LetsByteCode Headlines

Untethered jailbreak for iOS 6.1 will be released on February 3rd

Developers of unofficial version of the operating system reported successful hacking attempt. According to the hacker group «evad3rs» on Twitter, experts in hacking iOS successfully conducted the first test to compromise iOS 6.1. «IOS 6.1, as it turned out, is vulnerable to the exploits that...
Untethered jailbreak for iOS 6.1 will be released on February 3rd

Symantec: New Trojan uses SPF-protocol to infect computers

Symantec has detected a new Trojan horse program that shows users fake advertisements when viewing web-pages. Trojan uses an extension of the protocol for sending email SPF (Sender Policy Framework) for instructions from intruders. This technique allows the malware to remain unnoticed by the...
Symantec: New Trojan uses SPF-protocol to infect computers

Vulnerability in ISC BIND allows DoS-attack

The manufacturer recommends to eliminate a temporary solution or wait for updated to a stable version of the product. Internet Systems Consortium (ISC) announced the existence of vulnerabilities in the server domain names BIND, can cause termination of the Response Policy Zone...
Vulnerability in ISC BIND allows DoS-attack

Experts recommend to pay compensation for discovering vulnerabilities in SCADA-systems

According to Executive Director of Digital Bond, modern SCADA-solutions are using outdated and too low quality code. Security researchers from the United States suggested SCADA-systems developers to rethink their approach to security of critical infrastructure. According to them, bugfix release,...
Experts recommend to pay compensation for discovering vulnerabilities in SCADA-systems

New Java Exploit questions the effectiveness of protection against exploits

Researchers have discovered vulnerabilities to bypass security settings of Java, designed to protect against hidden exploits. Researchers from security company Security Explorations managed to find vulnerabilities in the security of Java, which are designed to provide protection against hidden...
New Java Exploit questions the effectiveness of protection against exploits

Google gets rid of passwords

Google is developing solutions that will allow users to enter their Gmail account using a ring with a microchip. Staff members of the security department of the company presented a report which reported on possible ways to improve secure access to web-sites. This development can be very useful,...
Google gets rid of passwords

Prolexic has published a report on DDoS-attacks in 2012

According to the report by researchers, for the last quarter of 2012, DDoS-attacks have become more diverse and extensive. In the last quarter of 2012, the number of attacks has increased, in addition, they have become more widespread and diverse, report researchers at Prolexic. The most...
Prolexic has published a report on DDoS-attacks in 2012

Red October - a complex two-stage cyber attack

Kaspersky Lab reported on a large-scale campaign of cyber espionage called Red October, which was carried out by hackers over the past five years. The main target were diplomatic, government agencies and academic organizations. Experts analyzed the anatomy of attacks, attackers scheduled the...
Red October - a complex two-stage cyber attack

Panda Security launches new version of the network device GateDefender Performa

Panda Security has released a new version of multi-purpose perimeter security Panda GateDefender Performa eSeries. The new device allows medium and large enterprises (50 people or more) to protect their corporate network and increase their productivity. It is available in three different...
Panda Security launches new version of the network device GateDefender Performa

Foxit has removed a critical vulnerability in its PDF-reader for browsers

Information on the vulnerability has been publicly available for one week. Foxit Software Company has released a security patch for its add-on for web-browsers, for reading PDF files. In the new version (5.4.5), critical flaw has been removed, which allowed a potential attacker to remotely...
Foxit has removed a critical vulnerability in its PDF-reader for browsers

Backdoor disguised as a critical Java update

The new threat was discovered by researchers at Trend Micro. According to the blog post by Trend Micro, a researcher the antivirus company Padzhares Paul (Paul Pajares) found the backdoor disguised as the latest critical updates for Java. It should be noted that on January 14 this year, Oracle...
Backdoor disguised as a critical Java update

Students of Indian Universities will learn the basics of cybersecurity

State authorities intend to significantly increase the level of IT-security in India. The University Grants Commission of India (UGC) has sent to all its members in higher educational institutions request for a course on cyber security training programs for both students and graduate students....
Students of Indian Universities will learn the basics of cybersecurity

Dutch researchers analyzed botnet Pobelka

Dutch company Fox-IT released a detailed report describing the activities of a botnet called Pobelka. According to the experts, the hackers used malicious programs aimed primarily at users of Holland and Germany. Fraudsters who ran a botnet, looking for their potential victims with underground...
Dutch researchers analyzed botnet Pobelka

90% of passwords can be cracked in seconds

Passwords remain the primary factor for authentication, but in today’s world it is not enough. According to a survey by research firm Deloitte Canada, today the average time users spend on a computer to come up with a password is much less, more than 90% of passwords can be hack in...
90% of passwords can be cracked in seconds

Dr.Web: A new trojan replaces queries

The most active Trojan spreads in the U.S. state of Kansas. The company “Doctor Web” found a new malicious program that replaces the search queries. In addition, the Trojan also redirects users to sites of the attacker. Once the virus gets on your computer, it creates a copy of...
Dr.Web: A new trojan replaces queries

