ADAZVIBES

Pages

  • Home
  • Contact
  • Shop
    • Home
    • Fashion
    • _Trendy
    • _Latest
    • Lifestyle
    • shop
    • travel
    • food
    DNSChangerThe FBI has warned hundreds of thousands of people that they could lose their internet connections in July. That is, of course, if they don't take steps to diagnose and disinfect their computers. The problem that these individuals are facing is related to malware known as DNSChanger, which was first discovered in 2007 and has since infected millions of computers around the world.

    Basically, what this malware does is that whenever you type a web address into your browser, your computer contacts DNS servers to discover the numerical IP address of the site you are looking for and then takes you there. The DNSChanger malware messes with an infected computer's settings and directs it to a rogue server set up by an internet crime ring.

    According to an Attorney General for the United States in an FBI press release, these criminals "were intentional cyberbandits who hijacked millions of computers at will and rerouted them to Internet Web sites and advertisements of their own choosing -- collecting millions in undeserved commissions for all the hijacked computer clicks and Internet ads they fraudulently engineered."

    However, the FBI busted up the crime ring last year and took control of the rogue servers. Considering so many infected computers relied on the servers to reach the internet, the agency decided not to shut them off and instead converted them to legitimate DNS servers. However, running these servers is costing the government money, which is why they are being turned off in July. If you are one of the unfortunate ones whose computer got infected, the internet will no longer exist for you.

    The DNSChanger Working Group (DCWG) has created a website designed to help you diagnose your computer and see if you are infected and remove the DNSChanger if necessary. I'd recommend checking it out, especially before July 8, or you can say goodbye to Facebook, Google and whatever else you use the internet for.

    Source: CNET - Web could vanish for hordes of people in July, FBI warns
    Continue Reading
    iPhone Facebook appsA report surfaced recently about a vulnerability in Facebook that allowed people to access someone else's account. The report initially stated that this vulnerability only affected people on a jailbroken iPhone, however, that doesn't seem to be the case anymore as two new reports are stating that it isn't only jailbroken phones that are at risk.

    Gareth Wright, an app developer from the U.K., along with The Next Web have each confirmed, separately, that this new vulnerability affects any and all iPhones, not just jailbroken ones. In addition to that, it has been discovered that the vulnerability originated in Facebook's iPhone app.

    Wright released his report earlier in the week and claimed that the iPhone Facebook app includes a vulnerability that fails to encrypt log-on credentials whenever you get on Facebook on your iPhone via the app. Wright also said that he also discovered a Facebook access token in the Draw Something game. Wright copied the token, used the Facebook Query Language and extracted the information.

    According to Wright's report, "Sure enough, I could pull back pretty much any information from my Facebook account." Wright also mentioned that the property list of the app contained any and all information needed to allow someone other than you to access your Facebook account, send private messages and do anything else imaginable.

    However, Facebook is sticking by their claim that the vulnerability only affects jailbroken phones. In a statement from the social media giant, the company said, "Facebook's iOS and Android applications are only intended for use with the manufacture provided operating system, and access tokens are only vulnerable if they have modified their mobile OS (i.e. jailbroken iOS or modded Android) or have granted a malicious actor access to the physical device."

    That may have been believable had The Next Web not released their very own report separate from Wright's. The Next Web confirmed themselves that the vulnerability also affects non-jailbroken phones. However, The Next Web also found that Dropbox also suffers from the same vulnerability, leaving the application open to a property list hack.

    According to The Next Web, "We copied the .plist from one device, with the app installed and logged in, over to another which had a fresh installation of Dropbox on it. The profile copied and it worked seamlessly, as if we had logged on ourselves, which we had not." The Next Web also added that the Dropbox vulnerability works on phones that are passcode protected.

    Facebook keeps saying that the vulnerability is only on jailbroken phones, though with the reports from Wright and The Next Web, I don't know how much longer the social media company can keep that story going.

