What would we do without the online encyclopedia Wikipedia? Of course, the information will be extracted once, but with this resource life has become easier. 2012 was rich in various events, but the most interesting users of encyclopedia shown to be from social network Facebook, a young British...
The most popular Wikipedia articles of 2012
LetsByteCode Headlines
The most popular Wikipedia articles of 2012
Smartphone Galaxy S IV: In April and will support S Pen?
On the Internet, a new batch of rumors about one of the most anticipated smartphones next year, Samsung Galaxy S IV. If we believe the resource PhoneArena, the phone will not wait until April. This could mean that the release will held in February-March. Another interesting point:...
Smartphone Galaxy S IV: In April and will support S Pen?
Rumors: Apple is developing "smart watches"
According to unconfirmed information, the company Apple is developing “smart watches” that can communicate with other devices of “apple” via Bluetooth. According to Chinese sources, the device is equipped with a 1.5 “display, created by technology PMOLED. It is...
Rumors: Apple is developing "smart watches"
Trend Micro warns of new Java-backdoor
Trend Micro today announced the discovery of a new class of malicious backdoor aimed at infecting HTTP-server implemented to work with Java. The backdoor allows attackers to execute malicious commands directed to the system in which the server is running. Threat is known as BKDR_JAVAWAR.JG,...
Trend Micro warns of new Java-backdoor
Zero-day vulnerability in IE
On December 21 unknown hackers successfully hacked the website of the Council on Foreign Relations, United States (http://www.cfr.org) and posted on the site exploiting a previously unknown vulnerability in Microsoft Internet Explorer. First of incident was spoken about only on December 27,...
Zero-day vulnerability in IE
2013: Vulnerabilities in the software will be the main target for cybercriminals
PandaLabs has today published a review of trends in computer security that are expected to prevail in 2013. Vulnerabilities in the software will be the main target for cybercriminals in the coming year. Luis Corrons, Technical Director of PandaLabs, said: “Without a doubt, this is the...
2013: Vulnerabilities in the software will be the main target for cybercriminals
Glowing Keyboard SVEN Comfort 7200 EL Nightcap
SVEN SVEN Comfort 7200 EL is equipped with a light-blue backlit keys on the entire surface. According to the manufacturer, this solution is optimal to work at night. If the work is delayed long after midnight which emight make the keyboard difficult to work with because of lack of light, so as...
Glowing Keyboard SVEN Comfort 7200 EL Nightcap
POS-terminal network at Restaurant Depot hacked again
Hackers hacked the POS-terminals of Restaurant Depot network and gained access to credit card database of its customers. Hackers again broke into the POS-terminals in New York wholesale trade network Restaurant Depot. Attackers managed to steal data of debit and credit cards of customers, which...
POS-terminal network at Restaurant Depot hacked again
Dr.Web: New Trojan steals passwords from applications
“Doctor Web” fixed network mass mailing through which attackers infect a user’s computer with a Trojan that can steal passwords from many applications. Experts report that users have started to receive letters from malicious trojan from 26 to 27 December. The message contains...
Dr.Web: New Trojan steals passwords from applications
In 2012 Google has removed 51 million references from SERPs
The largest number of requests received in the current year are from RIAA. Copyright owners often turn to the major search companies, demanding search results to be removed from searchs. And Google is no exception. According to TorrentFreak, in 2012, the Internet giant has removed more than 51...
In 2012 Google has removed 51 million references from SERPs
Symantec has discovered a new Trojan-extortionist
Virus blocking startup of the operating system on the victim’s computer. Symantec has detected a new Trojan Online extortionists, which blocks the computers of its victims. Computers are infected in a number of ways, particularly when the user visits malicious sites, passing over...
Symantec has discovered a new Trojan-extortionist
Next Windows will have a new kernel and will get a new interface
Experts believe that the operating system is likely to be a large-scale upgrade to Windows 8 and not a separate product. According to Neowin referring ostensibly to one of the staff of Microsoft, unofficial data has spread over the internet about a new version of the operating system called...
