LetsByteCode Headlines

The most popular Wikipedia articles of 2012

What would we do without the online encyclopedia Wikipedia? Of course, the information will be extracted once, but with this resource life has become easier. 2012 was rich in various events, but the most interesting users of encyclopedia shown to be from social network Facebook, a young British...
The most popular Wikipedia articles of 2012

Smartphone Galaxy S IV: In April and will support S Pen?

On the Internet, a new batch of rumors about one of the most anticipated smartphones next year, Samsung Galaxy S IV. If we believe the resource PhoneArena, the phone will not wait until April. This could mean that the release will held in February-March.   Another interesting point:...
Smartphone Galaxy S IV: In April and will support S Pen?

Rumors: Apple is developing "smart watches"

According to unconfirmed information, the company Apple is developing “smart watches” that can communicate with other devices of “apple” via Bluetooth. According to Chinese sources, the device is equipped with a 1.5 “display, created by technology PMOLED. It is...
Rumors: Apple is developing "smart watches"

Trend Micro warns of new Java-backdoor

Trend Micro today announced the discovery of a new class of malicious backdoor aimed at infecting HTTP-server implemented to work with Java. The backdoor allows attackers to execute malicious commands directed to the system in which the server is running. Threat is known as BKDR_JAVAWAR.JG,...
Trend Micro warns of new Java-backdoor

Zero-day vulnerability in IE

On December 21 unknown hackers successfully hacked the website of the Council on Foreign Relations, United States (http://www.cfr.org) and posted on the site exploiting a previously unknown vulnerability in Microsoft Internet Explorer. First of incident was spoken about only on December 27,...
Zero-day vulnerability in IE

2013: Vulnerabilities in the software will be the main target for cybercriminals

PandaLabs has today published a review of trends in computer security that are expected to prevail in 2013. Vulnerabilities in the software will be the main target for cybercriminals in the coming year. Luis Corrons, Technical Director of PandaLabs, said: “Without a doubt, this is the...
2013: Vulnerabilities in the software will be the main target for cybercriminals

Glowing Keyboard SVEN Comfort 7200 EL Nightcap

SVEN SVEN Comfort 7200 EL is equipped with a light-blue backlit keys on the entire surface. According to the manufacturer, this solution is optimal to work at night. If the work is delayed long after midnight which emight make the keyboard difficult to work with because of lack of light, so as...
Glowing Keyboard SVEN Comfort 7200 EL Nightcap

POS-terminal network at Restaurant Depot hacked again

Hackers hacked the POS-terminals of Restaurant Depot network and gained access to credit card database of its customers. Hackers again broke into the POS-terminals in New York wholesale trade network Restaurant Depot. Attackers managed to steal data of debit and credit cards of customers, which...
POS-terminal network at Restaurant Depot hacked again

Dr.Web: New Trojan steals passwords from applications

“Doctor Web” fixed network mass mailing through which attackers infect a user’s computer with a Trojan that can steal passwords from many applications. Experts report that users have started to receive letters from malicious trojan from 26 to 27 December. The message contains...
Dr.Web: New Trojan steals passwords from applications

In 2012 Google has removed 51 million references from SERPs

The largest number of requests received in the current year are from RIAA. Copyright owners often turn to the major search companies, demanding search results to be removed from searchs. And Google is no exception. According to TorrentFreak, in 2012, the Internet giant has removed more than 51...
In 2012 Google has removed 51 million references from SERPs

Symantec has discovered a new Trojan-extortionist

Virus blocking startup of the operating system on the victim’s computer. Symantec has detected a new Trojan Online extortionists, which blocks the computers of its victims. Computers are infected in a number of ways, particularly when the user visits malicious sites, passing over...
Symantec has discovered a new Trojan-extortionist

Next Windows will have a new kernel and will get a new interface

Experts believe that the operating system is likely to be a large-scale upgrade to Windows 8 and not a separate product. According to Neowin referring ostensibly to one of the staff of Microsoft, unofficial data has spread over the internet about a new version of the operating system called...
Next Windows will have a new kernel and will get a new interface

