Nice Find Love Online India photos
Check out these find love online india images:
Zeus Banking Trojan (ZBOT) …item 2.. Computer virus found on Facebook steals bank details and money (5 June 2013) …item 3.. 900 million Android devices are at risk (5 July 2013) …
Image by marsmet548
When a Facebook user clicks the links the Trojan – which gets its name from the Trojan horse the Greeks used to enter the city of Troy undetected – is installed on their computer.
.
………*****All images are copyrighted by their respective authors ……….
.
…………………………………………………………………………………………………………………………………………………………………….
.
…..item 1)…. ROAM DATA SMART MCOMMERCE NEWS …
ROAM Data Smart mCommerce…The definitive source for ALL things related to "mcommerce" and mobile commerce.
.
……………………..
img code photo … BlackBerry smartphones under attack by Zeus (Trojan)
mcommerce.roamdata.com/wp-content/uploads/2011/03/wpid-Ze…
……………………..
.
BlackBerry smartphones under attack by Zeus (Trojan)
POSTED BY KENNETH G. MAGES, ON MARCH 13TH, 2011
Sunday, 13 March 2011 13:14Staff WriterBlackBerry
mcommerce.roamdata.com/2011/03/blackberry-smartphones-und…
Trend Micro, a security solutions provider, claimed that they have found a Trojan that is very much capable of exploiting your BlackBerry smartphone. The Trojan called Zeus seems to target specifically the SMS feature of the Blackberry. Basically a Trojan, sometimes referred to as a Trojan horse, is a non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system. In this case it’s a cell phone. The Trojan maybe in the form of an application, once installed sends a confirmation message to the hackers that transmitted the Trojan, to signal that it is ready to receive commands. Once the Trojan sender or the hacker sends a confirmation message, the Trojan can view, delete and forward SMS’s, block calls, change the administrator on the device and block phone numbers. It sends all data on the phone to the hacker in the event that it gets shut down.
Earlier attacks by a similar Trojan were seen on Symbian and Windows Mobile operating systems. Mr Amit Nath, Manager of Trend Micro India and SAARC said, “As more users access the Internet from the expanding pool of devices, web-based threats will continue to grow in size. The growth of smartphones and faster data speeds will also increase the possibilities of infection. As criminals devise ways to make money out of exploiting mobile technologies, mobile users will grow extremely vulnerable.”
Now is a good time to get those antivirus softwares for you cell phones people, and be sure to not install uncertified applications.
Image Credit
Free subscription: Get updates about Telecom Operators and Mobile Phones in your inbox. You must click confirmation link sent in email. If you don’t see the email, check spam folder
Not found what you were searching for??? Search here…
View the original article here
MCOMMERCE ATTACK, BLACKBERRY, ECOMMERCE, FRAUD, HACK, M-COMMERCE, MASTERCARD, MCOMMERCE, MOBILE BANKING, MOBILE COMMERCE, MOBILE PAYMENTS, MOBILE PHONE, PCI, PIN DEBIT, ROAM DATA, ROAMDATA, SMARTPHONE, SMARTPHONES, TRIPLE DES DUKPT, TROJAN, UNDER, VISA, WEB SECURITY
« 24 hours with
.
.
……………………………………………………………………………………………………………………………………………………………………….
.
…..item 2)…. Computer virus found on Facebook steals bank details and money from accounts when users click on links …
… Mail Online – Daily Mail … www.dailymail.co.uk/sciencetech/ …
… The virus, called the Zeus Banking Trojan, is being hidden on Facebook in infected links
… When a Facebook user clicks these links they are taken to malicious sites that can install the virus on to their PC or phone
… Trojan runs in the background undetected and steals information and logins
By VICTORIA WOOLLASTON
PUBLISHED: 11:59 EST, 5 June 2013 | UPDATED: 15:26 EST, 5 June 2013
www.dailymail.co.uk/sciencetech/article-2336388/Computer-…
A computer virus that steals bank details and empties money from accounts has been found on Facebook by security experts.
Trend Micro discovered the malicious links were being posted by fake Facebook profiles on popular brand pages, such as the U.S. National Football League.
The links are believed to be controlled by the Russian Business Network – an online criminal gang accused of stealing internet users’ identities and private information.
.
……………………..
img code photo … Sign Up
i.dailymail.co.uk/i/pix/2012/05/08/article-2141199-12FC2C…
Security company Trend Micro discovered that the Zeus Trojan was becoming more prevalent, and the amount of incidents of the virus peaked in May. One of the biggest sources was Facebook. Fake profiles were found to be posting malicious links which, when clicked on, would install the virus onto the user’s PC
photo credit: none listed
……………………..
.
The link discovered by Trend Micro was for a page called ‘Bring the N.F.L to Los Angeles’.
The page has since been removed.
The security firm claim that there may be many more hidden on pages, or even being spread inadvertently by Facebook friends.
.
……………………..
HOW DOES THE ZEUS BANKING TROJAN WORK?