Next Windows will have a new kernel and will get a new interface
New malware is stealing credit card information from POS-terminals
Experts at Seculert found specialized malware that steals details of bank cards from sales terminals under Windows. The malware, named Dexter, is introduced into the system process iexplore.exe, providing it with a restart when disconnected by hand and prepare a list of active processes, each...
New malware is stealing credit card information from POS-terminals
Russian developers hack encryption of BitLocker, PGP and TrueCrypt
Designed by experts product called Elcomsoft Forensic Disk Decryptor allows unprotect encryption instantly. Specialist company Elcomsoft managed to crack the encryption of BitLocker, PGP and TrueCrypt. All the information is stored in encrypted volumes of data can be analyzed by forensic...
Russian developers hack encryption of BitLocker, PGP and TrueCrypt
Hollywood film company employees convicted of piracy
Staff of Hollywood studios found using torrents at work to download pirated copies of movies, games, and other materials. This was December 25 edition reported by TorrentFreak. The analysis was performed using the service ScanEye, showing downloading any materials produced from a particular...
Hollywood film company employees convicted of piracy
Hacking Gmail account is worth $8000
Attacker tricked accountant to transfer money to bank account. Earlier this year, FBI officially announced the breaking of personal and corporate e-mail addresses for fraudulent transactions. From the publisher Latimes, a resident of Lake Arrowhead, California, Bernie Williams, apparently did...
Hacking Gmail account is worth $8000
India is developing a new operating system for the protection of its cyberspace
Experts began the development of an operating system to become less dependent on foreign operating systems. Staff members of DRDO – Defence Research and Development Organization began to develop their own operating system to create a safer working environment in cyberspace. As of now...
India is developing a new operating system for the protection of its cyberspace
Iran suffered another attack by Stuxnet
As informed by AFP referring to a semi-official news agency in Iran another cyber attack using worm Stuxnet was found. According to the journalist, the victim of the hackers is an industry in the south of the state. Today, Iran’s student news agency (Iranian Students’ News Agency,...
Iran suffered another attack by Stuxnet
China deprives Internet users the right to anonymity
Residents of the state will be required to use real names when registering with Internet providers. China would force people to use their real names when registering network providers. Recall that such a policy is already in use with users of microblogging services. Such government actions have...
China deprives Internet users the right to anonymity
Dual-core smartphones teXet TM-5277 and TM-4577 HD-display
The company Alkotel presented their most powerful model in the line of smartphones – teXet TM-5277 and TM-4577. They are equipped with dual-core processors, IPS-display with HD-resolution 5.2 inch and 4.5 inches, respectively, and also supports two SIM-cards in the standby...
Dual-core smartphones teXet TM-5277 and TM-4577 HD-display
NSA carries out secret pentest on SCADA systems
In the press there is information about a secret project Perfect Citizen, held by U.S. National Security Agency. It turns out, the NSA for months covertly pentested computer systems SCADA, which are used to control critical infrastructure, including power networks, gas pipelines, water supply,...
NSA carries out secret pentest on SCADA systems
Google began to track purchases in offline stores
Google Inc. has announced ( on the site of the subsidiary Doubleclick ) the development of new software interfaces Conversions API , which will allow advertisers to combine online and offline methods to monitor the users / customers, which means that the introduction of more advanced and...
Google began to track purchases in offline stores
Researchers: The level of threats to mobile devices continues to grow
Analyzing incidents in 2012, researchers have concluded that the main problem of mobile security is excessively large number of conflicting platforms. Experts from the field of information security from the international organization CIO Council conducted a large-scale analysis of mobile...
Researchers: The level of threats to mobile devices continues to grow
Kindle Fire tablets are infected
“Kaspersky Lab” warns users of Kindle Fire tablets with malware in Amazon App Store. Researcher from Kaspersky Lab Roel Schouwenberg reported the detection of malicious programs in Amazon app store, which allows unauthorized users to get money for an “empty”...