New malware is stealing credit card information from POS-terminals

Experts at Seculert found specialized malware that steals details of bank cards from sales terminals under Windows. The malware, named Dexter, is introduced into the system process iexplore.exe, providing it with a restart when disconnected by hand and prepare a list of active processes, each...
New malware is stealing credit card information from POS-terminals

Trojan Android.DDoS.1.origin is capable of DDoS-attacks on various internet resources and can send text messages to the team attacks, says the antivirus company “Doctor Web”. Once installed on the mobile Android-device, the Trojan creates Android.DDoS.1.origin application icon, with...

Russian developers hack encryption of BitLocker, PGP and TrueCrypt

Designed by experts product called Elcomsoft Forensic Disk Decryptor allows unprotect encryption instantly. Specialist company Elcomsoft managed to crack the encryption of BitLocker, PGP and TrueCrypt. All the information is stored in encrypted volumes of data can be analyzed by forensic...
Russian developers hack encryption of BitLocker, PGP and TrueCrypt

Hollywood film company employees convicted of piracy

Staff of Hollywood studios found using torrents at work to download pirated copies of movies, games, and other materials. This was December 25 edition reported by TorrentFreak. The analysis was performed using the service ScanEye, showing downloading any materials produced from a particular...
Hollywood film company employees convicted of piracy

Hacking Gmail account is worth $8000

Attacker tricked accountant to transfer money to bank account. Earlier this year, FBI officially announced the breaking of personal and corporate e-mail addresses for fraudulent transactions. From the publisher Latimes, a resident of Lake Arrowhead, California, Bernie Williams, apparently did...
Hacking Gmail account is worth $8000

India is developing a new operating system for the protection of its cyberspace

Experts began the development of an operating system to become less dependent on foreign operating systems. Staff members of DRDO – Defence Research and Development Organization began to develop their own operating system to create a safer working environment in cyberspace. As of now...
India is developing a new operating system for the protection of its cyberspace

Iran suffered another attack by Stuxnet

As informed by AFP referring to a semi-official news agency in Iran another cyber attack using worm Stuxnet was found. According to the journalist, the victim of the hackers is an industry in the south of the state. Today, Iran’s student news agency (Iranian Students’ News Agency,...
Iran suffered another attack by Stuxnet

China deprives Internet users the right to anonymity

Residents of the state will be required to use real names when registering with Internet providers. China would force people to use their real names when registering network providers. Recall that such a policy is already in use with users of microblogging services. Such government actions have...
China deprives Internet users the right to anonymity

Dual-core smartphones teXet TM-5277 and TM-4577 HD-display

The company Alkotel presented their most powerful model in the line of smartphones – teXet TM-5277 and TM-4577. They are equipped with dual-core processors, IPS-display with HD-resolution 5.2 inch and 4.5 inches, respectively, and also supports two SIM-cards in the standby...
Dual-core smartphones teXet TM-5277 and TM-4577 HD-display

NSA carries out secret pentest on SCADA systems

In the press there is information about a secret project Perfect Citizen, held by U.S. National Security Agency. It turns out, the NSA for months covertly pentested computer systems SCADA, which are used to control critical infrastructure, including power networks, gas pipelines, water supply,...
NSA carries out secret pentest on SCADA systems

Google began to track purchases in offline stores

Google Inc. has announced ( on the site of the subsidiary Doubleclick ) the development of new software interfaces Conversions API , which will allow advertisers to combine online and offline methods to monitor the users / customers, which means that the introduction of more advanced and...
Google began to track purchases in offline stores

Researchers: The level of threats to mobile devices continues to grow

Analyzing incidents in 2012, researchers have concluded that the main problem of mobile security is excessively large number of conflicting platforms. Experts from the field of information security from the international organization CIO Council conducted a large-scale analysis of mobile...
Researchers: The level of threats to mobile devices continues to grow

