.
Witamy, Gość. Zaloguj się lub zarejestruj.
Welcome, Guest. Please login or register.

Ostatnie wiadomości

Strony: [1] 2 3 ... 10
1
Konkursy zewnętrzne (External Giveaways / Contests) / NORDVPN KONKURSY!!!
« Ostatnia wiadomość wysłana przez tregs_beales dnia 25 Wrzesień, 2017, 18:28 »
 :yahoo: :yahoo: :yahoo:

Back-to-school VPN Giveaway! Last date is October 1 so hurry up!!!

Post Credit: AAU @ promo2day.

Competition link

You are not allowed to view links. Register or Login
2
Urządzenia mobilne (Mobile devices) / iOS 11 is causing massive battery drain problems
« Ostatnia wiadomość wysłana przez tregs_beales dnia 25 Wrzesień, 2017, 17:48 »


A study conducted by security research firm Wandera shows that iOS 11 is causing iPhone and iPad batteries to drain faster than ever -- much faster. The difference between iOS 10 and iOS 11 is anything but minor; batteries can drain in half the amount of time following the upgrade.

Wandera's report shows how, on average, an iPhone or iPad running iOS 10 takes 240 minutes of usage to drain the battery from 100 percent to zero. With iOS 11 installed, this number plummets to just 96 minutes -- over twice as fast.

This is not the first we have heard of battery problems with the latest batch of releases from Apple. There have also been complaints about battery issues with the Apple Watch Series 3. Nor is it the first complaint specifically about iOS 11; users have been disappointed to find that toggles in the Control Center do not disable Wi-Fi and Bluetooth in the expected way.
But a battery that drains twice as fast is a serious issue.



Wandera conducted its research by looking at "a subset of 50,000 moderate to heavy iPhone and iPad users." Over three days, battery decay rate was monitored on iOS 10 and iOS 11 devices. We've already mentioned that iOS 10 devices last for 240 minutes and iOS 11 device just 96, minutes, but Wandera provides another way of looking at the figures:

    In other words, the decay rate for iOS 10 is 0.006958 percent per second and for iOS 11 it's 0.01739 percent per second.

The uptake rate for iOS 11 -- just as with any iOS upgrade is high -- but just what is it that is causing the batteries of iPhone and iPads to drain so quickly... and will it cause people to think twice about jumping on the latest version so quickly, or even consider downgrading? Wandera does not recommend taking the downgrade route because of the security implications, but it does have some advice to help maximize battery life:

        The first is limiting the number of apps that can refresh in the background (Settings > General > Background App Refresh) and limiting the number of apps that can access your location in the background (Settings > Privacy > Location Services).
        If that doesn’t make much difference, low power mode may be your best option until Apple pushes out new updates that will hopefully address excessive battery drain.


You are not allowed to view links. Register or Login
3
Two Showtime domains are currently loading and running Coinhive, a JavaScript library that mines Monero using the CPU resources of users visiting Showtime's websites.
The two domains are showtime.com and showtimeanytime.com, the latter being the official URL for the company's online video streaming service.
The main Showtime domain name, sho.com, does not include the Coinhive Monero mining script.



The Monero miner was first discovered 16 hours ago, at around 17:00 ET (22:00 GMT) by a Twitter user named SkensNet.
Hack or experiment?

It is unclear if someone hacked Showtime and included the mining script without the company's knowledge.

Showtime did not respond to a request for comment from Bleeping Computer in time for this article's publication.

It could also be that Showtime is loading the script on purpose, as part of an experiment. This is the most likely explanation, as the setThrottle value is 0.97, meaning the mining script will remain dormant for 97% of the time. A hacker, knowing his intrusion will likely be detected, would usually set a small throttle value and mine as much Monero before getting discovered.

Coinhive has been advertised as a technology that could replace ads by allowing site owners to mine for the Monero cryptocurrency. The technology is very controversial as it uses the site visitor's resources to mine Monero, driving CPU usage through the roof.







The Pirate Bay previously experimented with Coinhive two weeks ago, but user response was mixed, with the majority not liking the idea that The Pirate Bay is hijacking their CPUs and slowing down their PCs.

A recent report has calculated that a site like The Pirate Bay could make around $12,000 per month by mining Monero in the background.

Seeing that The Pirate Bay is ranked #87 in the Alexa traffic ranking, while Showtime is ranked ~#9,500, Showtime's profits would be even smaller.
Coinhive increasingly adopted by malware devs

Coinhive, as a technology, is only ten days old, being officially launched on September 14.

Despite this, Coinhive has been recently adopted by a large number of malware operations, such as malvertisers, adware developers, rogue Chrome extensions, and website hackers, who secretly load the code in a page's background and make money off unsuspecting users.