Kindle Fire tablets are infected
VMware closes a serious vulnerability in VMware View
VMware this week released a patch for the product VMware View, eliminating critically dangerous vulnerability that could allow unauthorized users to gain access to the target file system. “VMware View contains a critical vulnerability when working with directories, allow unauthorized users...
VMware closes a serious vulnerability in VMware View
Issue of protecting SCADA-systems in 2013 will be more relevant
According to experts, in the coming year hackers will actively search for vulnerabilities in SCADA-systems and produce solutions for automatic operation. As reported by Computerworld CEO Dale Peterson, in the upcoming year protection of SCADA-systems from threats will only increase its...
Issue of protecting SCADA-systems in 2013 will be more relevant
Google offers free QuickOffice for Google Apps users
Google has released a free app for iPad, which allows business users to edit their company documents using Microsoft Office. New offer by Google is free a Quickoffice iPad App for the tablet. Google bought QuickOffice manufacturer in June in a campaign to develop its own cloud product offerings...
Google offers free QuickOffice for Google Apps users
Symantec warns of another banking malware
Anti-virus company Symantec on Friday issued a warning about the discovery of a new malicious code, aimed at the U.S. banking environment and customers of U.S. banks. According to the classification Symantec new Trojan called Trojan.Stabuniq, its main task is to collect financial data from the...
Symantec warns of another banking malware
Archos - budget tablet Titanium HD with Retina-screen
Archos, known for producing low-cost tablets, has announced Titanium HD model with a 9.7-inch IPS-screen, which has a resolution of 2048 × 1536 pixels. Running on Android 4.1 and is based on two-core processor, operating at a frequency of 1.6 GHz. Archos Titanium HD is equipped with a graphics...
Archos - budget tablet Titanium HD with Retina-screen
Closed wireless headphones Pioneer SE-DRF41M premium
Pioneer introduces the new closed wireless headphones SE-DRF41M, providing digital quality and clarity. Model transmits audio from your PC, TV or sound system in the 2.4 GHz band. Thanks to SE-DRF41M can listen to your favorite music by being in any corner of your house. Headphones have a...
Closed wireless headphones Pioneer SE-DRF41M premium
MSI introduced tablet-ultrabook Slidebook S20
Micro-Star International presented an interesting tablet – ultrabook Slidebook S20, which is already in summer exhibition Computex 2012. He has a fairly good filling and running Windows 8. New product is positioned as the ideal solution for work and leisure. Slidebook S20 can be used as a...
MSI introduced tablet-ultrabook Slidebook S20
Tajikistan will block 131 sites, including VKontakte and Twitter
RIA Novosti reported, since Friday evening communications service under the Government of Tajikistan has given an order to ISPs about blocking 131 websites, among which are popular social networks as VKontakte , Classmates and Twitter. According to RIA Novosti, the majority of the rest sentenced...
Tajikistan will block 131 sites, including VKontakte and Twitter
Facebook - Add photos using drag and drop
In addition to the changes in the privacy policy, making it possible to ensure the delivery of personal messages for a small fee, the world’s largest social network Facebook is noted by a number of interesting innovations. In particular, it adds the ability to upload and share multiple...
Facebook - Add photos using drag and drop
Oracle showed better than expected quarterly results
Oracle Corporation today reported a profit for the second fiscal quarter, was higher than analysts’ forecasts due to increased demand for internet services in Oracle’s business environment. Earlier the head of Oracle CEO Larry Ellison announced a strategy, according to which it...
Oracle showed better than expected quarterly results
Google is preparing a "killer" iPhone - Ceramic X Phone
It seems, Google bought Motorola Mobility not just for patents. As reported by The Wall Street Journal, in 2013, the Internet giant plans to release a smartphone designed to compete with the iPhone and the top-end models of Samsung Galaxy. Inside Google the project is known as X Phone, but at...