Kindle Fire tablets are infected

“Kaspersky Lab” warns users of Kindle Fire tablets with malware in Amazon App Store. Researcher from Kaspersky Lab Roel Schouwenberg reported the detection of malicious programs in Amazon app store, which allows unauthorized users to get money for an “empty”...
Kindle Fire tablets are infected

VMware closes a serious vulnerability in VMware View

VMware this week released a patch for the product VMware View, eliminating critically dangerous vulnerability that could allow unauthorized users to gain access to the target file system. “VMware View contains a critical vulnerability when working with directories, allow unauthorized users...
VMware closes a serious vulnerability in VMware View

Issue of protecting SCADA-systems in 2013 will be more relevant

According to experts, in the coming year hackers will actively search for vulnerabilities in SCADA-systems and produce solutions for automatic operation. As reported by Computerworld CEO Dale Peterson, in the upcoming year protection of SCADA-systems from threats will only increase its...
Issue of protecting SCADA-systems in 2013 will be more relevant

Google offers free QuickOffice for Google Apps users

Google has released a free app for iPad, which allows business users to edit their company documents using Microsoft Office. New offer by Google is free a Quickoffice iPad App for the tablet. Google bought QuickOffice manufacturer in June in a campaign to develop its own cloud product offerings...
Google offers free QuickOffice for Google Apps users

Symantec warns of another banking malware

Anti-virus company Symantec on Friday issued a warning about the discovery of a new malicious code, aimed at the U.S. banking environment and customers of U.S. banks. According to the classification Symantec new Trojan called Trojan.Stabuniq, its main task is to collect financial data from the...
Symantec warns of another banking malware

Archos - budget tablet Titanium HD with Retina-screen

Archos, known for producing low-cost tablets, has announced Titanium HD model with a 9.7-inch IPS-screen, which has a resolution of 2048 × 1536 pixels. Running on Android 4.1 and is based on two-core processor, operating at a frequency of 1.6 GHz. Archos Titanium HD is equipped with a graphics...
Archos - budget tablet Titanium HD with Retina-screen

Closed wireless headphones Pioneer SE-DRF41M premium

Pioneer introduces the new closed wireless headphones SE-DRF41M, providing digital quality and clarity. Model transmits audio from your PC, TV or sound system in the 2.4 GHz band. Thanks to SE-DRF41M can listen to your favorite music by being in any corner of your house. Headphones have a...
Closed wireless headphones Pioneer SE-DRF41M premium

MSI introduced tablet-ultrabook Slidebook S20

Micro-Star International presented an interesting tablet – ultrabook Slidebook S20, which is already in summer exhibition Computex 2012. He has a fairly good filling and running Windows 8. New product is positioned as the ideal solution for work and leisure. Slidebook S20 can be used as a...
MSI introduced tablet-ultrabook Slidebook S20

Tajikistan will block 131 sites, including VKontakte and Twitter

RIA Novosti reported, since Friday evening communications service under the Government of Tajikistan has given an order to ISPs about blocking 131 websites, among which are popular social networks as VKontakte , Classmates and Twitter. According to RIA Novosti, the majority of the rest sentenced...
Tajikistan will block 131 sites, including VKontakte and Twitter

Facebook - Add photos using drag and drop

In addition to the changes in the privacy policy, making it possible to ensure the delivery of personal messages for a small fee, the world’s largest social network Facebook is noted by a number of interesting innovations. In particular, it adds the ability to upload and share multiple...
Facebook - Add photos using drag and drop

Oracle showed better than expected quarterly results

Oracle Corporation today reported a profit for the second fiscal quarter, was higher than analysts’ forecasts due to increased demand for internet services in Oracle’s business environment. Earlier the head of Oracle CEO Larry Ellison announced a strategy, according to which it...
Oracle showed better than expected quarterly results