Hackers sell new exploits of Java for $5000

Exploit for a zero-day vulnerabilities started selling on underground Internet forums. Less than a day after Oracle developers fixed a dangerous vulnerability in Java which allows hackers to remotely compromise a system based on Windows, on underground Internet forums selling the exploit for...
Hackers sell new exploits of Java for $5000

Armenian hackers publish papers to protest against the killing of Aslan Usoyana

Activists have published confidential information of Sumato Energy and the Special State Protection Service, as well as many businesses. Arachne hacker organization that associates itself with Anonymous, published a large number of documents related to the company Sumato Energy and its director...
Armenian hackers publish papers to protest against the killing of Aslan Usoyana

Chinese Android users warned of large-scale botnet

Initially, the botnet was discovered in 2011 and now it has been introduced in about seven thousand applications for Android. Researchers in the field of information security in China warn users of devices based on Android the discovery of large-scale botnet aimed at the platform. The botnet...
Chinese Android users warned of large-scale botnet

US-CERT: Two U.S. energy companies are infected with malware

Computer systems were infected by the use of USB-drives. US-CERT Team responded quickly to the threats, reported that two U.S. energy companies have been victims of a computer virus in the last quarter of 2012. In both cases, industrial systems have been infected by the use of USB-drives. One...
US-CERT: Two U.S. energy companies are infected with malware

CES 2013: Gaming Headsets Thrustmaster Y-Gaming

Thrustmaster gaming headsets Y-Gaming Headsets: Y-250X for Xbox 360 , Y-250P for PS3 and Y-250C for PC. The 50mm dynamic head set provides a deeper bass than the mid-range, which, in turn delivers greater high-frequency sounds. This distribution corresponds to the alleged performance...
CES 2013: Gaming Headsets Thrustmaster Y-Gaming

CES 2013: Speed keyboard SteelSeries Apex and Apex [RAW] for games

At the Consumer Electronics Show, SteelSeries gaming keyboard Apex and Apex [RAW] was revealed. According to the manufacturer, Apex and Apex [RAW] become the world’s fastest response time keyboard, with a lot of improvements in the layout. Among them are the low-profile keys, comfortable...
CES 2013: Speed keyboard SteelSeries Apex and Apex [RAW] for games

CES 2013: Samsung introduces a refrigerator with built-in Android

Samsung Electronics has introduced an expanded line of home appliances Luxury kitchen at CES 2013. The first shown was the refrigerator Samsung T9000 with volume 906 liters and the new four-door form factor.       It has a French Door upper compartment of 550 liters and a lower compartment...
CES 2013: Samsung introduces a refrigerator with built-in Android

Kaspersky Lab: "Red October" is spying on the world's governments

“Kaspersky Lab” has published a report on a large-scale study of the campaign by cybercriminals to commit espionage for diplomatic, government and research organizations around the world. Malicious actions were designed to obtain confidential information data, providing access to...
Kaspersky Lab: "Red October" is spying on the world's governments

CES 2013: Buffalo routers with support for 802.11ac

Japanese company Buffalo demonstrated a number of network devices. Series of wireless routers and adapters AirStation in Q2 2013 will be complemented by two new routers WZR-1750DHP and WZR-1166DHP, as well as USB-adapter 802.11ac. Wireless Router AirStation WZR-1750DHP provides speeds up to...
CES 2013: Buffalo routers with support for 802.11ac

CES 2013: Dell Project Ophelia will climb into the clouds from TV

Dell has announced a solution that allows you to turn compatible TV sets and monitors into Android-powered device with all the benefits of the latter. The device is called Project Ophelia and is something a little more conventional flash. It is stated that it can connect to a TV using...
CES 2013: Dell Project Ophelia will climb into the clouds from TV

CES 2013: Lenovo ThinkPad Helix combines qualities of ultrabook and tablet

Lenovo has officially unveiled at CES 2013 additions to its series of ThinkPad laptops in the form of a new model of Helix for Windows 8 , which combines some quality compact ultrabook and a tablet. Indeed, the device has a 11.6-inch touch screen, which if necessary can be separated from the...
CES 2013: Lenovo ThinkPad Helix combines qualities of ultrabook and tablet

Adobe releases patches for 27 vulnerabilities in Acrobat and Reader

Adobe Systems has officially announced the release of a service pack for branded software products, including the Reader 11.0.0 and Acrobat 11.0.0 and earlier versions of the application for the Windows and OS X . Also an update for Reader 9.5.1 and earlier 9.x versions for software platform...
Adobe releases patches for 27 vulnerabilities in Acrobat and Reader

CES 2013: Microsoft IllumiRoom technology will transform any room into a display

Microsoft and Samsung are working on a very interesting and an unusual Idea called IllumiRoom. Its essence is that the image on the monitor is distributed throughout the room. And this is taking into account the geometry of the surrounding space, and as it expands the virtual world with a small...
CES 2013: Microsoft IllumiRoom technology will transform any room into a display