Google is preparing a "killer" iPhone - Ceramic X Phone
Samsung launches 14-nm test processors with FinFET
Samsung Electronics has presented its first 14-nm test chip FinFET. These chips are the second mass-market chips after Intel, received their own implementation of a three-dimensional “sandwich” structure-based 3D-transistors, these transistors Tri-Gate, designed for the new Intel...
Samsung launches 14-nm test processors with FinFET
Instagram promised not to sell custom photos
Instagram co-founder Kevin Systrom denied the possibility of selling custom images without the knowledge of their owners. “There is a certain misunderstanding” – he wrote in his blog. Systrom also said that a “misunderstanding” has caused the outflow of people who...
Instagram promised not to sell custom photos
Experts predict the first murder of the Internet in 2014
Experts of the company Internet Identity (IID) prepared a report on cyberthreats, which may become relevant in the next few years. It is noted that an increasing number of electronic and other devices to access the network which also include both medical devices and some of which are implanted ,...
Experts predict the first murder of the Internet in 2014
Facebook is testing a paid service to send messages
Social network Facebook has begun testing an experimental feature of paid sending of private messages. Their recipients will be people who are not in the friends list of sender. The experiment was conducted on a limited number of U.S. social network users. The cost of sending messages is not...
Facebook is testing a paid service to send messages
Symantec: Cyber ??Threats Forecast for 2013
Symantec Corporation has published a forecast of trends in the world of cyber security in 2013. According to experts of the corporation in 2013, attacks will become more aggressive and will be not only wage espionage, but also to demonstrate the power of attackers. In addition, the number of...
Symantec: Cyber ??Threats Forecast for 2013
Microsoft re-released a patch for PowerPoint
The vulnerability could allow an attacker to execute arbitrary code on the system. Microsoft re-released the patch, which was intended to remedy a serious security flaw in the application font OpenType. Note that after the release of the original version of the patch, the font was unreadable for...
Microsoft re-released a patch for PowerPoint
Assange threatens to publish a million new scandalous documents
In the near future the WikiLeaks will make documents public, “the contents of which will affect all countries in the world.” According to news agency Agence France-Presse, the founder of WikiLeaks Julian Assange said that in the near future on the portal will be a list of documents...
Assange threatens to publish a million new scandalous documents
Sudoku fans have been targeted by hackers
According to Sophos, scammers infect users’ computers with malware which steals sensitive information. Researchers at Sophos found that hackers have infected computers with malware for an amateur game of Sudoku. The virus steals users’ important information. Potential victims...
Sudoku fans have been targeted by hackers
DESTEN CyberBook T357 tablet with a high degree of protection
DESTEN company announced the Tablet PC which is fully protected under the brand CyberBook – Model T357. T357 is protected by the U.S. military standard MIL-STD 810G vibration, shock and drop resistance, the 152 cm tablet is protected from dust and moisture according to IP65, operating...
DESTEN CyberBook T357 tablet with a high degree of protection
VLC media player 2.0.5: Streaming Player
VLC media player is convenient to use the networks to view the media stream. This tool can not only play video transmitted over the internet, but also relay stream data. Program supports UDP Unicast, UDP Multicast (MPEG-TS), HTTP, RTP / RTSP, MMS. The program is more focused on viewing video...
VLC media player 2.0.5: Streaming Player
W3C published full specification for HTML5
Organization World Wide Web Consortium (W3C) has recently published a new version of the full specifications of HTML5. This means that the development of the language is not shaky but appears to be moving toward completion since 2004. It also published the final specifications for the so-called...
W3C published full specification for HTML5
63% of pirated software in Southeast Asia are infected with viruses
According to Microsoft , 63% of pirated software is sold in South-East Asia, and pre-installed on computers that contains malware. Division of the company that deals with computer security, bought 118 samples of disks with pirated software and subjected to analysis for the presence of malicious...