    Source: CNET - facebook ID theft impacts all iPhones, Dropbox
    Power Point Projectors
    Most business class projectors will do a good job displaying your PowerPoint presentation. If you have a small presentation group, a 2000 lumen LCD projector will be able to produce a nice and clear picture. For larger audiences you should consider a 5000 lumen LCD projector.
    Continue Reading
    Newer
    Stories
    Older
    Stories

    Labels

    .NET 10TB hard drive 10TB SSD 20 Under 20 3D NAND 48-layer NAND 72-core chip Acer Acer Aspire Z3-710 Series Acer Aspire Z3-710-UR54 Acer Aspire Z3-710-UR55 ACSI adiabatic quantum computing Adobe Adobe LeanPrint Advanced Micro Devices Incorporated all-in-one PC Amazon Amazon Cloud Services Amazon Kindle Amazon Kindle Fire Amazon Web Services AMD American Consumer Satisfaction Index AMR Mali-450 Android Android tablets antivirus AOL Apple Apple computers Apple iPad Apple iPad 2 Apple iPad 3 AppleCare AppleCare+ apps ARM ASP Aurora Autonomy Avago Azure Azure Data Factory Azure Data Lake Azure Machine Learning Azure SQL Data Warehouse batteries Battery Saver Best Buy big data Bing Blackhole exploit Broadcom Broadcom LTd Build conference C# C++ Calculator Center for Democracy and Technology chip makers Chrome Chrome extensions chronopay Cloud Print clouds Bitcasa cognitive computers Cold Fusion computer Computer Chips computer graphics Computer History Museum computer makers Computer News Computer Rental computer rentals computer security computer software computer virus computers conferences conventions cool computer designs cooling Criptix for Gmail CryEngine CryEngine 3 Crytek custom custom computer builds D-Wave D33DS Company DARPA DasKeyboard data consumption data gathering data processing databases DDR3 Dell Dell Endpoint Security Suite Delphi desktops Digg DIY DNSCHanger Docking Station DRAM Draw Something Dropbox Eco Friendly egyptian protest electronic frontier foundation Elite PC Elite PC dedicated tech support Emperor Enderle Group enterprise hard drives Environment Envy 24 Envy 27 Envy 34 European Union Excel Exchange Experts Exchange Facebook Facebook App Facebook apps Facebook iPad app Facebook mobile apps fake anti-virus fake MacDefender FBI Firefox Firefox 4 Firefox 5 Firefox 6 Firefox 9 Firefox 9.0.1 Firefox rapid release schedule flash memory flash storage Fortune 500 free Xbox 360 Freescale From Garage to World's Most Valuable Company Fujitsu Galaxy Tab Galaxy Tab 7.0 Plus gaming computers gaming desktops gaming laptops GeForce GTX 960A Google Google Calendar Google Chrome Google Cloud Print Google Glass Google Glass for Enterprise Google Toolbar Google+ GPU Graphene Green Groove H.264 H.264 support Hadoop Hana hard disk drive hard drives HDD HGST Hitachi Hock Tan Hotmail how to HP HP Compaq 8200 Elite HP computers HP dedicated tech support HP Elite PC HP news HP PCs HP tech support IBM IBM Selectric typewriter IDC IETF iFixit iMac in-memory database Industries infinix ink saver Intel international internet access International News internet internet access Internet Engineering Task Force Internet Explorer Internet Explorer 9 Internet Explorer vulnerabilities internet extensions iOS 8 iPad iPad 2 iPad 3 iPad Mini iPads iPhone iPhone Facebook App iPod Touch Italian Government Italy iWatch Japan Java Java SE 7 Java Standard Edition 7 JavaJ2EE JavaScript Jon Tanguy K Computer Kevin Rose keyboards Kickstarter Kindle Kindle Fire kinect kinect for pc Knight's Landing krebsonsecurity blog laptop Laptops LeanPrint Lego Computer Legos Lenovo Lenovo desktop Limitless Linux LinkedIn Linux LinuxONE lithium-ion batteries Lockheed-Martin M600 Mac mac malware Mac OS X Macbook MacBook Pro MacDefender Macotakara MacProtecor macsecurity Mali-450 malware malware on Android market malware protection Mark Zuckerberg McAfee Meg Whitman Metadot Corporation Metadot Corporation DasKeyboard Metro Metro apps Metro Group Metro interface Micro Chips Micron Micron M600 microsoft Microsoft Exchange Server 2010 Microsoft Exchange Service Pack 2 microsoft kinect Microsoft Miracast dongle Microsoft Patch Tuesday microsoft surface Microsoft Windows Microsoft Windows Server 2008 R2 Miracast MIT MK01GRRB MK01GRRR mobile apps mobile tech MOG Moor Insights and Strategy Mozilla Mozilla Firefox mtn multi-touch MySpace NAND Napster NBCUniversal NEC NEnhancer netquin network security networks neurosynaptic computer chips new New Material New Technology Notebooks Nvidia Nvidia Developer Zone Nvidia hacked NXP operating systems Oracle os OS X 10.10 Outlook Outlook Hotmail Connector paper saver PayPal PC pc kinect PC news pc programs PC satisfaction pcs Personalization Peter Thiel Phandroid Phandroid hacked photography PHP pi pixel Power BI Powershell processing processors programming languages Pund-IT Python quad-core Exynos processor Quanta Computer Incorporated quantum annealing quantum bits quantum computers quantum computing QUIC Quick UPD Internet Connections Race to Zero Radeon R7 Radeon R9 ransomware raspberry RealNetworks Rentacomputer Resources Rhapsody Rickshaw Rockhopper rustock Samsung Samsung 30nm DDR3 DRAM Samsung Exynos processors Samsung Galaxy Tab 7.0 Plus Samsung laptops Samsung Series 7 Samsung Series 7 Gamer SanDisk SAP scareware school computers school iPads Server Roundup Contest SharePoint Server Shell Silicon Simon Prakash Skylake Core i5 Skylake Core i7 Small to Medium Businesses Social Media social networking Software Updates Solid State Drive solid-state batteries solid-state drives Sony Sony computers Sony VAIO Sophos spam spam issues Spotify SQL SSD SSL Steve Appleton Steve Jobs Steven Sinofsky Storage Sunrise Calendar supercomputers superconductors Surface Surface 3 Surface Mini Surface Pro Surface Pro 3 Surface RT Surface tablet symbian SYNAPSE syrian black out syrian protest Tablet Tablet Laptop Hybrid tablet PC Tablet Rental tablets TCP + TLS tech Tech Rentals tech revolution Tech Trends Tech Upgrades technology Technology News technology rentals The Next Web Tianhe-1A TLS Tom Anderson Tools Top 500 Supercomputers Toshiba Toshiba enterprise hard drives Toshiba MK01GRRB Toshiba MK01GRRR touch-screen trade shows Twitter Tyler Downer Ubiquitous Computing Summit UDP ultrabooks Ultrastar He10 unified computer software unstructured data Uptime Institute VAIO Viacom Vic Gundotra VisualBasic web browsers Western Digital windows Windows 10 Windows 10 Education Windows 10 Enterprise Windows 10 Home Windows 10 IoT Core Windows 10 laptops Windows 10 Mobile Windows 10 Preview Windows 10 Pro Windows 10 release date Windows 10 spying Windows 10 Technical Preview Windows 7 Windows 7 PC Windows 8 Windows 8 Enterprise Windows 8 Pro Windows 8 Pro upgrade Windows 8 Professional Windows 8 SKUs Windows 8.1 Windows Insider Preview Program Windows Media Center Windows operating system windows pc Windows Server Windows Store Windows Update Windows Vista Windows XP WorkyFlowy world technology worldwide HDD shortages WWDC Xbox xbox 360 Xbox 360 Slim Xbox One Yahoo Yahoo hacked zeus bot

