Showing posts sorted by relevance for query Steve Jobs. Sort by date Show all posts
Showing posts sorted by relevance for query Steve Jobs. Sort by date Show all posts

Steve Jobs: Not Dead Yet! Emails Lead to Malware


We all are aware of that Mr. Steve Jobs death. But this phenomena has beeing misused by cyber criminals. Previously we have seen Facebook scam happened after the death of a public figure, a scam was started on Facebook Thursday to exploit the death of Steve Jobs. Claiming that free iPads were being given away in “in memory of Steve,” the Facebook page was quickly taken down after the media began to report on it.
But it not yet over Security researchers from M86 Labs have intercepted a currently spreading malware campaign a Steve Jobs spam campaign, with the subject suggesting that he is still alive. 

Steve Jobs Alive!
Steve Jobs Not Dead!
Steve Jobs: Not Dead Yet!
Is Steve Jobs Really Dead?


The URL links in the spam are many and varied. The websites that they point to all look to be hacked by the addition of obfuscated code that, after two layers of redirects, ultimately ends up at a BlackHole exploit kit landing page.


The intermediary redirect URLs are random-looking domains, with a top level domain of .ms (Monserrat in case you didn’t know), here are some examples:
hxxp://xnyiinobfb[dot]ce[dot]ms/index.php
hxxp://derhvbq[dot]ce[dot]ms/index.php
The purpose of the exploit kit is to try and exploit vulnerabilities on the system and eventually download malicious executable files. At this stage, we are not sure what the ultimate payload is, as no files were actually downloaded on our test system.
Unfortunately, many people may find this spam campaign “click-worthy” given the icon that Steve Jobs was. The usual advice applies – avoid clicking links in unsolicited email. In this case, one simple click is all it takes to get compromised.

-News Source (M86lab)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Steve Jobs Death Has Been Exploited By Facebook Scammers


As has often happened after the death of a public figure, a scam was started on Facebook Thursday to exploit the death of Steve Jobs.
Claiming that free iPads were being given away in “in memory of Steve,” the Facebook page was quickly taken down after the media began to report on it. 

People who clicked through were led to sites asking them to fill out surveys or sign up for free offers. Forbes points out that the scammers are paid affiliate fees for having brought traffic to the sites. A similar scam took place after singer Amy Winehouse was found dead in her North London home in July. Links were posted on Facebook to videos of the “shocking” final moments before her death. Instead, people were led to survey sites. After the attacks in Norway, spammers posted a link to a video they said was captured of the blast. Those who clicked were taken to a fake YouTube site that asked users to take a long survey. And as the Occupy Wall Street protests continue, a Web site called OccupyParty.org has popped up that NPR reports appears to have been created to sell ads. Except a single YouTube video, no information about the protests is available on the site. The Steve Jobs Facebook page was one of about 100 pages created Thursday with the title “R.I.P Steve Jobs.” Most of the other pages were created by Jobs’ fans.
Update:-
AppSumo, a daily deals website for web applications and online services, sent out an e-mail last night to customers that used Steve Jobs’ name in the subject line, but had no mention of him in the main text. The subject line for the email, advertising a deal for font collections, read: “Steve Jobs was originally obsessed with typography.” AppSumo says the email was sent without realizing Jobs had died.
-News Source (NS & Washingtonpost)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Steve Jobs Died



An episode ends. Apple on Wednesday confirmed that its former CEO, Steve Jobs, has died. He was 56.
"Apple has lost a visionary and creative genius, and the world has lost an amazing human being," Apple said in a note on its Web site. "Those of us who have been fortunate enough to know and work with Steve have lost a dear friend and an inspiring mentor. Steve leaves behind a company that only he could have built, and his spirit will forever be the foundation of Apple."
The Apple.com Web site currently bears a photo of Jobs (left). Apple asked fans to share their memories, thoughts, and condolences via rememberingsteve@apple.com.
Jobs stepped down as Apple CEO in August after nearly 14 years at the helm of the company he co-founded in 1976. "I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple's CEO, I would be the first to let you know. Unfortunately, that day has come," he said at the time.
Apple did not disclose any additional details about his passing, but Jobs had battled health problems for several years. Three years after having successful surgery for pancreatic cancer, Jobs announced in January 2009 that he had a "hormone imbalance" that was robbing his body of necessary proteins. He took a leave of absence, and it was later revealed that he underwent a liver transplant. By June 2009, he was back at work.
Though highly successful, Jobs's busy 2010 again took a toll on his health and he took another leave of absence in January 2011. He surprised and delighted fans, however, by showing up for the debut of the iPad 2 in March, telling those in attendance that he had worked too hard on the product to miss its launch. He was also there to show off iOS 5 and Mac OS X Lion a few months later.
Tim Cook, who is now Apple's CEO, took the stage in Jobs' place to launch the new iPhone 4S, the start of a new era at Apple.