63% of pirated software in Southeast Asia are infected with viruses
Samsung: Our devices do have a vulnerability
Representatives of Samsung Electronics said that the vulnerability fix will be released soon. According Androidcentral, the company Samsung Electronics recognized the flaws in its mobile devices running on chips Exynos. “We are aware of the vulnerability and plan to release a software...
Samsung: Our devices do have a vulnerability
China has blocked encrypted connection
Technology for detecting encrypted connection used to block VPN-connections. Renowned expert in the field of information security, Bruce Schneier published in his blog about the Great Chinese Firewall has recently been capable of detecting and blocking encrypted connection. “A number of...
China has blocked encrypted connection
Dr. Web: A new trojan blocks access to web-sites
Virus blocks access to Internet resources while forcing victims to make a paid subscription to a variety of resources. Dr.Web anti-virus company reported the discovery of a new virus from the family of Trojans, which specializes in blocking access to various Internet sites. Trojan called...
Dr. Web: A new trojan blocks access to web-sites
Windows 8: The main disappointment of the year
Experts of technological institutions consider the new version of the Windows operating system failure. Publication CIO Journal decided to conduct a survey of users about the new operating system Windows 8, in order to find out whether they are satisfied with the innovative edition. According...
Windows 8: The main disappointment of the year
Amazon will release its own smartphone in the middle of 2013
Apparently, the desire of IT-giants to produce mobile devices under their own brand has become a tradition in the modern industry. For example, “good company” Google has already indicated “google phone”. In addition, for a long time there are rumors about the preparation...
Amazon will release its own smartphone in the middle of 2013
Twitter has reached 200 million active users per month
Twitter announced that it has reached the mark of 200 million active users per month. It is noteworthy that in July 2012 the figure stood at 170 million with the total number of registered users, 500 million, which demonstrates the growing statistics on user activity resource – for...
Twitter has reached 200 million active users per month
Best Tablets of 2012
Tablet PC – a relatively new product. This segment appeared only a few years ago, but today without this gadget one cannot imagine his life. And it all began, as usual, with a product of Apple, in this case the iPad and the others. Choice of operating system largely determines the choice...
Best Tablets of 2012
Twitter launches the option of downloading message archive
Remember the joke about downloading “the whole internet”, common in the early days of the World Wide Web? Laugh laugh, but some Twitter users have had the opportunity to do this trick, though, of course, only to archive their messages in this popular microblogging site. As reported...
Twitter launches the option of downloading message archive
Hack into mailboxes fifty Hollywood celebrities
The federal court in Los Angeles on Monday sentenced a resident of the State of Florida a 35-year-old Christopher Chaney to ten years in prison for hacking into a series of e-mail addresses of Hollywood celebrities, and theft of personal photos and their dissemination. In the period from 2010...
Hack into mailboxes fifty Hollywood celebrities
Experts: Hackers broke into the 14 thousand Indian websites in 2012
Companies that host their sites on the Indian hosts, should pay more attention to information security. In 2012, hackers hacked more than 14 thousand Indian sites. reports Help Net Security with reference to the principal analyst for security company Imperva, Steiman Barry (Barry Shteiman)....
Experts: Hackers broke into the 14 thousand Indian websites in 2012
Instagram users outraged
Instagram photo hosting service, introduced in paragraph Agreement under which it reserves the commercial rights to sell all photos uploaded by users. In this case, the owner of images will not receive any fees. Changes will take effect from 16 January 2013. From that day, the company will...
Instagram users outraged
Cisco plans to sell Linksys
Cisco Systems, the world’s premier manufacturer of solutions and equipment for computer networks, intends to sell Linksys, known for home wireless routers, reports Bloomberg. Recall that the vendor was purchased by Cisco in 2003 for half a billion dollars, but is unlikely to sell it for...
Cisco plans to sell Linksys
Experts: Many users can continue to use Windows XP after the cessation of its support
Analysts believe that if Microsoft will not release an update for Windows XP, and users will continue to work with it, it can lead to a global crisis in the field of technology. Many experts doubt that Microsoft will stop supporting the operating system Windows XP. Recall that this time...
