Bitcoin-Mining-Botnetz um 500.000 Bots erleichtert heise ...

PSA: AT&T spamming "malware infection advisories" to Bitcoin users

Beginning Friday, it seems AT&T is calling Bitcoin a "malware infection". I have received two emails so far, one each day - so it seems to be a recurring issue, not simply a one time thing. (To those unaware, port 8333 is Bitcoin.)
Furthermore, their RBL (email spam filter) is apparently run by incompetent people, since they have blacklisted my private email server (hosted on a dedicated server, not AT&T, with proper RDNS etc) which is used by nobody outside my immediate family and has never been used to send spam. Thus, I cannot even reply or complain to them about this.
Full message:
Malware infection advisory from AT&T Internet Services Security Center Bellsouth Member ID: *hidden*@att.net Luke Dashjr Primary Member ID: *hidden*@att.net Dear Luke Dashjr, AT&T has received information indicating that one or more devices using your Internet connection may be infected with malicious software. Internet traffic consistent with a malware infection (“unknown”) was observed on Apr 8, 2016 at 9:18 AM EDT from the IP address *hidden*. Our records indicate that this IP address was assigned to you at this time. Infected computers are often used as part of a zombie computer network (“botnet”). Botnets are networks of computers which have been infected with malware and placed under the control of a hacker or group of hackers. They are often used for attacks on websites, spamming, fraud, and distribution of additional malware. Because malware is designed to run in secret, an infected computer may display no obvious symptoms. To address this matter we ask that you take the following actions. If your computer(s) are managed by an Information Technology (IT) group at your place of work, please pass this information on to them. 1. If you use a wireless network, an infected computer may be using your Internet connection without your knowledge. Ensure that your wireless router is password-protected and using WPA or WPA2 encryption (use WEP only if WPA is not available). Check the connections to the router and ensure that you recognize all connected devices. 2. Ensure your firewall settings and anti-virus software are up-to-date, and install any necessary service packs or patches. Scan all systems for viruses and other malware. Additional tools and information: * Tools for removing rootkits, bots, and other crimeware: * Norton Power Eraser: https://security.symantec.com/nbrt/npe.aspx (Windows) * McAfee Rootkit Remover: http://www.mcafee.com/us/downloads/free-tools/rootkitremover.aspx (Windows) * Tools for general virus and malware removal: * Microsoft Safety & Security Center: http://www.microsoft.com/security/ (Windows) * Malwarebytes Anti-Malware: http://malwarebytes.org/ (Windows, Android) * Spybot +AV: http://www.safer-networking.org/ (Windows) * OS X Gatekeeper: http://support.apple.com/kb/HT5290 (OS X) * AT&T Malware and Network Security analysts gather weekly to give you the information that you need to know about the latest security news and trends. Visit AT&T ThreatTraq at http://techchannel.att.com/showpage.cfm?ThreatTraq Regards, AT&T Internet Services Security Center Incident details for *hidden* Type: unknown Source port: 39394 Destination IP: 5.xx.xx.205 Destination port: 8333 For security reasons, the destination IP is partially obscured. DISCLAIMER: The information above contains links to software by third-party vendors (hereafter, “the Software”). AT&T is not responsible for support or assistance for any of the Software. If you need support or assistance with any of the Software, please contact the Software's vendor directly. AT&T is unable to provide a warranty or guarantee, either expressed or implied, for any of the Software. You will be responsible for your own system software and system security and not hold AT&T, its partners, agents or affiliates liable for any costs or damages whatsoever (including, without limitation, damages to access system, hardware and/or software) to your computer as a result of installing or using any of the Software. You also understand that use of all hardware and/or software must comply with the Bellsouth Acceptable Use Policy. Important Note: This email contains links to various websites. You may copy and paste the URL(s) into your browser rather than clicking directly on the link. ©2005 - 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Privacy Policy (Updated July 24, 2015) 
(I consider this PSA to be fair use under the Copyright Act.)
submitted by luke-jr to Bitcoin [link] [comments]

In honor of Bitcoin $1,000*, here's a list of Mt. Gox's valued customers (*Price is not reflective of the actual value of bitcoin)

I've compiled a list of Mt. Gox's "valued customers" from its twitter stream. Ask yourself if a legitimate company would have a similar stream and lack of customer support.