-News Source (PC Mag & Apple)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Oct. 16 "Will be Steve Jobs Day in the State of California"

This Sunday will be declared "Steve Jobs Day" in the tech pioneer's home state of California, as Apple holds a memorial service for its late founder. California Gov. Jerry Brown tweeted Friday evening that Oct. 16 "will be Steve Jobs Day in the State of California" -- a salute to come 11 days after the computer genius died aged 56, following a long battle with pancreatic cancer.
Apple has invited some of Silicon Valley's biggest names to a private memorial service for Jobs on the same day, according to a copy of the invitation and several invitees cited by The Wall Street Journal on Friday. The event will be held at Stanford University's campus Sunday evening. It follows a small private funeral held for the Apple co-founder and chief executive last week. The memorial is expected to be attended by Silicon Valley luminaries and others close to Jobs, said the invitees. Guests to the invitation-only service were asked to respond to Emerson Collective, a philanthropic organization established by Laurene Powell Jobs, the father-of-four's wife.
Apple also plans to host an event for Apple employees to celebrate Jobs' life at its headquarters in Cupertino, Calif., on Oct. 19.

-News Source (Mashable & FOX News)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Twitter Traffic Hits 6,049 Tweets per Second As News of Jobs' Death Spread



Traffic hit near-record levels on Twitter Wednesday after news spread of Apple co-founder Steve Jobs' death. Leaders in the high-tech industry, as well as Apple fans and average people, took to social networking sites Wednesday night and Thursday to spread the word about Jobs and to share memories and tributes to the man behind the iMac, iPod, iPhone and iPad. Around 8 p.m. EDT Wednesday, shortly after news of Jobs' passing was made public, Twitter was handling 6,049 tweets per second, according to Twitter spokeswoman Rachael Horwitz.
"I'm surprised at the number of tweets it got, but I guess I shouldn't be," said Zeus Kerravala, principal analyst with ZK Research. "Social networks are increasingly the de facto place for people to go to when they want to share information. Twitter is perfect for this type of thing."
While Wednesday night didn't set a record for Twitter traffic, it was one of the site's highest number of tweets per second ever recorded.
Horwitz noted that early last May, the death of al-Qaeda leader Osama Bin Laden set a record at that time with a peak of 5,106 tweets per second.
When Brazil was eliminated from the international soccer tournament Copa America in July, Twitter saw 7,166 tweets per second. The current record is 8,868 tweets per second, which was set during the 2011 MTV Video Music Awards in August, Horwitz noted.

Shawn White, vice president of operations at Keynote Systems, an Internet and mobile monitoring company, told Computerworld that the surge in Twitter traffic after Job's death was staggering.
"We saw it with the death of Michael Jackson and the inauguration of President Obama. Sometimes sites just get overwhelmed," White said. "The pattern we saw [with Twitter] was that things hummed a long pretty normally and then right after the announcement of Steve Jobs' passing, the site slowed." He noted that the time to access Twitter's homepage for many users went from 3 seconds to 20 or 30 seconds. The site increasingly struggled under the load, with the first error hitting at 8:10 p.m. ET.
Then the availability of Twitter's homepage dropped nearly 40% between 8:50 and 9:05, according to Keynote.
"During that 15-minute period, roughly 60% of Twitter users would have gotten some kind of error trying to get to the home page. And if they got there, it was probably really slow," White said. "But Twitter recovered pretty quickly."


-News Source (Computer World, BBC, twitter) 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Steve Jobs Resigns as Apple's CEO


A historical chapter ends.The Big Boss of Apple Sir & Mr. Steve Jobs resigns as the CEO (Chief Executive Officer) of Apple. This iconic figure has struggled with various medical conditions through his tenure in Cupertino, battling pancreatic cancer in 2004 and undergoing a liver transplant in April 2009. Jobs has been on medical leave since January 2011, a year plus after returning from the transplant, so his resignation isn't entirely unforeseen.