Experts: Many users can continue to use Windows XP after the cessation of its support
Indian government has launched a "five-year plan" to update cybersecurity
The authorities intend to establish channels of communication agencies of critical infrastructure in real-time. The Government of India announced the launch of a five-year plan to improve security of critical infrastructure facilities throughout the country. According to the agency (National...
Indian government has launched a "five-year plan" to update cybersecurity
Creator of fake antivirus sentenced to prison
Swedish creator of the fake anti-virus program was sentenced to two years in prison for participating in a number of cyber crimes, because of which fraud victims lost about $71 million. Crime was that developers offer users to buy fake antivirus software, thereby affecting computers. It is...
Creator of fake antivirus sentenced to prison
Microsoft Windows 8 shows error 0xC004C4AA
When you try to illegally obtain a legitimate version of Microsoft Windows 8 shows error 0xC004C4AA. Microsoft has removed the opportunity to get a legitimate version of Windows 8 with false activation through KMS (key management system) and update via Windows Media Center. Recall that this...
Microsoft Windows 8 shows error 0xC004C4AA
Wikileaks found a way to get funding
WikiLeaks payments will be made through a new organization “Fund for press freedom.” The idea of creating the site “Foundation for Press Freedom appeared after WikiLeaks said in Twitter, as a result of blocking its banking operations to the company’s account there are...
Wikileaks found a way to get funding
Wireless and lightweight headphones RAPOO H8060
Looking for an easy and convenient device for home and office, but don’t want to be constrained by lots of wires? Headphones RAPOO H8060 can receive a signal from up to 10 meters from the transmitter, the device will listen to music or watch a movie, not being tied to a particular place....
Wireless and lightweight headphones RAPOO H8060
Apple's iPhone violates patent rights of Sony and Nokia
A jury of the Federal Court of Delaware found that iPhone 3G, 3GS and 4 illegally use patented technology. Federal grand jury in Delaware, USA, found that Apple iPhone violates three patents owned by patent-holding MobileMedia Ideas, formed the company Sony, Nokia, and MPEG LA. The jury’s...
Apple's iPhone violates patent rights of Sony and Nokia
Navigator Prology iMap-7000Tab runs on Android
In winter 2012 the brand Prology introduced new navigator Prology iMap-7000Tab. This model will be suitable for both traditional navigation, and entertainment, in fact, combining the power of a navigator and a tablet based on Android. Navigator Prology iMap-7000Tab 7 inch (178 mm) can be used...
Navigator Prology iMap-7000Tab runs on Android
Hackers conduct DDoS-attacks on U.S. banks
Attacks carried out by a botnet Brobot and fake DNS-servers. According to the company Arbor Networks, for last week observed significant increase in the level of activity of hackers who conduct DDoS-attacks on computer systems of U.S. banks. The intention to carry out attacks by hackers of Izz...
Hackers conduct DDoS-attacks on U.S. banks
McAfee: Hackers are planning a large-scale attack on the United States under the name "Project Blitzkrieg"
According to experts, cyber criminals target at least 30 major U.S. banks. Researchers at antivirus company McAfee have found that cybercriminals are preparing a number of large-scale attacks against the United States, which would be implemented in the spring of next year. The project named...
McAfee: Hackers are planning a large-scale attack on the United States under the name "Project Blitzkrieg"
Leaked: UN report on climate
The document contains information that can “break” the stereotype about man-made climate change. A draft report of the Intergovernmental Panel on Climate Change (IPCC) is freely available on the Internet, which is slated for release in 2014, in which some analysts have considered...
Leaked: UN report on climate
USPTO has recognized a key Apple patent invalid
The verdict of the jury, have recognized Samsung in violation of a number of patents Apple, in connection with which it will have to reimburse the American company damages of more than $ 1 billion, is increasingly questioned, since it is the second patent as those identified in this lawsuit,...