It's time to put Mt. Gox out to pasture. They were a phenomenal innovator, but it's now just a dangerous exchange.
Note: I'm on this list, too.
GMolenkamp, LaunchByte, 01101O10, MADinMelbourne, LondonBTCMeetUp, DuhHamza, snail365, AntoineSL, IIIPROIII, jordandegeus, DClark2014, Pirucho, harmvanderven, gtklocker, jamesjcousins, djbooth007, EnumaElish, jonnyhsy, abelevii, baihk, matsimo, RusselDalton, lifemanifesto, strip911, user16782173, vurbinaporrero, ActlHumanBeings, ch25061, PatrickAgut, AsherWolf, trader_bitcoin, fuckspacedrumma, bitcomsec, CryptoDirect, BravoCrazy, apap100, jujueyeball, sinonevero, Christopherglaw, cryptosecurity, mowheeler, yuri_koval, panatha192, hyph3nx, twobitidiot, AegisFS, elreystadesnudo, B2Benb2, mvanhorn, SiliconPM, BitcoinZilla, kaizen7, CElston, LamassuBTC, ansgarjohn, Arganaut, frizbninja, milto117, angrymofo, ZagaloZ, yugz777, BTCguess, fsbtnews, danicellero, evilthought, kazanture, RenegadeMinds, daniellauhlig, zhenghaox, speed2606, klinthoufy, anarcoin, TConspiracyChef, Sanelino, supershares, alexisvos, NoEyeSquareGuy, DHQNgo, jaysu, simonhopper, elreystadesnudo, B2Benb2, JoeCroninSHOW, Unguided, iZoo3y, cpmccurdy, RvZwiggelaar, hilldoc, doctorzaius, jasonmcbeath1, patrickakerman, LABLEVI, tcomfb, mvanhorn, SiliconPM, Trancez0r, AirBoyNoises, _CharlieHaley, nipponese, frenki07, Pimpmycoin, SpaceCashApp, biatch0r, Sturgeongroup, JamesGMorgan, BitcoinZilla, kurtvarner, NeverLoseVision, RvZwiggelaar, japes, bphillab, Kf_Lenz, salojc2006, btcdrak, bitcoinsandwich, Heidern2, SpikeeeN, rexuslexus, BorderedHessian, mechanimal82, simonhopper, walidjsanchez, nughaud, sfaigan, chen_mingming, liberaleco, tiagofaia22, Cryptowhore, Sabelo_Maduna, OpenECommunity, Peercoin_Info, BitcoinSachs, darzin, matth3wpeng, ltbitcoin, idiot, ridreis, AlanRHooper, TConspiracyChef, RedScareBot, wr, TheTommyD, nataliew2, koinsmart, Nysedaytraders, leetwitbc, _amckenna, SFBitcoinTaxi, stuwyatt, zapnap, NHLaundryKing, TiberiKo, CUSSBRO, dantoml, Coinboard, jongold, atef_drira, TVeleckovik, Supreme_Mentor, DeusExJuice, Bitcoin_Bum, _ShaSoftware, VestaTrader, BitcoinFound, Nicky_PoohBear, TiberiKo, NHLaundryKing, zapnap, JamesLiamCook, Bitcoin, awillmobbs, hlopez, Bobmuffins, TheCryptoEdge, kadrkn, Zubinezu, bitcointxt, aikordek, joerodr, BitcoinPosse, adambailey27, DanJones79, CephasSerhat, CrazyLittle, hodortargaryen, alienshooter99, TConspiracyChef, SamiGhazali, trutherbot, stuwyatt, dan72ros, arjunsethi, dennishegstad, TaoOfSatoshi, keithsaltojanes, trader_bitcoin, MattFinn2, TVarmy, killhamster, jebus911, mdp2031, VestaTrader, josealivivas, KatsuHenrikki, jerroenbakker, kingtytankhamen, TomHashemi, BullionBaron, B_Acro, BitcoinSignal, dragonfire1024, Eddie_Catflap, andrewroyer, divinejudge1, KatsuHenrikki, kingtytankhamen, atef_drira, jerroenbakker, The_BitCoiner, Truex, TomHashemi, Rkpools, krellis, _J4n37, josealivivas, JohnDaugherty86, SPC_Bitcoin, nlcondit, SFBitcoinTaxi, pushingtin, riisacoff, sidragon, WILLWONGX, ASampei, upal, chrimm, belsito, mowheeler, VestaTrader, BitChangeClub, BlueJayKay5, GeckoFawkes, coljac, conspirologorg, WelfareWTF, subimage, LtdData, cointhink, TopBitcoinSites, kazfavs, pushingit, launchticker, finansakrobat, Birmav, davewalter81, jdebunt, onefix, jameve13, Ric0tjuh, ASampei, BELADOZZAS, SumOfCoins, iZoo3y, JohnDaugherty86, ActualAdviceBTC, Protossscs, iamheff, upal, mach1monorail, ASampei, Fontasee, Sea_Devil, davidpate8, selqeni, buuddha77, 845151320lwq, M0ssein, MasterOfCoins, ianatha, macbrainpro, KeatonRaser, wdaniels, bneiluj, leetwitbc, IMGoldMine, TheRichDouche, alansuspect, TConspiracyChef, cryptfolio, leejaew, Crockoduck1, DJCrizCray, sovereignmonkey, HoodSavior, CephasSerhat, anonymous6844, dillweedrules, macbrainpro, VelocityCoin, throwinabanana, cryptonic27, prettybinladen, kadrkn, ianatha, igorclark, BitcoinTitan, Bitcoin_Altcoin, BitcoinZilla, somanhuang, Harry_Dillema, BitcoinMayhem, Coincamp, ASampei, Frank_Craft, D3Markets, dogecoinpark, FoxyVo, BeerlyWeedz, youflavio, inVIINCEable, JackCrypto, trakout, FlavienCharlon, somanhuang, LakesAdam, myselfbtc, prathswoop, jamel_rwb, jsblokland, somanhuang, cryptoron, simonhopper, Eleonorwjmg, trakout, keremkacel, D_Roch, KBurkowicz, bitcoinrocks, samueloakford, TheLawrenceDude, DaveHaroldson90, FlavienCharlon, jimmyhomma, GjertGjersund, martijngonlag, LakesAdam, KingCyberJacob, bitcomsec, flix1, GarrickHileman, bitcoinpotato, DCG_Crew, fotoroll, DesperateTrader, mrebola, irwm1, rdawood007, KratosMtOlympus, JustusRanvier, CryptoConner, alejanfm, mulligan, litovskaya, JffrLabel, TConspiracyChef, yeahfro, elreystadesnudo, OLAnewscast, iheartubuntu, cryptocnews, fak3r, wombleswyrd, Jason, ZacCoffman, heri, wdaniels, adv4nced, ws, dragonfire1024, strongnuclear, BitcoinZen, ericcogen, NeverLoseVision, Qwahchees, icrewuh60, ketchupandbeer, dorongrinstein, bitinturst1, Datavetaren, OpenECommunity, trutherbot, wowaname, kinoti, altcoinpumper, MikevHoenselaar, EddieDrysdale, VinceintheBay, jebus911, LaurentSartran, JohnRMeese, bratt, leewalton69, JustCosm, isellbitcoins, JeffWalker82, TKutrada, sethgoldin, pietrosperoni, CryptoCartel, jrtaff, FrentzelJ, AboutBIT, Cryptonauta, BlankSteve, BitcoinSignal, BitMillionaire, markhankins1982, BitVestors, Chaits, stephenlb, triplepundit, RuneBloodstone, onbitcoin, newsBTCdotcom, BitcoinKitty, cryptoeconomist, BitcoinSitesOrg, RenaudDenis, matthewmascioni, guitarlife2012, ezra802, jimmyhomma, PennyGaff, Zubinezu, Stevie2747, Tiraspol, Ripplesync, BitcoinSignal, KrakenTrader, daitken4, ycopfiles, aprilthemoo, cirobrandao, TheBTCG, JackCrypto, spyn, KristinPaget, kponseel, rdawood007, symantec, KristinPaget, dan72ros, cryptocoinmedia, fightcopytrolls, packmatt73, GabrielVisser, zhongfu, Rentadesker, kponseel, lammatha218, vadipp, MagnoxZhan, neo1607, OvRonda, feufy78, spyn, PennyGaff, dkoletic, TheBTCG, Bitcoin_Watcher, ZLOK, selqeni, KristinPaget, ortelius, rlhead3890, NickFrey, wandgrab, TomBandetta, KristinPaget, jsblokland, torbahax, Liberationtech, raulriera, Curious_Heather, MendzappJames, JffrLabel, kornstar11, RealmDweller1, LatestBTC, AmelDedic1987, PaulCapestany, btcdotcom, atswartz, Asher_Wolf, coinsultants, MrOf4343, BitcoinGain, BitcoinCEX, skelly_boy, fmisle, wendydiaz73, RNR_0, Puunk, feufy78, cryptopense, ActualAdviceBTC, h4rd3z, Cellcote, JBintcliffe, DuhHamza, SatoshiNakam, Johnny5Eu, Abbott, sea, farhannow, julianor, OTBCNews, gerryhays, altcap, InterdasGlobal, zachtratar, RBenadon, dylanized, myproviderbv, dkasper, sergiocovelli, ePubMATIC, calmcdn, TheBitcoinWife, nicr9, TConspiracyChef, BuyQuark, hehersontan, luketpembroke, torontofixit, grimnar1, PharmaTradr, kponseel, doltek, jimmyhomma,TCVisionary, DRoch, 1HandsomeHustla, TheLawrenceDude, OWSBuenosAires, pessimism, George_Hahn, darylmander, igorclark, StephyFinance, miguelsantosw, Coinboard, FrankoCurrency, btccharity, anjiecast, L2GStar, kwamgee, litecoindude, DragonPitch, DGSchesser, MichealKennedy, malin_mar, cryptofolio, AllenEstrin, GnomishMath, SPC_Bitcoin, metamatterNL, moultontyler, FIAT_Poop_Shoot, vineetsonkar, SimranDevs, capaday79, justinfondriest, growlhero, FontasBTC, NINK, RL_Betatester, microcable, LitecoinToday, gregorymunten, sndrptrs, FaireGlobalLLC, SharkWipf, DanishPuss, Azyouknow, irijiri, PeterOdeus, daitken4, Orbixx, lammatha218, Cee_Bgm, kingfaraone, Beccas43, D15RUPT, MelissaLeeCNBC, flibbr, PerryJLucas, LitecoinBoy, pizzaindex, JimmyBarge, El_Mono1958, BrianKellyBK, thesurfer68, cryptohamster, AndyBarrick, deuceocho28, joar79, yuri_koval, therealhaxwell, BTCGeek, xiffy, PhilBoscarino, AaronvanW, ml_gardner, Cryptocoinbiz, ThinkBig, AlvaroBurgos23, bearpig, SteveClement, AndrewDeichler, KavaKauboi, eforcems, jaimefdezcaro, FeliciaQiKim, 212onise, hoxy313, fdefoy, FunkyJamma, lopp, BitcoinDayTrade, btcdrak, zaamhain, ManFmNantucket, markgongloff, NekotTheBrave, wtrnl, AlaricSystems, irwm1, solwatts, ranhatty, FaireGlobalLLC, DeMoralizer25, BuyQuark, waveride2, ranhatty, BitcoinHotMom, frank600, filmanthropos, jvanek1, bbtm64, levifig, irwm1, cstaketoki, aaguileravega, RuanBeukes, Emeka89, Uzocho, eekygeeky, MichealKennedy, BitcoinSachs, solwatts, zovanei, adambreckler, Cryptominer1, NickBeardShow, reverendcaptain, lammatha218, PlayBaseGames, Dear Valued Customer, NabiIaHolicisMe, israeldavidoliv, timstoop, blacksun1, BitMate, BTCESpec, FaireGlobalLLC, thesurfer68, holidaynova, rowiro, mrebola, FdhJose, htjyang, JonnyPhun, thegonan, RippleLounge, XRPTalk, heromanjay, evanzenker, fmisle, markmcan, tristan_winters, frenki07, DomjEspo, b_rossi, LTCInformation, Coinflipkens, CoinMarketCap, JoakimHaage, NWBitcoin, pizzaindex, FaireGlobalLLC, aaronyarm, thesurfer68, Grundoko, NekoArc, JudeBurger, airmatic20, ruan1219, evula, ordnanceelf, levifig, WhipeeDip, wowaname, Koudemort, NewsBitcoin, _OpeniX, Adult, khaaanah, TheRealSajad, tensafefrogs, Willyum727, reicher001, TravisPatron, iarvin, TweetsFromRichy, MrBBrown, KryptoKoolio, SithIlluminati, ahonentj, arrewinki, seangraf, trish_regan, DavidEGrayson, AcclaimDan, SteveStreza, SamForty, WebEspy, corbetter, BitcoinLessons, pagobit, SteveElsewhere, yugz777, Adam_CE, NickBeardShow, ranhatty, ChrisRobinsonYo, SavneetS, notopk, Jason_Rowley, brucecat, chinaboysu, BitcoinLinksNet, BitcoinContract, CPython314, Turkoglu53, ristonojonen, matticane, TVeleckovik, gatorshoosiers, CeoCHN, lickthepig, khurramc, apap100, TheAtomSea, EntropyExtropy, iWeyer, JerseyITGuy, jzipdamonsta, lopp, vidicbojan, btcglea, EnumaElish, NinjaCubed, JackCrypto, CryptoPumpNDump, DCMJ2014, AndrewDEvans, StickerTraders, jgarzik, JosephLandesman, BitcoinAltcoin, Sturgeongroup, Spooky_Nick, nixberger, Kphelpz, kryptokash, QuickBT, SolaceNow, therealhaxwell, owocki, jamesarosen, RajivVarma, cajici, al676, CrystalBall6, Liberationtech, ws, computerxpds, raahil190, MisterSinakoteh, Redcoatwright, NicoDAgris, 18_0152_u, mikeyavo, SamAsante, coinalytics, AMLG23, KristeeKelley, OFC_videos, PromptLondon, rekkd, JackCrypto, CodeForBitcoins, T3rr0rByte13, dasnut1, TConspiracyChef, OTBCNews, SteelValleySpec, Bitcoinity, bitcoinpotato, Jipe, El_Mono1958, Bit_Prof, T3rr0rByte13, JohnRMeese, mattdrayer, Johnny_0o, rraposo, BryceWeiner, RCasatta, RBenadon, KcChano, FreeDumb_News, OFC_videos, TroyLumpkin, davidgilmer, PokerCapitalist, Btcboogie, niksthehacker, _OpeniX, BryceWeiner, guiabitcoin, MarcdeVerdelhan, newsBTCdotcom, iheartubuntu, macaskill Bitcoinkenner, PharmaTradr, funkyoubitch, FinanceTed, Hugues_Maynie, DunningKruger, BitcoinDayTrade, tucaminoingles, Chronic_Inc, Hoefgeest, BryceWeiner, Bitcoinkenner, mmeijeri, brucecat, kenhorn, chee1bot, BitstampSupport, Colin4ward, willsta4me, Stalast, sh4t, Ernestinetnsf, khaaanah, Awzum_JC, DeRuilcentrale, KavaKauboi, GreenPirate_org, MisterSinakoteh, BitcoinDayTrade, PharmaTradr, FlyingRich, goqobuo, TheGARVdotcom, Reddoxxx, btcdefender, BobsBitcoins, BitcoinKinetics, Spooky_Nick, CaptnThundrCunt, 7alazouun, josephzamudio2, postkneejerk, TheBigEasyofOz, TheBigEasyofOz, davidjtwit, sharpcode, _dvgc, Jetjumper, peterverhaar, rmurph17, atghiphop, Cryptanalytics, Cryptanalytics, djtBMX, BrianHousman, AustenAllred, m52go, BTConsulter, SirBitsALot, PokerCapitalist
submitted by twobitidiot to Bitcoin [link] [comments]

If malicious hackers can pool together tons of phones together to reach considerable hashing power; Can a positive community crowdsource a large batch of cheap USB miners with auto-p2pool configurations? A significant amount of small parts add up to a greater sum!

We now hold the discussion about the danger of GHash's strength, let's use this energy to make a difference.
Let's use frictionless money to make it easy for a bunch of small contributions to make a big difference.
Ghash is popular because it's easy to mine at any amount and get a small payout, even if it doesn't quite break even.