To the Apple Board of Directors and the Apple Community:-

"I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple’s CEO, I would be the first to let you know. Unfortunately, that day has come.
I hereby resign as CEO of Apple. I would like to serve, if the Board sees fit, as Chairman of the Board, director and Apple employee.
As far as my successor goes, I strongly recommend that we execute our succession plan and name Tim Cook as CEO of Apple.
I believe Apple’s brightest and most innovative days are ahead of it. And I look forward to watching and contributing to its success in a new role.
I have made some of the best friends of my life at Apple, and I thank you all for the many years of being able to work alongside you.
"

Steve

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apple Working On TV With Integrated Voice/Motion Controller & Gaming Console

Apple Working On TV With Integrated Voice/Motion Controller & Gaming Console

Apple is planning an assault on the living room with a TV that will come equipped with an Apple-branded, Kinect-like video game console. According to sources Apple is working on a television set with an iTunes-integrated touch screen remote and Siri-like voice command technology. The TV set will be coming before the end of 2012. Rumors and patents have said as much for the past year, so that’s nothing new. But that’s not all we’ve heard. Also it has come to light that Apple’s television set will come with an Apple-branded, Kinect-like video game console. The interface will rely heavily on motion and touch controls. The rumor gained more traction following claim made by Walter Isaccson in Steve Jobs’ biography that the late Apple CEO would ‘like to create an integrated television set that is completely easy to use’ that would ‘ seamlessly synced with all of your devices and with iCloud. ‘Jobs also claimed to have ‘finally cracked’ the user interface problem to make the whole package easy to use.
Here comes few Doubts:-
  • Outside of the iOS platform (iPhone and iPad), Apple isn’t known as a gaming company.
  • A TV with a built-in voice and motion controller and a games console? How much is this thing going to retail for exactly?
  • The games console market is tightly stitched up by Microsoft, Sony and Nintendo. Breaking into this new market would be extremely difficult.
  • Valve does have a portfolio of Mac games, but not enough to create a new ecosystem for a games console.
  • Apart from branding, what differentiates an Apple games experience from PC/Mac/Xbox 360/PS3?
  • Wouldn’t it make more sense for Apple to bring iOS games into the living room through an updated Apple TV set top box? There’s a massive ecosystem of games here ready to exploit, along with a healthy developer base.
  • That said, folks who own an iPhone/iPad and an Apple TV device can use AirPlay to put games on any HDMI-enabled TV without the need for an Apple-branded TV or an Apple-branded games console. Where does a console fit into the picture?

-Source (Cut of Mac, Forbes, Rumor) 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Now anyone can be a cyber criminal



Cyber crime is no longer the exclusive domain of nerds with advanced coding and hacking skills. Thanks to simple and affordable, DIY downloadable crimeware, even novices can jump into what has turned into a global industry.
This is a far cry from the days when hacks were motivated more by the thrill of the kill than monetary gain, with even Steve Jobs and Steve Wozniak (Apple’s co-founders) allegedly on their rolls. It’s in the last decade, with the widening reach of the internet, that cyber crime turned virulent, as viruses like Melissa and I Love You clogged inboxes and spawned a multi-billion-dollar anti-virus software industry. And now, with the DIY attack kits, cybercrime is evolving into an extremely profitable, distributed global entity.
These malware toolkits aren’t just professional, marketable, and easy to deploy, they’re even being sold on a subscription model with after sales support.
Mpack, Neosploit, ZeuS, Nukespoilt P4ck, Phoenix … there’s an array of choices for script kiddies (those with minimal coding skills). “These kits come with features like encryption and hardware-based licensing, which one would find in enterprise-grade software,” says cyber sleuth Prasanna V, principal consultant of information security with Packet Verify. They enable users to launch pre-written threats against computer systems, and also customise them.
The United States, Russia, China, the UK, Germany, Brazil and Eastern European countries like the Ukraine are considered the hotbeds for development of such kits, and the damage they’re causing is already evident. According to a report by Symantec Corp, there was a 93% increase in web-based attacks in 2010 compared to the previous year, driven primarily by the prevalence of attack toolkits.
The modus operandi:
Most of the toolkits share a few common behavioural patterns, say Dr Madhupani and Dr Srinivas, technology experts with Cyber Security Works. “These can include capabilities to penetrate into browser processes, take screenshots of the victim’s machine or control it remotely, hijack e-banking sessions, add pages to a website and monitor them or steal passwords that have been stored by popular programs/browsers.” Users are lured through phishing websites, spam emails, download websites, freeware, or malicious codes inserted in legitimate programs.
What’s more worrying is that malware attacks from toolkits are difficult to monitor and curb because of both technological and legal factors. The cyber laws in most countries are largely inadequate to deal with the scale and reach of the crime. For example, a tool kit can enable a cyber criminal in Nigeria to spoof an Indian bank to send phishing emails to trick users in India. The network of cyber crime is spread so wide that it demands a coordinated effort by law enforcement agencies from all over the world that, as of now, is nonexistent.
On the technical side, “toolkits enable hackers to continuously generate new mutated malware variants, each targeting a different victim, making traditional discovery and fingerprinting of these threats nearly impossible,” says Ajay Goel, managing director, Symantec for India and SAARC.
On your guard:
So what can you do to protect yourself? For starters, realise that security does not start and end with an antivirus kit or a firewall, quips Prasanna. “Do not perform any financial transactions from shared systems like cyber cafes. Avoid connecting to free Wi-Fi hotspots. Scan USB before using. Stay away from suspicious websites and emails, limit the amount of personal information you give out on social networking sites like Facebook or Orkut,” he warns. “Finally, set the ‘automatic update’ option ON in all applications.”
Cyber Security Works issues another guideline: “Treat information the way you would treat your money.”