USPTO has recognized a key Apple patent invalid
Update WP8 Apollo + will also support GIF and WAV
Reportedly, Microsoft is preparing a release of updates for smartphones running Windows Phone 8, which could be code named Apollo + or Portico. Previous rumors indicated that the version of the OS can run a VPN (which is important for corporate users), fixes for Wi-Fi connections, and various...
Update WP8 Apollo + will also support GIF and WAV
AnyGlove liquid to use on touchscreen with gloves
For the owners of touchscreen phones there is a good reason not to love the cold season, capacitive touch screens on most cell phones accept the team, give only bare hands and a special stylus. This means that every time we have to remove the gloves and once again freeze our hands, because the...
AnyGlove liquid to use on touchscreen with gloves
Microsoft did not pay UK tax on profits of $ 2.7 billion
Software giant translated online-payments in Ireland and Luxembourg, where the tax rate is much lower. Microsoft did not pay taxes to the British Government from its online-sales of its new operating system Windows 8 and other developments, which is £ 1,7 billion (about $ 2.7 billion). In...
Microsoft did not pay UK tax on profits of $ 2.7 billion
Doctor Web: The site of the Dalai Lama spreads Trojans
The company “Doctor Web” extended the few Trojans with hackers hacked websites. In particular, malicious software downloaded from the official online resource of the Dalai Lama. Puts at risk not only for users of Windows but also Mac OS X. A few days ago, users were informed by...
Doctor Web: The site of the Dalai Lama spreads Trojans
Chobi Cam Pro 2: The smallest camera with Night Vision
It would seem that not so long ago night vision associated with the common man with the bulky military equipment, it is kind of unsightly glasses and cameras. These devices are not just too big and ugly, they weigh a lot more, and cost as a small car. Times change and technology changes with...
Chobi Cam Pro 2: The smallest camera with Night Vision
Driver Magician 3.71: backup drivers
Updated easy to use program for backing up drivers and restore them in Windows. When you reinstall the system usually takes a long time to install a driver for a driver with a different drive. If you have a Driver Magician, you will only need to specify the correct driver, and backs them up. No...
Driver Magician 3.71: backup drivers
Firmware for Plextor M5 Pro increases reading speed up to 100,000 IOPS
Released in early August, a series of 2.5 “solid state drives Plextor M5 Pro professional class received a firmware update that improved work multicore controller Marvell 88SS9187 Monet and speed random read from 94 thousand to 100 thousand operations of input-output operations per second...
Firmware for Plextor M5 Pro increases reading speed up to 100,000 IOPS
Hackers attacked the UN conference in Dubai
Attacks directed against the decisions of the conference, which can tighten Internet censorship. On Monday, December 3, in Dubai, UAE, hosts International Conference on Telecommunications and digital technology, in which, under the auspices of an international organization is attended by...
Hackers attacked the UN conference in Dubai
December issue patches for Windows will contain seven bulletins
According to preliminary reports, Microsoft will release as many as five “critical” bulletins for their products. According to the post of developers Microsoft, December 11 this year, the software giant will release seven security bulletins containing fixes for vulnerabilities in...
December issue patches for Windows will contain seven bulletins
8-character password can be cracked in Windows within 5.5 hours
Security researcher shows how passwords are unreliable today. Security researcher Jeremy Gosney, also known as epixoip, demonstrated how to quickly crack even a complex password, if it is protected with encryption methods which are unreliable. At the conference Passwords ^ 12 in Oslo, Norway,...
8-character password can be cracked in Windows within 5.5 hours
Google Chrome maintains its leading position in the market of Internet browsers
According to the company StatCounter, the most popular browser today is Google Chrome. Analyst firm StatCounter gives evidence that the share of Google Chrome on the market of browsers for the last month has increased from 34.77% to 35.72%. Indicators browser Opera, on the contrary, have...