P2Pools offer the same advantage because there is no middleman to collect fees. Yet until P2Pools get larger hashing power, this makes it not advantageous for small miners to individually direct towards P2Pools..
Yet if a bunch of small miners directed towards a single pool, it can make a significant difference
Developers have already created bot-net type applications that use phones to pool together and mine. It has occured on iOS, Android and has been occurring since 2011.
So if developers can do this maliciously, could we use this same mentality in a beneficial way to easily and cheaply secure the network?
Currently you can get small USB miners for a few bucks. And if you want to spend a little bit more, it's easy to get a hub/dock to group more then a few miners together.
Yet even just running one device in the background while online would be useful if many people did this.
So what can we do?
Well the best way to coordinate an effort would be to crowd-fund a kickstarter like campaign to buy a bulk amount of USB miners so that people could spend a few bucks and get a miner or two to give to friends.
It would be great to get a large vendor trying to rid stock could do something like this perhaps?
Ideally I would like to use Lighthouse yet it is not ready. I am unaware of any other decentralized crowd-sourcing applications.
If nothing else arrises then Bitcoin Starter could be a substitute for such a fund.
How many people would be interested in running a small USB miner in the background while your on your computer? If everyone pitched in a buck or two to get a small miner shipped to their house, would you run it?
Please give your thoughts! If you can help please stand up and if your willing to support make that known! If you think this is stupid then say so!
tl;dr: let's see if we can get a community crowdsourced effort to distribute small usb miners to a crowd of people. If they all pointed their dust-amount of hashing power it could add up to a greater sum. If done with a P2Pool it could be a very beneficial action to secure bitcoin's decentralization.
submitted by ForestOfGrins to Bitcoin [link] [comments]

[Table] IAmA: I am Mikko Hypponen, a computer security expert. Ask me anything!

Verified? (This bot cannot verify AMAs just yet)
Date: 2014-12-02
Link to submission (Has self-text)
Questions Answers
Do you still do malware analysis as a part of your day job ? Do you have some advices for someone searching a job in the field ? You need to pick your focus area. What do you want to do? Penetration testing? Encryption? Malware analysis? Forensics? Underground intelligence? Counter-espionage? Then you need to find mentors and coaches. The easiest way to do this is via online forums dedicated to your focus area. For example, check forum.infosecmentors.com.
SANS has some great online resources for people starting up in this area: check them out.
Do you see malware analysis as a growth field for careers? Why? Good malware analysts will always get a job. And malware isn't going to go away any time soon.
It's not just security companies who are hiring people in this field. Many large companies and telcos have their own CERT teams which hire malware analysts.
Is it true that it isn't a huge challenge to modify malware in a way that it is not detected by any current anti virus program, so that people building bot nets or infiltrating computers with Trojans usually smuggle them past virus scanners? It's trivial to modify existing malware so that traditional antivirus programs won't detect it any more. It only takes couple of minutes.
That's why antivirus programs have been moving towards behaviour-based detection models as well as towards reputation-based detection models.
Do note that testing behaviour-based blocking is hard. That's why it's misleading when people post links to sites such as Virustotal as evidence that particular file is 'not detected by AVs'. There's no way to know if a particular antivirus would have blocked the file, unless you would try to run it.
"As far as we can see, this program has never been executed by anyone else anywhere. You are the first person on the planet to run this file. This is highly unusual. We will block this file, even though we can't find any known malware from the file"
The only problem with this scenario are software developers, who compile their own programs. They obviously are the first persons on the planet to run a particular program - as they made it themselves! They can easily whitelist their output folder to avoid this problem though.
Can you recommend any behaviour-based or reputation-based blocking software in particular (for Windows and/or OS X)? Well, our own antivirus has these built in.
Europol's cybercrime taskforce recently took down over a hundred darknet servers. Did the news shake your faith in TOR? People use Tor for surfing the normal web anonymized, and they use Tor Hidden Service for running websites that are only accessible for Tor users.
Both Tor use cases can be targeted by various kinds of attacks. Just like anywhere else, there is no absolute security in Tor either.
I guess the takedown showed more about capabilities of current law enforcement than anything else.