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apple iOS Devices & Persistent Location Tracking




Last week a big can of worms opened when two security researchers revealed Apple's iOS 4 tracks and stores detailed location data on each user's whereabouts. Many are ready to ditch the iPhone over the news. That may be a little drastic. 

There's reason why Apple, or any mobile device platform, tracks current location. The frightening part is why Apple actually tracks and stores history with no stated purpose. Further, a post on Mac Rumors reveals Steve Jobs denies that the company tracks anyone.
We know that Google and web publishers track user activity online. It also uses notes location. Both activity and location are often used to serve more relevant ads, and also provide demographics to advertisers and other business the publisher has a relationship with. Mobile is an extension of the web mobile mirrors much of this conduct.
Apple is not the only one to track location. Google tracks location on its Android platform and on phones using Google mobile apps such as Google Maps (this includes the iPhone). A provider such as Google or Apple uses location information to provide navigation, provide local search results and yes, serve ads targeted to your location. We hope data doesn't get used for much deeper purposes. The fact that Apple's file keeps data for the life of a phone is alarming. The possibility that a company or person might tap into that file and exploit the data pushes concerns even deeper.
Cell phone carriers such as Verizon, AT&T, Sprint and others also track your location. Your phone constantly checks in with the nearest towers. Carriers use that information to maintain its network and push services back to the subscriber. In certain cases location data can be used to locate someone for rescue purposes.
It shouldn't be a surprise that location data is tracked on your phone. However you shouldn't just accept it and continue business as usual. Pay some attention to the EULA statement or end-use licensing agreement before checking the box. Look into the privacy settings on your mobile device and set it to a level you're comfortable with. Remember that if you turn off a service provider's ability to share your location, you also won't be able to use apps and services that require your location such as Google Maps.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Department of Homeland Security (DHS) Unveils Cybersecurity Bill



