Wonder which is the most popular lockscreen PIN? Based on a sample of 204,000 passcodes, here are the most popular passcode choices.
Latest from Dancho Danchev
Researchers from Sophos have intercepted a currently ongoing Facebook scam which exposes users to Mac scareware.
Penn State researchers managed to identify the pass code patterns on two Android smartphones (the HTC G1 and the HTC Nexus One), 68% of the time, using photographs taken under different lighting conditions, and camera positions.
In the wake of the Russian-Georgian conflict, a week worth of speculations around Russian Internet forums have finally materialized into a coordinated cyber attack against Georgia's Internet infrastructure. The attacks have already managed to compromise several government web sites, with continuing DDoS attacks against numerous other Georgian government sites, prompting the government to switch to hosting locations to the U.
E-mail marketing software developer Campaign Monitor warned users today of a server compromise that took place during the weekend.The compromise allowed the attackers to gain access to customer accounts, which they abused by importing their own lists of harvested emails in order to launch spam campaigns using the clean IP reputation of their servers.
UPDATE: Arbor Networks have provided more details in their "30 Days of DNS Attack Activity" analysis, SANS confirmed HD Moore's statement on DNS cache poisoned AT&T DNS servers. Numerous independent sources are starting to see evidence of DNS cache poisoning attempts on their local networks, in what appears to be an attempt to take advantage of the "recent" DNS cache poisoning vulnerability :" client 143.
Using a data set consisting of 120,000 data points, researchers from OPSWAT estimate that Avast is the market share leader in the antivirus software market.
Waledac is once again using its well proven social engineering tactics by introducing a "fake SMS spying tool" (free.exe; smstrap.
Remember the DNS hijackings of such high profile sites such as Comcast, Photobucket, and ICANN/IANA domains that were taking place last year? Similar incidents are still happening.
It took only a couple of months for cybercriminals to catch-up and reintroduce the massive spam volumes that briefly disappeared following the shutdown of the cybercrime ecosystem's sitting duck McColo in November, 2008.According to Google's Postini Spam data and trends for Q1 2009, during the first quarter of the year the spam volume was the strongest since 2008, increasing with an average of 1.