics, what are customers purchasing, and most importantly, are they living in a world of ‘false feeling of security’.

Better Explorer – Better Explorer (aka BExplorer) looks and behaves the way Windows Explorer will in Windows 8–except that it runs in Windows 7. At the top of the file-finder window, Better Explorer adds options that behave much as the Ribbon at the top of Microsoft Word’s newest layout does, letting you more easily arrange, copy, move, and delete files. The free tool also has a button for accessing a file s properties when you’re using a device (such as a tablet) that doesn’t support right-clicking. Best of all, you can view folders in tabs at the top of the window, so you can see multiple folders at once without getting lost.

Telstra halts data collection – Australian telco stops tracking websites visited by its mobile customers. It’s a tinfoil tale of international intrigue.

Chrome 20 fixes 20 security vulnerabilities – Summary: In its latest browser release, 20.0.1132.43, Google’s Chrome fixes 20 security vulnerabilities, none of which are critical.

Winamp 5.63 fixes four critical security vulnerabilities – As originally reported in Winamp’s release announcement, version 5.63 fixes four critical security vulnerabilities. Successful exploitation of the vulnerabilities allows execution of arbitrary code. For the exploitation to take place, a user running an outdated version of Winamp, would have to open a specially crafted . AVI video file.

Public domain Windows Desktop wallpaper from US National Parks – There are thousands of public domain images available from the U.S. National Park Service that make great scenic view wallpaper.

Internet Security:

Massive crime ring automates bank fraud, steals tens of millions – Two-factor authentication schemes have definitely been proven to be ineffectual as news of a massive global financial services fraud campaign that targeted well-moneyed individual and organizations exploded on the Internet. Insight into these attacks has been offered in a paper by McAfee and Guardian Analytics, who discovered that once the users’ computers have been compromised with banking Trojans such as Zeus and SpyEye, at least a dozen groups proceeded using client- and server-side components and heavy automation in order to swiftly effect the fraudulent money transfers.

Data Snatchers! The Booming Market for Your Online Identity – A huge, mostly hidden industry is raking in billions collecting, analyzing, and sharing personal information you put on the Web. Should you be worried?

Fake “confirm PayPal account” emails lead to phishing – An extremely legitimate looking email supposedly coming from PayPal has been hitting inboxes in the last few days, trying to trick customers of the popular e-payment giant to follow a link embedded in it, Webroot warns.

The Hidden Security Risks of P2P Traffic – For years enterprises have been trying to control peer-to-peer (P2P) technologies inside their networks, and for good reason. The efficiency with which P2P technology move large files have made P2P networks key enablers of the Internet grey market by acting as the distribution mechanism of choice for pirated movies, music or applications. Aside from P2P being a source for pirated content, they are also a significant enabler of malware as both an infection vector and a command-and-control (C2) channel. These security risks have made controlling P2P traffic a priority for many security teams.

Web Attackers Borrow Domain Generation Tricks From Botnet-type Malware – Hackers have started to adopt domain-generation techniques normally used by botnet-type malware in order to prolong the life of Web-based attacks, according to security researchers from antivirus firm Symantec. Such domain-generation techniques were recently observed in a series of drive-by download attacks that used the Black Hole exploit toolkit to infect Web users with malware when visiting compromised websites,

Cristiano Ronaldo is the most dangerous player in cyberspace – Fans on the internet looking for “Cristiano Ronaldo”, “Cristiano Ronaldo and download”, “Cristiano Ronaldo and photos” or “Cristiano Ronaldo and videos” may run into online threats that could steal their personal information. Clicking on these dangerous sites to download files like photos, videos or screensavers may expose them to viruses and malware.

Company News:

$199 Google Nexus 7 Tablet Coming in July – Google today unveiled the Nexus 7, a 7-inch tablet from Asus that will run the latest version of Android 4.1 Jelly Bean. The Nexus 7 is available for pre-order now via Google Play. The 8GB is $199, while the 16GB is $249. The device will ship in mid-July to customers in the U.S., U.K., Canada, and Australia. The Nexus 7 includes a front-facing camera, and “all the connectivity options you’d expect,” like Wi-Fi, Bluetooth, and NFC. Barra promised up to nine hours of video playback on a single charge, and up to 300 hours of standby time. It weighs in at 340 grams.

Sprint Gives Biz 360 a Small Businesses Makeover – The mobile carrier refreshes its Biz 360 program for small business with upgrades, new hardware offerings, apps and buyback program.

VeriSign Retains Control of .com – Management of the .com Top Level Domain registry is going to remain with VeriSign. That’s the ICANN board level decision, coming out of the ICANN meeting in Prague this morning, which approved the renewal of VeriSign’s .com mastery.

Apple Wins U.S. Ban on Samsung Galaxy Tab 10.1 – A California district judge ordered a preliminary injunction against Samsung’s Galaxy Tab 10.1 tablet.

Amazon brings NoSQL to the masses with DynamoDB – Amazon’s new cloud offering called DynamoDB overcomes some of the scaling limitations of SimpleDB. Learn more about the DynamoDB NoSQL system.

Webopedia Daily:

Time-out – An interrupt signal generated by a program or device that has waited a certain length of time for some input but has not received it. Many programs perform time-outs so that the program does not sit idle waiting for input that may never come. For example, automatic bank-teller machines perform a time-out if you do not enter your password quickly enough.

Off Topic (Sort of):

Life is like Coffee – Life is what we make it, and the simpler things that we enjoy are always the best in life. (Thanks Mike – my favorite Bus Driver Smile)

Slaves of electricity – We are slaves of electricity. Without power, your PC, your DVD player, your wireless router, your digital camera, your smartphone — all computers everywhere would be dead. As we move towards mobile computing, this is a rather big problem, because batteries simply can’t keep up with our demands. Are we heading towards a battery crunch?