Members of the House Homeland Security Committee unveiled legislation Thursday that would authorize the cybersecurity functions of the Department of Homeland Security (DHS) and establish a quasi-governmental entity to coordinate cybersecurity information-sharing with the private sector. The bill, called the Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act (PrECISE), would station a national clearinghouse for information relating to potential attacks on critical infrastructure, such as electric grid, water facilities, and financial service systems.
"The risk of cyberattack by enemies of the United States is real, is ongoing and is growing," warned Homeland Security Committee Chairman Peter King (R-N.Y., above left). "The PrECISE Act, in line with the framework set forth by the Speaker’s Cybersecurity Task Force led by Rep. [Mac] Thornberry [R-Texas], protects our critical infrastructure without a heavy-handed and burdensome regulatory approach that could cost American jobs."
Under Section 226 of the bill, the Secretary of Homeland Security "is authorized to maintain the capability to act as the focal point for cybersecurity through technical expertise and policy development." Further, the Secretary is ordered to "coordinate cybersecurity activities across the Federal Government, designate a lead cybersecurity official within the Department of Homeland Security, publish a cybersecurity strategy and provide appropriate reports to Congress."
In effect, the DHS would identify cybersecurity risks on a sector-by-sector basis and gather existing performance standards to procure the most efficient methods to mitigate identified exposures. The Secretary will review and collect standards and publish cyber-defense information for owners and operators of "covered critical infrastructure," which is defined as the "infrastructure that if destroyed or disabled would result in a significant number of deaths, cause mass evacuations, major disruptions of the economy, or significant disruption to national security."
"Cybersecurity is truly a team sport, and this bill gives DHS needed authorities to play its part in the federal government’s cybersecurity mission and enables the private sector to play its part by giving them the information and access to technical support they need to protect critical infrastructure," said Rep. Dan Lungren (R-Calif.), Chairman of the House Cybersecurity Subcommittee.
In addition to Reps. King and Lungren, the bill’s original co-sponsors include Rep. Michael McCaul (R-Texas), Rep. Gus Bilirakis (R-Fla.), Rep. Candice Miller (R-Mich.), Rep. Tim Walberg (R-Mich.), Rep. Billy Long (R-Mo.), Rep. Tom Marino (R-Pa.) and Rep. Bob Turner (R-N.Y.) of the Homeland Security Committee, as well as Rep. Steve Stivers (R-Ohio) and Rep. Jim Langevin (D-R.I.).
One key tenet of the legislation is the creation of the National Information Sharing Organization (NISO), a quasi-governmental entity that would be staged as a clearinghouse for exchanging relevant information regarding cyber threats and vulnerabilities. The organization would be a nonprofit entity consisting of a DHS-appointed board of directors, composed of members from five different federal agencies and 13 members of the private sector.

According to Section 242 of the bill, the NISO Would Have Three Primary Missions:-

First, facilitating the exchange of cyber threat information, best practices and technical assistance amongst its membership including the Government. Second, it would facilitate the creation of a common operating picture built from information contributed by technically sophisticated members such as the Government, Internet Service Providers, and other members with access to large amounts of network related information. Third, the NISO would act as a catalyst for cooperative research and development of member driven research projects. Additionally, the NISO would incorporate into its membership agreements for the transferability of intellectual property and integrate with the National Cybersecurity and Communications Integration Center at DHS.

All in all, NISO’s purpose would be to establish a point of connection between the government and the private sector to pool information about potential cybersecurity threats and to collaborate on methods to prevent such threats from occurring.
While cybersecurity laws have brought a rare agreement between Republicans and Democrats, the two parties have quibbled over certain aspects of the legislation. Generally, House Republicans prefer more limited regulation and discretional incentives to ramp up securities, while Senate Democrats and the White House have suggested more stringent regulations monitored by the DHS.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apple releases anti-virus update for infected 120,000 Mac users


Apple has finally come clean and admitted that its software can be turned over by a virus.
The malware has been confusing Mac users for more than a week because it is a central belief in the dogma of Apple that only Windows users suffer from malware and get recruited into botnets.  We guess some of them must believe that they accidently downloaded Windows and became instantly infected as Steve said they would.
Matters have been made worse because Apple instructed its customer care teams to fudge the problem if customers rang them up.  The Tame Apple Press has also been in full swing trying to downplay the matter.  Apple fanboys have been targeting hacks who write about it, claiming that it was software that people were tricked into downloading, it was not malware, which shows how ignorant Apple followers are when it comes to security matters,
The Malware, MacProtector and MacSecurity, warns a victim that his or her computer is infected and goes through a complex installation process. It spends most of its life trying to snuffle for credit card information.
Zdnet  believes that more than 120,000 of Apple's US followers have been infected by a credit card stealing virus and dubbed Apple's approach to the problem as Orwellian.
Now Apple has said that it will deal with the malware using a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants.
The update will also help protect users by providing an explicit warning if they download this malware.
Jobs' Mob have posted instructions on how to avoid installing the Mac Defender malware as well as how to remove it from an affected computer.
Given the success of the malware it would appear that Apple followers are a soft touch. The malware plague was caused by enough of them downloading the bogus software and not being aware that there was something wrong.
For years security experts have been worried that the lack of security on Apple machines would eventually result in hackers trying to turn it over. While Windows 7 has had years of security proofing, under stress, Apple has not focused on this problem and its much needed onboard security scanner only finds one bit of malware,

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...