At least two ad blockers have added support for blocking Coinhive's JS library — AdBlock Plus and AdGuard — and developers have also put together Chrome extensions that terminate anything that looks like Coinhive's mining script — AntiMiner, No Coin, and minerBlock.

 puk w glowe> puk w glowe> zly1> zly1> zly1> angryyyyy angryyyyy angryyyyy angryyyyy smileys-angry- smileys-angry- smileys-angry-

You are not allowed to view links. Register or Login
4


Panda Antivirus Pro-
Cytuj
The new Panda Antivirus Pro provides the easiest-to-use and most intuitive protection for your computer. Install it and forget about viruses, spyware, rootkits, hackers and online fraud. Enjoy real-time protection against the latest malware threats plus security for your Android devices.

More info and contest: You are not allowed to view links. Register or Login

Ów konkurs trwa do 2 października.

Życzę Wam powodzenia. :)
5
During the past year, there has been a surge in data breach reporting regarding Amazon S3 servers left accessible online, and which were exposing private information from all sorts of companies and their customers.

In almost all cases, the reason was that companies, through their staff, left Amazon S3 "buckets" configured to allow "public" access. This means that anyone with a link to the S3 server could access, view, or download its content.

The problem is that most companies believe that if they're the only ones knowing the database's URL, they are safe. This is not true. Attackers can obtain these URLs using MitM attacks on corporate networks, accidental employee leaks, or by brute-forcing domains for hidden URLs.

While this sounds complicated, there are open-source available on GitHub that simplify the discovery of public S3 buckets, putting a large number of companies at risk.
7% of all S3 buckets have unrestricted public access

According to statistics by security firm Skyhigh Networks, 7% of all S3 buckets have unrestricted public access, and 35% are unencrypted, meaning this is an endemic problem of the entire Amazon S3 ecosystem.

These lapses in security best practices have resulted in some serious breaches, from army contractors to big-time US ISPs.

Below is a (most likely incomplete) list of all the major data leaks caused by companies leaving Amazon S3 buckets configured with public access during the past few months.

 smileys-angry- smileys-angry- smileys-angry- smileys-angry-

You are not allowed to view links. Register or Login
6
Android / Popular Android Keyboard App Caught Collecting User Data, Running External Code
« Ostatnia wiadomość wysłana przez tregs_beales dnia 25 Wrzesień, 2017, 17:41 »


GO Keyboard, an insanely popular custom keyboard app for the Android OS, also available on the official Google Play Store, was caught collecting user data and downloading and running code from a third-party server.

The discovery was made by engineers at AdGuard, a provider of ad-blocking technology. AdGuard says it detected suspicious requests while analyzing the app's web traffic following its installation.

The company says it looked into GO Keyboard's behavior after an incident with another custom keyboard, TouchPal, that started showing ads over the typing area this past July.

App collected user data, ran external code

While investigating GO Keyboard for similar intrusive ads, AdGuard says it detected the app collecting a large amount of data from the device right after installation and sending it to a remote server.

"Without explicit user consent, the GO keyboard reports to its servers your Google account email in addition to language, IMSI, location, network type, screen size, Android version and build, device model, etc.," said Andrey Meshkov, AdGuard co-founder.

The app also communicates with dozens of third-party trackers and ad networks, Meshkov found, and also downloads and runs a 14 MB file blob, also shortly after installation.

Both actions — collecting user data without user consent and downloading and executing code from a third-party server (bypassing the app review process) — is forbidden for apps uploaded on the Google Play Store.

Researchers notified Google. No action as of yet.

AdGuard says it informed Google of the app's behavior, but at the time of their investigation publication, the Google team had not answered their report.

There are two versions of the Go Keyboard [1, 2] that exhibit this behavior, Meshkov said. Both of them have an installation count between 100 and 500 million users, meaning the number of affected users ranges from 200 million to 1 billion.

GOMO Apps — the Chinese app development company behind GO Keyboard — did not respond to a request for comment from Bleeping Computer in time for this article's publication.

 puk w glowe> puk w glowe> puk w glowe> puk w glowe>

You are not allowed to view links. Register or Login
7
Gry (Games) / Odp: Chicken Invaders 3: Revenge of the Yolk-za free. Ponad 54 godziny.
« Ostatnia wiadomość wysłana przez Joanna2312 dnia 25 Wrzesień, 2017, 17:40 »
Chicken Invaders 3: Revenge of the Yolk jest za free, przez ponad 54 godziny.

Strona promocyjna: You are not allowed to view links. Register or Login
8
Windows / Microsoft takes the wraps off the next generation of Windows 10 S devices
« Ostatnia wiadomość wysłana przez tregs_beales dnia 25 Wrzesień, 2017, 17:39 »


Ignite, Microsoft’s annual IT event, is currently underway in Orlando, Florida, and the software giant today revealed a range of new Windows 10 S devices from the likes of HP, Lenovo and Acer.