I use Tor regularily to gain access to sites in the Tor Hidden Service, but for proteting my own privacy, I don't rely on Tor. I use VPNs instead. In addition to providing you an exit node from another location, VPNs also encrypt your traffic. However, Tor is free and it's open source. Most VPNs are closed source, and you have to pay for them. And you have to rely on the VPN provider, so choose carefully. We have a VPN product of our own, which is what I use.
I use a VPN regularly from work to bypass filters, and at home to avoid those pesky cease-and-desists. Although I'm not a infosec professional I've always heard that how secure you are using a VPN is directly related to whether or not their logs of your traffic can be traced back to you. How secure in your opinion are VPN providers (such as PIA which I personally use)? And in wake of the prevalence of government surveillance now can VPN providers claims of 'not keeping logs' be trusted to protect privacy? Use a VPN provider you trust. Someone who's been in the security business for a long while. Also, aim for a vendor who doesn't store logs of user activity.
Do you keep logs on the VPN? Freedome stores no logs.
How safe are current smart phones and how secure are their connections? Are special phones used by politicians really safe, or do they get hacked as well? The operating systems on our current phones (and tablets) are clearly more secure than the operating systems on our computers. That's mostly because they are much more restricted.
Windows Phones and iOS devices don't have a real malware problem (they still have to worry about things like phishing though). Android is the only smartphone platform that has real-world malware for it (but most of that is found in China and is coming from 3rd party app stores).
It is interesting the Android is the first Linux distribution to have a real-world malware problem.
Lot's of people are afraid of the viruses and malware only simply because they are all over the news and realtively easy to explain to. I am personally more afraid of the silently allowed data mining (i.e. the amount of info Google can get their hands on) and social engineering style of "hacking". Companies like Google and Facebook make money by trying to gather as much information about you as they can. But Google and Facebook are not criminals and they are not breaking the law.
How would you compare these two different threats and their threat levels on Average Joes point of view - which of them is more likely to cause some harm. Or is there something else to be more afraid of even more (govermental level hacks/attacks)? There are different problems: problems with security and problems with privacy. Security problems come from criminals who do break the law and who directly try to steal from you with attacks like banking trojans or credit card keyloggers. Blanket surveillance of the internet also affects us all. But comparing these threats to each other is hard.
Thoughts on bitcoin from a security standpoint? Bitcoin is interesting, in many different ways.
I do believe in cryptocurrencies. It might not be Bitcoin that changes the world, but something built on that will.
We see Bitcoin in our line of work all the time. Wallet theft. Ransomware where Bitcoin are used to pay the ransoms. Mining trojans.
However, that's just like blaming cash for being too handy for drug dealers.
Bitcoin is just a tool. Can be used for good or bad.
Favorite debugging tool? I've always had a soft spot for the old DEBUG.EXE that shipped with MS-DOS...
N Yeah.com.
E0100 B0 13 CD 10 68 00 A0 07 31 FF B1 C8 E8 20 00 51.
E0110 B9 40 01 E8 19 00 D8 C3 DF 1C D8 E3 8A 04 DF 1C.
E0120 32 04 24 1F AA E2 EC 59 E2 E2 83 07 10 EB D9 89.
E0130 0C DF 04 D9 C0 DE 07 DE 74 04 D9 FE DE 4C 14 C3.
RCX.
40.
W.
Q
Is this real? Link to www.youtube.com. No, that's not how you break into a system in the real world.
Another timely rebuttal of movie hacking, speaking about the ads for the upcoming Black Hat movie: Link to carbon-dynamics.squarespace.com - this one is written by Dan Tentler.
With the rise of the Internet of Things, what measures can we take to better secure ourselves in regards to home devices (laptops, smart-tvs, etc)? Well, you won't be running an antivirus on your washing machine or toaster, that's for sure.
The real-world attacks against IoT devices are still limited - mostly because the ways of making money by hacking washing machines and so are limited.
As a result, the IoT security solutions aren't really widely available yet. They will be in the future though.
Is it unethical to release viruses that kill viruses? Or would it be hard to tell the good buys from the bad guys (eventually)? The idea of a 'good virus' has been discussed to death already years ago. The consensus is that anything good that could be done with self-replicating code could be done better without the replication.
See Dr. Vesselin Bontchev's seminal paper on this: Link to www.virusbtn.com
I have a dream. Link to i.imgur.com Nice pic...