Creating The Blackbird – Gary Powers’ U-2 aircraft was disabled. Hit by Soviet surface-to-air missiles, the plane fell from 70,000 feet to 30,000 feet before Powers could release himself and bail out of the damaged cockpit.  It was May 1, 1960, and the Cold War was heating up. President Eisenhower deeply valued the strategic benefits of the U-2’s airborne reconnaissance during these tense Cold War times.  And now the call came from Lockheed’s customer in Washington to build the impossible – an aircraft that can’t be shot down – and do it fast. (recommended by Michael F.)

The Roots of Social Networking – Before Facebook, before even Friendster, people still had social networking. Here’s a look at how computer users got together in the days before the dawn of the Internet.

Network neutrality: Revisiting the arguments – A “neutral” network cannot coexist with high-speed, unlimited usage broadband connections, nor can consumers expect carriers to foot the bill for increasingly bandwidth-hungry applications.

Today’s Quote:

“History is the version of past events that people have decided to agree upon.”

–     Napoleon Bonaparte

Today’s Free Downloads:

SUPERAntiSpyware Free – Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats.

SUPERAntiSpyware Portable – Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled.


Filed under downloads, Internet Security Alerts, Tech Net News

9 responses to “Tech Thoughts Daily Net News – June 28, 2012

  1. Pingback: Tech Thoughts Daily Net News – June 28, 2012 | Bill Mullins … | Top Internet Security

  2. Fred

    “Today’s Free Downloads: SUPERAntiSpyware Free”
    Bill have you noticed that Super doesn’t have an uninstaller? MBAM gives you one, and I’ve never had MBAM hijack the browser to go to its website when uninstalling. Just curious. People DO sometimes want to uninstall a given software perhaps to have a clean install of a new version. Last time I did that with Super AppRemover left the desktop shortcut behind, now that is rather odd I thought, so I used, again another gem I learned here, REVO to get rid of the Super, which I have since downloaded again but they should seriously think of adding an uninstaller to their download.

    I did want to say for coming here now for a little over 2 years I no longer get PANICKED if something gets a little off kilter. Thanks for all you do.

    • Hi Fred,

      The installable SUPERAntiSpyware Free does in fact have a built-in uninstaller. You won’t see it unless you take a look in the program folder. So, using Windows Add/Remove would automatically launch the uninstaller. Still, I hear where you’re coming from – it would be a good thing if all applications had an easy to reach native uninstaller.

      Getting rid of security apps, and firewall applications, is always a pain – unless a program like Revo Uninstaller (which digs deep), is used. Good man for running with Revo. 🙂

      BTW, the portable version of SUPERAntiSpyware Free does not require an uninstaller since it doesn’t install in the traditional sense. No Registry entries, etc.

      Good to hear from you.



      • John Bent

        Hi Bill,

        As you know, another useful application for removing security programs is AppRemover. This scans for all security installations and gives an option to uninstall them. If it does not find the one you want to remove on the first pass, there is an option for a deeper scan, which has never yet failed to come up with the answer for me.

        Cannot understand why any security program does not have an uninstaller built in, given the complexity of doing. Could it possibly be to discourage people from uninstalling? Surely not, that would be too cynical.

        Kind regards

        • Hi John,

          Gotta love cynical – it just oozes profitability. 🙂

          AppRemover, as you point out, is a real workhorse when it’s time to uninstall security apps. Revo, doesn’t hold a candle to it in that task.



  3. delenn13

    Re: Facebook

    A bit of Middle finger flipping be warned!

    Take that FaceBook! Babylon 5 was always gritty!

    To make up for the’s a good type of flipping..In the guise of a free game!

    A Flipping Good Time

    “A Flipping Good Time is a fast-paced free-flowing 2D platformer. Flip and fly through an expansive underground world using the fluid nature of gravity to avoid the hazardous terrain. With challenging obstacles, exhilarating mine cart rides, an immersive environment, rewarding collectibles, and entertaining levels with unlockable bonus levels, A Flipping Good Time is just that: a flipping good time.”

    Even PAX recognized it’s gotta be good!

    Been up since 3am and still going..laters..Maybe!

    • Hey Delenn13,

      Nothing like “flipping the bird” to get my attention. Beautifully done. 🙂

      Just downloaded A Flipping Good Time and posted it into tomorrow’s TNN as a “Daily Download”.

      Many thanks.



  4. John Bent

    Hi Bill,

    Re:https: Fake “confirm PayPal Account” email leads to phishing.

    The version I received told me that my account had been changed to “limited” status, because of “suspected invalid use by a third party”. The cheek of these people!

    I have to say it was a very good imitation, so I took it seriously enough to open a new browser window to check my account directly, NOT via the link in the email. Surprise, surprise – no mention of my account being limited. While I was on their site, I found the address to forward suspected phishing emails to; I know, I ended a sentence with a preposition, so sue me. I always make a point of forwarding these emails to the appropriate address; A link to this can usually be found on the home page, not always easily, I guess they do not want to highlight this problem too clearly, probably regarding it as the customer’s problem rather than theirs; how’s that for customer service?

    If I still had any doubts, the sender’s email address was a complete giveaway; no mention of PayPal anywhere. One final thing, if this kind of email is genuine, it usually addresses the account holder by name and will NEVER ask you to click on a link and input sensitive information.

    Kind regards

    • Hi John,

      LOL!! Yep, they’re pretty cheeky.

      I won’t comment further on this. Instead, I’ll put your comment (which is so sensible) up in a post later today. Something along the lines of “how an experience user deals with a phishing attempt”