Windows 10 S is a cut down version of Windows 10 that only runs software from the Microsoft Store. It’s also faster and more secure, and when it launched it was aimed primarily at the education market -- a clear rival for devices running Google’s Chrome OS. Microsoft is now looking to expand Windows 10 S into other markets.

At Ignite, Microsoft announced the first Windows 10 S devices for Firstline Workers -- the two billion people who "serve as the first point of contact between an organization and its customers or products."

The devices from Microsoft OEM partners HP, Lenovo, Acer, and Fujitsu are priced from $275, with availability starting from as soon as next month.

Microsoft lists the following advantages of Windows 10 S for Firstline Workers:

    Simple to use: Windows 10 S delivers a familiar Windows 10 experience so Firstline Workers can get productive right away. It is designed for performance, start-ups are quick and built to stay that way so that productivity never slows down, even on entry-level devices. It offers more seamless integration with hosted VMs for remote desktop and apps for firstline worker scenarios. And it is fully integrated with OneDrive, empowering Firstline Workers to work from anywhere.
    Streamlined for security: Designed with Firstline Workers in mind, Windows 10 S has the goal of preventing the most common cyber attacks like ransomware and exploits. Applications built on the Universal Windows Platform or Centennial are delivered via the Windows Store ensuring they have been verified for security and integrity. And with Microsoft Edge, Firstline Workers are protected against phishing attacks and malicious software.
    Easy to manage: Windows 10 S was designed with Modern IT in mind, including cloud-based identity and management with Azure Active Directory and Microsoft Intune. Together with Windows Update for Business, organizations can manage and update Windows 10 S devices using the power and convenience of the cloud.

Bernardo Caldas, GM, Commercial Marketing in Windows, also reveals future features of the S variant: "Another important scenario for many businesses is the ability to customize and lock down devices to specific tasks or experiences for Firstline Workers and kiosks. In the Windows 10 Fall Creators Update, organizations can quickly setup and maintain locked down single purpose devices with improved tools in Windows Assigned Access. In future updates, we are also building additional lockdown, customization, and anti-theft capabilities."

 mistrzunio mistrzunio mistrzunio mistrzunio :yahoo: :yahoo: :yahoo: :yahoo: spoko> spoko>

You are not allowed to view links. Register or Login
9
Promo-link / Odp: Fast Browser Cleaner 2.0.0.20-za free. Ponad 30 h. Na rok.
« Ostatnia wiadomość wysłana przez Joanna2312 dnia 25 Wrzesień, 2017, 17:38 »
Roczna licencja Fast Browser Cleaner 2.0.0.20 jest za free, przez ponad 30 godzin.

Strona promocyjna: You are not allowed to view links. Register or Login
10
Windows / Maintaining Windows 10 tops list of enterprise security challenges
« Ostatnia wiadomość wysłana przez tregs_beales dnia 25 Wrzesień, 2017, 17:37 »
Keeping Windows up to date with the latest fixes is a major challenge for enterprise IT teams and can leave endpoints vulnerable, according to a new report.

The study from systems management company Adaptiva reveals that 59 percent of companies take up to a month or longer to complete Windows OS updates.

In addition, 48 percent of respondents say that third-party patching is also difficult to accomplish company-wide. 32 percent of respondents identify keeping up with 'the pace of policy changes to defend against newly discovered vulnerabilities or cyberattack methods' as the most difficult ongoing challenge that IT teams address.

"Breaches are occurring unnecessarily, teams are overwhelmed, and it's been nearly impossible for enterprises to keep up with changes in security policies," says Jim Souders, chief executive officer at Adaptiva. "With the Windows 10 migration, the situation becomes even more serious. If companies can't find ways to successfully automate security for Windows 10 and other third-party applications, they’re putting their systems at risk."

Lack of resources is a key problem. 55 percent of respondents believe that security policy compliance needs to be checked at least daily on every endpoint company-wide (10 percent think it should be checked hourly), but many companies lack the teams and tools to do security configuration management properly.

Fixing systems that are out of compliance with security policy is the most time-consuming endpoint security configuration management task that respondents undertake. Yet they lack the time needed to produce the automations required to identify and fix non-compliant endpoints. 45 percent of respondents say they lack the time to write automations at all, and 46 percent can only produce a fraction of those needed.

Lack of expertise is a problem too, with nearly a third of staff lacking the necessary skills to write their own automations. Another area of concern is that 38 percent of respondents say delivery of security software and updates over low-bandwidth connections is not reliable, making it difficult for enterprises to determine if updates even reach endpoints.

You are not allowed to view links. Register or Login
Strony: [1] 2 3 ... 10