Google is preparing a "killer" iPhone - Ceramic X Phone

It seems, Google bought Motorola Mobility not just for patents. As reported by The Wall Street Journal, in 2013, the Internet giant plans to release a smartphone designed to compete with the iPhone and the top-end models of Samsung Galaxy. Inside Google the project is known as X Phone, but at...
Google is preparing a "killer" iPhone - Ceramic X Phone

Samsung launches 14-nm test processors with FinFET

Samsung Electronics has presented its first 14-nm test chip FinFET. These chips are the second mass-market chips after Intel, received their own implementation of a three-dimensional “sandwich” structure-based 3D-transistors, these transistors Tri-Gate, designed for the new Intel...
Samsung launches 14-nm test processors with FinFET

Instagram promised not to sell custom photos

Instagram co-founder Kevin Systrom denied the possibility of selling custom images without the knowledge of their owners. “There is a certain misunderstanding” – he wrote in his blog. Systrom also said that a “misunderstanding” has caused the outflow of people who...
Instagram promised not to sell custom photos

Experts predict the first murder of the Internet in 2014

Experts of the company Internet Identity (IID) prepared a report on cyberthreats, which may become relevant in the next few years. It is noted that an increasing number of electronic and other devices to access the network which also include both medical devices and some of which are implanted ,...
Experts predict the first murder of the Internet in 2014

Facebook is testing a paid service to send messages

Social network Facebook has begun testing an experimental feature of paid sending of private messages. Their recipients will be people who are not in the friends list of sender. The experiment was conducted on a limited number of U.S. social network users. The cost of sending messages is not...
Facebook is testing a paid service to send messages

Symantec: Cyber ??Threats Forecast for 2013

Symantec Corporation has published a forecast of trends in the world of cyber security in 2013. According to experts of the corporation in 2013, attacks will become more aggressive and will be not only wage espionage, but also to demonstrate the power of attackers. In addition, the number of...
Symantec: Cyber ??Threats Forecast for 2013

Microsoft re-released a patch for PowerPoint

The vulnerability could allow an attacker to execute arbitrary code on the system. Microsoft re-released the patch, which was intended to remedy a serious security flaw in the application font OpenType. Note that after the release of the original version of the patch, the font was unreadable for...
Microsoft re-released a patch for PowerPoint

Assange threatens to publish a million new scandalous documents

In the near future the WikiLeaks will make documents public, “the contents of which will affect all countries in the world.” According to news agency Agence France-Presse, the founder of WikiLeaks Julian Assange said that in the near future on the portal will be a list of documents...
Assange threatens to publish a million new scandalous documents

Sudoku fans have been targeted by hackers

According to Sophos, scammers infect users’ computers with malware which steals sensitive information. Researchers at Sophos found that hackers have infected computers with malware for an amateur game of Sudoku. The virus steals users’  important information. Potential victims...
Sudoku fans have been targeted by hackers

DESTEN CyberBook T357 tablet with a high degree of protection

DESTEN company announced the Tablet PC which is fully protected under the brand CyberBook – Model T357. T357 is protected by the U.S. military standard MIL-STD 810G vibration, shock and drop resistance, the 152 cm tablet is protected from dust and moisture according to IP65, operating...
DESTEN CyberBook T357 tablet with a high degree of protection

VLC media player 2.0.5: Streaming Player

VLC media player is convenient to use the networks to view the media stream. This tool can not only play video transmitted over the internet, but also relay stream data. Program supports UDP Unicast, UDP Multicast (MPEG-TS), HTTP, RTP / RTSP, MMS. The program is more focused on viewing video...
VLC media player 2.0.5: Streaming Player

W3C published full specification for HTML5

Organization World Wide Web Consortium (W3C) has recently published a new version of the full specifications of HTML5. This means that the development of the language is not shaky but appears to be moving toward completion since 2004. It also published the final specifications for the so-called...
W3C published full specification for HTML5

63% of pirated software in Southeast Asia are infected with viruses

According to Microsoft , 63% of pirated software is sold in South-East Asia, and pre-installed on computers that contains malware. Division of the company that deals with computer security, bought 118 samples of disks with pirated software and subjected to analysis for the presence of malicious...
63% of pirated software in Southeast Asia are infected with viruses