… The Zeus Trojan is a computer virus that gets its name from the Trojan horse the Greeks used to enter the city of Troy undetected in order to ransack the city.
… It hides in malicious links, attachments and on infected web pages.
… When a person clicks these links or visits the webpage the Trojan horse is installed on their computer.
… It then sits undetected ready to strike.
… Zeus can scans all the personal files and steal any private information.
… The malware is also able to collect login details, even if they aren’t stored in documents on your PC, using keystroke logging.
… Keystroke logging, also known as keylogging, can record which keys on a keyboard are being pressed.
… Zeus can then wait until the user types in their online banking address and login details and steal them.
… Once they have the logins, the cybercriminals can enter your online accounts and steal your money.
……………………..
.
When a Facebook user clicks the links the Trojan – which gets its name from the Trojan horse the Greeks used to enter the city of Troy undetected – is installed on their computer.
More…
… BBC slammed for misleading viewers because its homepage clock is ‘inaccurate’
… One in five people want Google Glass banned because of serious privacy concerns
It then scans all the personal files and steals any private information.
The malware is also able to collect login details, even if they aren’t stored in documents on your PC, by using keystroke logging.
Keystroke logging, also known as keylogging, can record which keys on a keyboard are being pressed.
It can then wait until the user types in their online banking address and login details and steal them.
.
……………………..
img code photo … The Zeus Trojan uses keylogging
i.dailymail.co.uk/i/pix/2013/06/05/article-2336388-007BAE…
The Zeus Trojan uses keylogging to record every key that is pressed on a person’s keyboard. When the user enters an internet banking address and login details, the Trojan can steal them, sign into the account and drain all the money
photo credit: none listed
……………………..
.
Once they have the logins, the cybercriminals can enter your online accounts and steal your money.
It is a six-year-old malware program that has seen a resurgence recently on Facebook and other social network sites.
The Zeus Trojan, also known as ZBOT, has infected millions of computers worldwide – with reports claiming 3.6 million are in the U.S alone – and can sit in the background dormant and virtually undetected.
In a blog post, Trend Micro claimed that incidents of the Zeus have risen steadily this year and peaked last month.
The Zeus virus traditionally targets computers running Windows.
.
…………………….
HOW TO AVOID THE ZEUS TROJAN?
… To avoid falling victim to the Zeus malware don’t ever click on unknown links.
… If you want to check a link’s source, copy and paste it into a site such as URL X-ray.
… The site safely shows you the intended destination of a link.
… If you’re unsure about its safety – don’t click it.
… Install antivirus security on your PC and on your mobile devices, such as Lookout or AVG.
… To avoid people gaining access to your internet banking accounts, sign up for two-step verification.
… Each time you login a unique code will be sent to you separately – as a text message for example.
… This means even if someone has your login details, they won’t be able to access the unique code.
…………………….
.
Security experts at Kaspersky Lab also discovered five new variants of the Zeus trojan that specifically affect BlackBerry and Android devices last year.
This means that if a malicious link is clicked via the Facebook app or mobile site on these devices, the owner may still be at risk.
A spokesperson for Facebook said that the site actively scans for malware and offers various security options including the Scan-and-Repair Malware scan that can search for and remove malware from mobile devices.
.
Share or comment on this article
.
.
I suspect my Pc has been infiltrated by a ‘trojan’. I can’t see anything but if you listen carefully you can hear the sound of little wooden hooves running around inside my computer.
– Dimples , The silver city, United Kingdom, 05/6/2013 23:04
.
.
.
.
………………………………………………………………………………………………………………………………………………………………………
.
…..item 3)…. 900 million Android devices are at risk from a bug that allows hackers to hijack phones and steal data …
… Mail Online – Daily Mail … www.dailymail.co.uk/sciencetech/ …
… A bug that has been present since 2009 allows hackers to listen in to calls and send junk emails from Android devices
… One research firm claims over 900 million Android devices are at risk from the bug that takes advantage of the way the operating system handles cryptographic verification of apps installed on phones and tablets
… Samsung Galaxy S4 handsets have a fix, but Google’s Nexus phones remain at risk
There is no evidence that the flaw has been exploited yet
By MARK PRIGG
PUBLISHED: 05:50 EST, 5 July 2013 | UPDATED: 05:51 EST, 5 July 2013
www.dailymail.co.uk/sciencetech/article-2356696/900-milli…
A ‘master key’ that could give hackers complete access to mobile phones and tablets running Google’s Android software has been revealed.
.
…………………..
img code photo … Google’s Android software
i.dailymail.co.uk/i/pix/2013/07/05/article-0-0A8B63800000…
A ‘master key’ that could give hackers complete access to mobile phones and tablets running Google’s Android software (logo pictured) has been revealed
ES
…………………..
.
The bug could allow hackers to hijack phones, allowing them to steal data, listen in to calls or send junk email and text messages.
Researchers say the loophole has been present since 2009, and claim around 900 million devices are at risk.
