Blog Archives

HTTPS Strict Transport Protocol (HSTS) in Internet Explorer 12

Browsers supporting HSTS force any sessions sent over HTTP to be sent instead over HTTPS, encrypting communication to and from a website.

Microsoft products to block “adware”

New objective criteria drafted up by the company stipulates that by July 1 internet ads must have a visible close button and must clearly state who’s behind them, or they’ll be branded as adware.

Powershell Malware

Most significantly, instead of creating or including executable code, CRIGENT uses the Windows PowerShell to carry out its routines. PowerShell is a powerful interactive shell/scripting tool that is available for all current versions of Windows

Microsoft’s Security Products Will Block Adware By Default Starting On July 1

As of July 1, the company’s security products will immediately stop any adware they detect and notify the user, who can then restore the program if they wish. Currently, when any of Microsoft’s security products (including Microsoft Security Essentials and Microsoft Forefront) detects a program as adware, it will alert the user and offer them a recommended action

Hackers Turn Security Camera DVRs Into Worst Bitcoin Miners Ever

But it also tries to earn a little scratch for its creators by mining bitcoins, a processor-intensive activity that would probably slow down any infected DVR.

Boxee.tv hacked.

Hackers posted names, e-mail addresses, message histories, and partially protected login credentials for more than 158,000 forum users of Boxee.tv, the Web-based television service that was acquired by Samsung last year, researchers said.

China blames US for a third of all hacks on its computers

Almost 11 million computers had been compromised by overseas-based servers, mostly from the US

Windows Malware using Powershell

Most significantly, instead of creating or including executable code, CRIGENT uses the Windows PowerShell to carry out its routines. PowerShell is a powerful interactive shell/scripting tool that is available for all current versions of Windows (and is built-in from Windows 7 onwards);

Microsoft Windows 0-day, Don’t open unexpected RTF documents.

The in the wild exploit takes advantage of an unspecified RTF parsing vulnerability combined with an ASLR bypass, which depends by a module loaded at predictable memory address.

How Much Microsoft Charges the FBI for User Data

Long story short, Microsoft charges the FBI (read: taxpayers) hundreds of thousands of dollars a month for access to information about you. And their rates are on the rise.