Samsung: Our devices do have a vulnerability

Representatives of Samsung Electronics said that the vulnerability fix will be released soon. According Androidcentral, the company Samsung Electronics recognized the flaws in its mobile devices running on chips Exynos. “We are aware of the vulnerability and plan to release a software...
Samsung: Our devices do have a vulnerability

China has blocked encrypted connection

Technology for detecting encrypted connection used to block VPN-connections. Renowned expert in the field of information security, Bruce Schneier published in his blog about the Great Chinese Firewall has recently been capable of detecting and blocking encrypted connection. “A number of...
China has blocked encrypted connection

Dr. Web: A new trojan blocks access to web-sites

Virus blocks access to Internet resources while forcing victims to make a paid subscription to a variety of resources. Dr.Web anti-virus company reported the discovery of a new virus from the family of Trojans, which specializes in blocking access to various Internet sites. Trojan called...
Dr. Web: A new trojan blocks access to web-sites

Windows 8: The main disappointment of the year

Experts of technological institutions consider the new version of the Windows operating system failure. Publication CIO Journal decided to conduct a survey of users about the new operating system Windows 8, in order to find out whether they are satisfied with the innovative edition. According...
Windows 8: The main disappointment of the year

Amazon will release its own smartphone in the middle of 2013

Apparently, the desire of IT-giants to produce mobile devices under their own brand has become a tradition in the modern industry. For example, “good company” Google has already indicated “google phone”. In addition, for a long time there are rumors about the preparation...
Amazon will release its own smartphone in the middle of 2013

Twitter has reached 200 million active users per month

Twitter announced that it has reached the mark of 200 million active users per month. It is noteworthy that in July 2012 the figure stood at 170 million with the total number of registered users, 500 million, which demonstrates the growing statistics on user activity resource – for...
Twitter has reached 200 million active users per month

Best Tablets of 2012

Tablet PC – a relatively new product. This segment appeared only a few years ago, but today without this gadget one cannot imagine his life. And it all began, as usual, with a product of Apple, in this case the iPad and the others. Choice of operating system largely determines the choice...
Best Tablets of 2012

Twitter launches the option of downloading message archive

Remember the joke about downloading “the whole internet”, common in the early days of the World Wide Web? Laugh laugh, but some Twitter users have had the opportunity to do this trick, though, of course, only to archive their messages in this popular microblogging site. As reported...
Twitter launches the option of downloading message archive

Hack into mailboxes fifty Hollywood celebrities

The federal court in Los Angeles on Monday sentenced a resident of the State of Florida a 35-year-old Christopher Chaney to ten years in prison for hacking into a series of e-mail addresses of Hollywood celebrities, and theft of personal photos and their dissemination. In the period from 2010...
Hack into mailboxes fifty Hollywood celebrities

Experts: Hackers broke into the 14 thousand Indian websites in 2012

Companies that host their sites on the Indian hosts, should pay more attention to information security. In 2012, hackers hacked more than 14 thousand Indian sites. reports Help Net Security with reference to the principal analyst for security company Imperva, Steiman Barry (Barry Shteiman)....
Experts: Hackers broke into the 14 thousand Indian websites in 2012

Instagram users outraged

Instagram photo hosting service, introduced in paragraph Agreement under which it reserves the commercial rights to sell all photos uploaded by users. In this case, the owner of images will not receive any fees. Changes will take effect from 16 January 2013. From that day, the company will...
Instagram users outraged

Cisco plans to sell Linksys

Cisco Systems, the world’s premier manufacturer of solutions and equipment for computer networks, intends to sell Linksys, known for home wireless routers, reports Bloomberg. Recall that the vendor was purchased by Cisco in 2003 for half a billion dollars, but is unlikely to sell it for...
Cisco plans to sell Linksys

Experts: Many users can continue to use Windows XP after the cessation of its support