Linux distributions generally don't need antivirus, but apart from the fact that most malware is written for Windows, why do you think this is? If linux became the popular choice on desktops, do you think it would be as prone to malware as Windows is? How about OS X? Most mobile malware IS written for Linux, since most smartphones run Linux.
So first and foremost, it's a question of market shares.
After that it's a question of attacker skillsets. If the attackers have been writing Windows malware since Windows XP, they aren't likely to stop and switch easily to OS X or Linux unless they have to. And they don't have to.
What's your take on security researchers withholding their findings regarding state sponsored malware for 'global security concerns'? Kaspersky and Symantec both withheld information about Reign malware. Is this common? Is it ethical? Why are security companies beholden to the intelligence community and not the people who pay them for their services and advice? How can this conflict of interest be resolved while retaining independence and integrity? Nobody was withholding detection. Everybody detected all Regin-related files they had, and protected the end users. Which one would you rather have us to do? Sign an NDA, get the samples and protect our users? Or not sign the NDA and not protect our users.
Many people I talk to about this privacy thingy say "I have nothing to hide, so why bother". Do you think this will ever change, that people would start caring about this? Have you already seen the general opinion sifting...? Some people will always say this. But they are always the people who haven't really thought it through.
If you have nothing to hide, you can't keep a secret. If you have nothing to hide, show me your search history. If you have nothing to hide, give me your password. If you have nothing to hide, I can't trust you.
At this point, what do you personally feel about security and mass surveillance in a post-Snowden world where still not much has changed? I've learned that many, many people just don't care. Which is depressing.
If you don't care about mass surveillance for your own case, how about caring on behalf of the future generations?
Last updated: 2014-12-06 14:37 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

Bitcoin Typer 2.5 - A Free Bitcoin Faucet Bot Bitcoin Tpyer - YouTube New Bitcoin Auto Tool How to get free Bitcoin with BTCClicks bot Freebitco.in iMacros bot with 2captcha

Free freebitcoin bot download software at UpdateStar - Get Free Bitcoins from Freebitco.in with windows bot.Get Bitcoins for free with single click!This windows application bot will help you to get Bitcoins for free from freebitco.in.With this bot you can easily grab free Bitcoins without a … A giant botnet is forcing Windows servers to mine cryptocurrency. The Smominru miner has infected at least half a million machines -- mostly consisting of Windows servers -- and spreads using the ... There have been several reports this week detailing how security firm Symantec took down a large portion of a bitcoin mining botnet called ZeroAccess. What few, if any, mention is that the bitcoin ... Symantec takes on one of largest botnets in history. The security firm is confronting the ZeroAccess botnet, which is likely to have more than 1.9 million slave computers at its disposal for click ... Symantec seizes part of massive peer-to-peer botnet ZeroAccess. Researchers freed 500,000 infected computers from operators of the ZeroAccess botnet . Lucian Constantin (IDG News Service) 30 September, 2013 21:48. share; print email Comments. The cybercriminals behind ZeroAccess, one of the largest botnets in existence, have lost access to more than a quarter of the infected machines they ...

[index] [37257] [37604] [39956] [26065] [15945] [32784] [20755] [30918] [48189] [14567]

Bitcoin Typer 2.5 - A Free Bitcoin Faucet Bot

Category People & Blogs; Song Don't Stop (The Brainmind Remix) Artist Mafia Mike; Album Annex Trax Vol. 26; Licensed to YouTube by NATOarts (on behalf of Track One Recordings); BMI - Broadcast ... Double Your Bitcoins Instantly! Bitcoin Trading Bot 2016! [Legit, Real, Working Method] Bitcoin Trading Bot 2016! [Legit, Real, Working Method] - Duration: 9:21. Today's episode talks about North Korea allegedly stealing Bitcoin, a new ransomware discovery, and a report from Symantec showing an increase in yearly cyber attacks. Thanks for watching and don ... Copy & Paste Videos and Earn $100 to $300 Per Day - FULL TUTORIAL (Make Money Online) - Duration: 22:51. BIG MARK Recommended for you Bitcoin Trading Bot - Bitcointradingbot - Cryptocurrencybot Project X Bitcointradingbot was founded in 2017 by Lawyer Marian Tudor in America. Following the developments in crypto currency markets ...

#