Google Chrome maintains its leading position in the market of Internet browsers
Switzerland notified the CIA and MI6 of a serious data leakage
Employee in the IT-department for several years carried out the building of NDB sensitive data on a personal hard drive. According to Reuters, the Swiss authorities have warned the intelligence in the U.S. and the UK of serious data breaches, which were stolen by the former member of the...
Switzerland notified the CIA and MI6 of a serious data leakage
Publication of messages in another tweet via SMS fraud
Security expert Jonathan Rudenberg to disclose information about the vulnerability in Facebook, Twitter, Venmo payment system and other services which are linked to the mobile phone number. He has discovered a vulnerability in August 2012 – and notified security departments of the...
Publication of messages in another tweet via SMS fraud
Opera 12.11 vulnerability when opening a GIF-file
In the browser Opera 12.11 there is vulnerable Write AV , which is shown when you open a GIF-file which crashes the browser. Because of incorrect exception handling in Opera when opening a specially crafted GIF-file there is heap corruption. Theoretically, this vulnerability in the browser can...
Opera 12.11 vulnerability when opening a GIF-file
Backdoor to FOREX-traders
Java-applet on a popular Web site Trading Forex (tradingforex.com) used to install backdoors on computers of traders. The malicious code is detected by antivirus company Websense . Experts can not say specifically whether the attackers chose this site to distribute malware, or is it one of many...
Backdoor to FOREX-traders
Spyware Crisis backs up your SSID and RSSI
Symantec has published another article with the new results of the analysis of unique spy program called Crisis. This program is found in July 2012 , and it immediately attracted the attention of anti-virus experts. Crisis affects users of Windows and Mac OS through Java-applet, and the devices...
Spyware Crisis backs up your SSID and RSSI
Malware Shylock determines Remote Desktop Protocol
Malware authors have long since learned to determine the host environment to conceal or deceive the enemy. Well-written malware will not show any activity when running in a virtual machine, or will the so-called false activity . The idea is to make it difficult to reverse engineer the program...
Malware Shylock determines Remote Desktop Protocol
A set of exploits for MySQL
More tools exploit unpatched vulnerabilities in the database management system. In Full Disclosure published a number of exploits for vulnerabilities in the database management system (DBMS) MySQL versions 5.1.x and 5.5.x. Among other things, an anonymous user posted under a pseudonym Kingcope...
A set of exploits for MySQL
September 11 attacks, this time in cyberspace
According to the former head of the U.S. intelligence community, terrorists can cause damage to the banking system and the country’s critical infrastructure. The former head of the National Security Agency U.S. John McConnell said that the state could soon be at a threat of repetition...
September 11 attacks, this time in cyberspace
The IAEA denies theft of sensitive data by breach
According to experts, the hackers could steal secret dossier UN accusations Tehran to develop nuclear weapons. Leaders of the international organization IAEA denies reports that as a result of hacking a computer network department at the beginning of this week, hackers stole sensitive data or...
The IAEA denies theft of sensitive data by breach
DDoS-attacks are not profitable for cybercriminals
According to researchers at Group-IB, hackers are increasingly turning to more profitable types of fraud. According to the experts of Group-IB, DDoS-attacks as a form of criminal earnings is losing its popularity among hackers for a more profitable bank fraud. This was during the 2012...
DDoS-attacks are not profitable for cybercriminals
Julian Assange: Facebook - Dream intelligence
According to the founder of WikiLeaks, a social network is a source of information. Founder of WikiLeaks Julian Assange called the social network Facebook a information resource, which previously any intelligence of any country could only dream of. According to Assange, accounts in social...
Julian Assange: Facebook - Dream intelligence
Austrian arrested for supporting Tor network
The accused is charged with distribution of child pornography. Residents of Austria, William Weber faces up to 10 years in prison for the production and distribution of child pornography. himself accused claims that he was not involved in the crimes – guilty of all but one of its computers...
Austrian arrested for supporting Tor network