Analysts believe that if Microsoft will not release an update for Windows XP, and users will continue to work with it, it can lead to a global crisis in the field of technology. Many experts doubt that Microsoft will stop supporting the operating system Windows XP. Recall that this time...
Experts: Many users can continue to use Windows XP after the cessation of its support

Indian government has launched a "five-year plan" to update cybersecurity

The authorities intend to establish channels of communication agencies of critical infrastructure in real-time. The Government of India announced the launch of a five-year plan to improve security of critical infrastructure facilities throughout the country. According to the agency (National...
Indian government has launched a "five-year plan" to update cybersecurity

Creator of fake antivirus sentenced to prison

Swedish creator of the fake anti-virus program was sentenced to two years in prison for participating in a number of cyber crimes, because of which fraud victims lost about $71 million. Crime was that developers offer users to buy fake antivirus software, thereby affecting computers. It is...
Creator of fake antivirus sentenced to prison

Microsoft Windows 8 shows error 0xC004C4AA

When you try to illegally obtain a legitimate version of Microsoft Windows 8 shows error 0xC004C4AA. Microsoft has removed the opportunity to get a legitimate version of Windows 8 with false activation through KMS (key management system) and update via Windows Media Center. Recall that this...
Microsoft Windows 8 shows error 0xC004C4AA

Wikileaks found a way to get funding

WikiLeaks payments will be made through a new organization “Fund for press freedom.” The idea of creating the site “Foundation for Press Freedom appeared after WikiLeaks said in Twitter, as a result of blocking its banking operations to the company’s account there are...
Wikileaks found a way to get funding

Wireless and lightweight headphones RAPOO H8060

Looking for an easy and convenient device for home and office, but don’t want to be constrained by lots of wires? Headphones RAPOO H8060 can receive a signal from up to 10 meters from the transmitter, the device will listen to music or watch a movie, not being tied to a particular place....
Wireless and lightweight headphones RAPOO H8060

Apple's iPhone violates patent rights of Sony and Nokia

A jury of the Federal Court of Delaware found that iPhone 3G, 3GS and 4 illegally use patented technology. Federal grand jury in Delaware, USA, found that Apple iPhone violates three patents owned by patent-holding MobileMedia Ideas, formed the company Sony, Nokia, and MPEG LA. The jury’s...
Apple's iPhone violates patent rights of Sony and Nokia

Navigator Prology iMap-7000Tab runs on Android

In winter 2012 the brand Prology introduced new navigator Prology iMap-7000Tab. This model will be suitable for both traditional navigation, and entertainment, in fact, combining the power of a navigator and a tablet based on Android. Navigator Prology iMap-7000Tab 7 inch (178 mm) can be used...
Navigator Prology iMap-7000Tab runs on Android

Hackers conduct DDoS-attacks on U.S. banks

Attacks carried out by a botnet Brobot and fake DNS-servers. According to the company Arbor Networks, for last week observed significant increase in the level of activity of hackers who conduct DDoS-attacks on computer systems of U.S. banks. The intention to carry out attacks by hackers of Izz...
Hackers conduct DDoS-attacks on U.S. banks

McAfee: Hackers are planning a large-scale attack on the United States under the name "Project Blitzkrieg"

According to experts, cyber criminals target at least 30 major U.S. banks. Researchers at antivirus company McAfee have found that cybercriminals are preparing a number of large-scale attacks against the United States, which would be implemented in the spring of next year. The project named...
McAfee: Hackers are planning a large-scale attack on the United States under the name "Project Blitzkrieg"

Leaked: UN report on climate

The document contains information that can “break” the stereotype about man-made climate change. A draft report of the Intergovernmental Panel on Climate Change (IPCC) is freely available on the Internet, which is slated for release in 2014, in which some analysts have considered...
Leaked: UN report on climate

USPTO has recognized a key Apple patent invalid

The verdict of the jury, have recognized Samsung in violation of a number of patents Apple, in connection with which it will have to reimburse the American company damages of more than $ 1 billion, is increasingly questioned, since it is the second patent as those identified in this lawsuit,...
USPTO has recognized a key Apple patent invalid