Jeff Forristal of Bluebox, the firm which uncovered the key, said the implications of the discovery were ‘huge’.
‘It can essentially take over the normal functioning of the phone and control any function thereof,’ he wrote on the firm’s blog.
Forristal said the firm made Google aware of its finding in February.
However, the firm did not respond to MailOnline’s request for a comment.
The bug takes advantage of the way Android handles cryptographic verification of the apps installed on the phone.
Android uses the cryptographic signature as a way to check that an app or program is legitimate and to ensure it has not been tampered with.
The Bluebox team found a way to bypass these checks, tricking Android so malicious changes to apps go unnoticed.
Any app or program written to exploit the bug would enjoy the same access to a phone that the legitimate version of that application enjoyed.
‘Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed,’ wrote Forristal.
More…
… Apple’s iPhone 5 is the most hated handset – while the majority of people love the Samsung Galaxy S4, study finds
… Big Brother strikes again: Now TWITTER wants to start tracking you on the web
‘The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls).
‘Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these “zombie” mobile devices to create a botnet.’
.
……………………….
img code photo … Google’s own Nexus handset
i.dailymail.co.uk/i/pix/2013/07/05/article-0-1AAC262A0000…
Researchers say the loophole has been present since 2009 and claim around 900 million devices are at risk. One third party device, the Samsung Galaxy S4 (pictured right), already has a fix for the flaw, but that Google’s own Nexus handset (left) does not
Google.co.uk/nexus
……………………….
.
……………………….
img code photo … Samsung Galaxy S4
i.dailymail.co.uk/i/pix/2013/07/05/article-0-18AC63550000…
Researchers say the loophole has been present since 2009 and claim around 900 million devices are at risk. One third party device, the Samsung Galaxy S4 (pictured right), already has a fix for the flaw, but that Google’s own Nexus handset (left) does not
EPA
……………………….
.
Forristal is planning to reveal more information about the problem at the Black Hat hacker conference being held in August this year, and said the bug could have huge implications for firms who allow people to connect their Android phones and tablet to secure company networks.
He confirmed that one third party device, the Samsung Galaxy S4, already has a fix for the flaw, but that Google’s own Nexus handset did not.
However, experts say that there is currently no evidence that the flaw has been exploited.
‘I imagine that Google would move quickly to add some logic to look for such attacks,’ Dan Wallach, a professor specializing in Android security in the computer science department of Rice University, told the Ars Technica website.
‘Without that available to an attacker, this is likely to only be relevant for Android users who use third-party app stores (which have lots of other problems).’
.
……………………
ANOTHER ANDROID TROJAN COMES IN PIRATED JAY Z APP
McAfee Mobile Security has identified a new Android Trojan embedded in a pirated copy of an exclusive app from rapper Jay Z
On the surface, the malware app functions identically to the legitimate app. However, in the background, the malware sends info about the infected device to an external server every time the phone restarts
The malware then attempts to download and install additional packages
The only visible indication that a user is infected comes via a time-based trigger that is set to activate on 4th July, Independence Day in the US
On that day, the malware will replace the wallpaper on the infected device with an altered image of President Obama that comments on recent events in the US
The security company thinks that there is a hacktivist agenda behind the Trojan but has not ruled out the possibility that additional malware may target financial transactions or other data
.
……………………..
.
.
……………………..
img code photo … A new Android Trojan
i.dailymail.co.uk/i/pix/2013/07/05/article-2356696-1AAC5A…
A new Android Trojan embedded in a pirated copy of an app (pictured) from rapper Jay Z has been identified. On the surface it works like the real app but is actually trying to install additional packages to an individual’s phone. It’s real identity only became clear on 4 July
McAfee Labs
……………………..
.
.
.
.
………………………………………………………………………………………………………………………………………………………………………
.
.
First comes marriage, then comes love
Image by M1key.me
Anshu (27, left) and Saurabh (28, right). Their wedding was arranged, which is usually the case in India. [4, p. 86] To be precise, 90-95% of marriages in India are arranged (and 60% of all the marriages in the world!). [5] What that means is that a sophisticated match-making process is involved, nowadays using modern means such as the Internet (but not always, I was told it could be a bunch of old people asking around), in order to find the desired partner. The process can take months or even years for the most picky people. Then comes marriage, then comes love.
It does not mean the marriage is forced, and Indian singles apparently have no problem trusting relatives to find them a match. [5] They believe that since they get a carefully selected partner from a similar background, comparable intelligence, and so on, the relationship will last and lead to true love.
Horoscopes and auspicious days play a large role (especially for orthodox Brahmin families [4, p. 88]). So it’s not quite the Western "try before you buy" approach, but might be quite similar to various online match-making services.
The so called love-marriages are becoming more popular, especially among Westernised Indians who have their own source of income and can afford to be more independent from their parents (just like their own source of income – from weaving – helps Muslim women I met in the West Bank gain some independence from the husband).
Comments are closed.