    recent posts

    Blog Archive

    • December 2019 (7)
    • February 2019 (4)
    • January 2019 (6)
    • October 2018 (6)
    • September 2018 (2)
    • March 2017 (74)
    • February 2017 (72)
    • January 2017 (4)
    • December 2016 (1)
    • February 2016 (1)
    • January 2016 (1)
    • December 2015 (3)
    • November 2015 (3)
    • October 2015 (3)
    • September 2015 (2)
    • August 2015 (3)
    • July 2015 (1)
    • June 2015 (3)
    • May 2015 (4)
    • April 2015 (6)
    • March 2015 (1)
    • January 2015 (1)
    • November 2014 (1)
    • October 2014 (1)
    • September 2014 (1)
    • August 2014 (2)
    • July 2014 (1)
    • June 2014 (2)
    • May 2014 (1)
    • April 2014 (2)
    • March 2014 (1)
    • February 2014 (1)
    • January 2014 (1)
    • November 2013 (1)
    • September 2013 (1)
    • March 2013 (1)
    • February 2013 (1)
    • January 2013 (1)
    • November 2012 (2)
    • October 2012 (3)
    • September 2012 (1)
    • August 2012 (1)
    • July 2012 (2)
    • June 2012 (2)
    • May 2012 (2)
    • April 2012 (2)
    • March 2012 (5)
    • February 2012 (5)
    • January 2012 (4)
    • December 2011 (5)
    • November 2011 (6)
    • October 2011 (6)
    • September 2011 (6)
    • August 2011 (5)
    • July 2011 (5)
    • June 2011 (8)
    • May 2011 (3)

    Pages

    • Home
    • Privacy Policy
    • Disclaimer
    • About Us
    • Contact Us

    Created with by BeautyTemplates | Distributed By Gooyaabi Templates

    Back to top