Update WP8 Apollo + will also support GIF and WAV

Reportedly, Microsoft is preparing a release of updates for smartphones running Windows Phone 8, which could be code named Apollo + or Portico. Previous rumors indicated that the version of the OS can run a VPN (which is important for corporate users), fixes for Wi-Fi connections, and various...
Update WP8 Apollo + will also support GIF and WAV

AnyGlove liquid to use on touchscreen with gloves

For the owners of touchscreen phones there is a good reason not to love the cold season, capacitive touch screens on most cell phones accept the team, give only bare hands and a special stylus. This means that every time we have to remove the gloves and once again freeze our hands, because the...
AnyGlove liquid to use on touchscreen with gloves

Microsoft did not pay UK tax on profits of $ 2.7 billion

Software giant translated online-payments in Ireland and Luxembourg, where the tax rate is much lower. Microsoft did not pay taxes to the British Government from its online-sales of its new operating system Windows 8 and other developments, which is £ 1,7 billion (about $ 2.7 billion). In...
Microsoft did not pay UK tax on profits of $ 2.7 billion

Doctor Web: The site of the Dalai Lama spreads Trojans

The company “Doctor Web” extended the few Trojans with hackers hacked websites. In particular, malicious software downloaded from the official online resource of the Dalai Lama. Puts at risk not only for users of Windows but also Mac OS X. A few days ago, users were informed by...
Doctor Web: The site of the Dalai Lama spreads Trojans

Chobi Cam Pro 2: The smallest camera with Night Vision

It would seem that not so long ago night vision associated with the common man with the bulky military equipment, it is kind of unsightly glasses and cameras. These devices are not just too big and ugly, they weigh a lot more, and cost as a small car. Times change and technology changes with...
Chobi Cam Pro 2: The smallest camera with Night Vision

Driver Magician 3.71: backup drivers

Updated easy to use program for backing up drivers and restore them in Windows. When you reinstall the system usually takes a long time to install a driver for a driver with a different drive. If you have a Driver Magician, you will only need to specify the correct driver, and backs them up. No...
Driver Magician 3.71: backup drivers

Firmware for Plextor M5 Pro increases reading speed up to 100,000 IOPS

Released in early August, a series of 2.5 “solid state drives Plextor M5 Pro professional class received a firmware update that improved work multicore controller Marvell 88SS9187 Monet and speed random read from 94 thousand to 100 thousand operations of input-output operations per second...
Firmware for Plextor M5 Pro increases reading speed up to 100,000 IOPS

Hackers attacked the UN conference in Dubai

Attacks directed against the decisions of the conference, which can tighten Internet censorship. On Monday, December 3, in Dubai, UAE, hosts International Conference on Telecommunications and digital technology, in which, under the auspices of an international organization is attended by...
Hackers attacked the UN conference in Dubai

December issue patches for Windows will contain seven bulletins

According to preliminary reports, Microsoft will release as many as five “critical” bulletins for their products. According to the post of developers Microsoft, December 11 this year, the software giant will release seven security bulletins containing fixes for vulnerabilities in...
December issue patches for Windows will contain seven bulletins

8-character password can be cracked in Windows within 5.5 hours

Security researcher shows how passwords are unreliable today. Security researcher Jeremy Gosney, also known as epixoip, demonstrated how to quickly crack even a complex password, if it is protected with encryption methods which are unreliable. At the conference Passwords ^ 12 in Oslo, Norway,...
8-character password can be cracked in Windows within 5.5 hours

Google Chrome maintains its leading position in the market of Internet browsers

According to the company StatCounter, the most popular browser today is Google Chrome. Analyst firm StatCounter gives evidence that the share of Google Chrome on the market of browsers for the last month has increased from 34.77% to 35.72%. Indicators browser Opera, on the contrary, have...
Google Chrome maintains its leading position in the market of Internet browsers

Switzerland notified the CIA and MI6 of a serious data leakage

Employee in the IT-department for several years carried out the building of NDB sensitive data on a personal hard drive. According to Reuters, the Swiss authorities have warned the intelligence in the U.S. and the UK of serious data breaches, which were stolen by the former member of the...
Switzerland notified the CIA and MI6 of a serious data leakage

Publication of messages in another tweet via SMS fraud

Security expert Jonathan Rudenberg to disclose information about the vulnerability in Facebook, Twitter, Venmo payment system and other services which are linked to the mobile phone number. He has discovered a vulnerability in August 2012 – and notified security departments of the...
Publication of messages in another tweet via SMS fraud

Opera 12.11 vulnerability when opening a GIF-file

In the browser Opera 12.11 there is vulnerable Write AV , which is shown when you open a GIF-file which crashes the browser. Because of incorrect exception handling in Opera when opening a specially crafted GIF-file there is heap corruption. Theoretically, this vulnerability in the browser can...
Opera 12.11 vulnerability when opening a GIF-file

Backdoor to FOREX-traders

Java-applet on a popular Web site Trading Forex (tradingforex.com) used to install backdoors on computers of traders. The malicious code is detected by antivirus company Websense . Experts can not say specifically whether the attackers chose this site to distribute malware, or is it one of many...
Backdoor to FOREX-traders

Spyware Crisis backs up your SSID and RSSI

Symantec has published another article with the new results of the analysis of unique spy program called Crisis. This program is found in July 2012 , and it immediately attracted the attention of anti-virus experts. Crisis affects users of Windows and Mac OS through Java-applet, and the devices...
Spyware Crisis backs up your SSID and RSSI

Malware Shylock determines Remote Desktop Protocol

Malware authors have long since learned to determine the host environment to conceal or deceive the enemy. Well-written malware will not show any activity when running in a virtual machine, or will the so-called false activity . The idea is to make it difficult to reverse engineer the program...
Malware Shylock determines Remote Desktop Protocol

A set of exploits for MySQL

More tools exploit unpatched vulnerabilities in the database management system. In Full Disclosure published a number of exploits for vulnerabilities in the database management system (DBMS) MySQL versions 5.1.x and 5.5.x. Among other things, an anonymous user posted under a pseudonym Kingcope...
A set of exploits for MySQL

September 11 attacks, this time in cyberspace

According to the former head of the U.S. intelligence community, terrorists can cause damage to the banking system and the country’s critical infrastructure. The former head of the National Security Agency U.S. John McConnell said that the state could soon be at a threat of repetition...
September 11 attacks, this time in cyberspace

The IAEA denies theft of sensitive data by breach

According to experts, the hackers could steal secret dossier UN accusations Tehran to develop nuclear weapons. Leaders of the international organization IAEA denies reports that as a result of hacking a computer network department at the beginning of this week, hackers stole sensitive data or...
The IAEA denies theft of sensitive data by breach

DDoS-attacks are not profitable for cybercriminals

According to researchers at Group-IB, hackers are increasingly turning to more profitable types of fraud. According to the experts of Group-IB, DDoS-attacks as a form of criminal earnings is losing its popularity among hackers for a more profitable bank fraud. This was during the 2012...
DDoS-attacks are not profitable for cybercriminals

Julian Assange: Facebook - Dream intelligence

According to the founder of WikiLeaks, a social network is a source of information. Founder of WikiLeaks Julian Assange called the social network Facebook a information resource, which previously any intelligence of any country could only dream of. According to Assange, accounts in social...
Julian Assange: Facebook - Dream intelligence

Austrian arrested for supporting Tor network

The accused is charged with distribution of child pornography. Residents of Austria, William Weber faces up to 10 years in prison for the production and distribution of child pornography. himself accused claims that he was not involved in the crimes – guilty of all but one of its computers...
Austrian arrested for supporting Tor network

Test Post from LetsByteCode

Test Post from LetsByteCode http://letsbytecode.com