CES 2013: Samsung curved OLED-TV

During the International Consumer Electronics Show CES 2013, Samsung Electronics introduced OLED-TV in arc shape. As planned by the manufacturer, that makes the content that is displayed on the TV screen, bright, dynamic and as realistic as possible. Curved OLED-TV provides additional...
CES 2013: Samsung curved OLED-TV

CES 2013: Samsung Youm flexible display

Samsung introduced a bendable display at CES 2013. This is an interesting technology called Youm. In the past, the Korean manufacturer has shown this invention, but now it looks like it has a finished product – without sticking chips etc. Perhaps the widespread use of this type of display...
CES 2013: Samsung Youm flexible display

Plugin for Foxit Reader has a critical vulnerability

An attacker can exploit to compromise the URL-address of the target system. Expert in the field of information security Mikalatstsi Andrea (Andrea Micalizzi) has encountered a critical vulnerability in the current version of the plug-in to the browser, which is part of the program to read...
Plugin for Foxit Reader has a critical vulnerability

NVIDIA has removed a security vulnerability

The vulnerability was published on Pastebin, although the company was not notified about its discovery. The company has released an update for NVIDIA driver (310.90 WHQL), which fixes the vulnerability in the security system, discovered in late December. The pre-existing flaw could allow...
NVIDIA has removed a security vulnerability

Yahoo has removed XSS-vulnerability of their email-application

Security researchers report that the update from Yahoo earlier in the week for a serious vulnerability, has not eliminated the problem and users are still at risk. XSS-vulnerability was discovered by Shahin Ramezani (Shahin Ramezany), known as Abysssec. vulnerability allows an attacker to gain...
Yahoo has removed XSS-vulnerability of their email-application

99% of malware targets Android

A recent study shows that the amount of malware targeting Android is incredibly large. Researchers’ at Kaspersky ” found that 99% of newly discovered malware on mobile devices are aimed, in general, at Android, and only a small number of them focused on smart phones running on Java...
99% of malware targets Android

CES 2013: Platform for cloud gaming NVIDIA GRID

At CES 2013, NVIDIA revealed details about gaming platform NVIDIA GRID. In particular, it is reported that six companies are already planning to use the platform for cloud gaming. NVIDIA GRID platform makes possible smooth online gaming experience on any high-end PC screen, including...
CES 2013: Platform for cloud gaming NVIDIA GRID

CES 2013: Asus will release a flexible tablet in 2013

Asus has officially confirmed that in the first quarter of 2013 it will release a tablet of the “new generation” with sensors from the company Atmel. The new technology of this manufacturer named XSense it is possible to produce sensors for touch screen, which can bend and fold. If...
CES 2013: Asus will release a flexible tablet in 2013

CES 2013: Qualcomm Snapdragon 600 and 800 at up to 2.3 GHz and support for 4K-video

Qualcomm has officially introduced at CES 2013 its latest developments in the face of mobile chips Snapdragon 600 and 800, targeted for use in high-end smart phones and tablet computers, as well as in the systems of Smart TV. At present, these quad-SoC are available as prototypes, and the first...
CES 2013: Qualcomm Snapdragon 600 and 800 at up to 2.3 GHz and support for 4K-video

CES 2013: Portable Touch Screen Monitor Lenovo ThinkVision LT1423p

Lenovo has introduced a portable monitor the unusual ThinkPad LT1423p Mobile Monitor, which can be used as a second display device is not equipped with a touch screen. Slim and lightweight portable monitor ThinkVision LT1423p Mobile Monitor with Touch Control – a new generation of this...
CES 2013: Portable Touch Screen Monitor Lenovo ThinkVision LT1423p

CES 2013: Blu-ray player Samsung BD-F7500 premium

Samsung Electronics has introduced a Blu-ray player with premium Samsung BD-F7500. It is an advanced player with support for ultra high-definition images Ultra High Definition (UHD), which provides a realistic image. The new Blu-Ray player from Samsung with technology scaling the image to the...
CES 2013: Blu-ray player Samsung BD-F7500 premium

CES 2013: Portable console NVIDIA Project Shield with Android

NVIDIA has announced a portable gaming console called Project Shield, which is running an operating system Android (Jelly Bean). It is stated that it is designed to allow users to “enjoy” games for Android and Windows. And if Android-games are quite clear that from Windows-based...
CES 2013: Portable console NVIDIA Project Shield with Android

CES 2013: Lenovo IdeaCentre Horizon Table PC in the form of tables for multiplayer games

Lenovo has announced at the CES 2013 kicks off an unusual device IdeaCentre Horizon Table PC. This is the first table-Lenovo PC technology to support multi-touch designed. The table Horizon Table PC can accommodate several people whiel connecting special game accessories and play multiplayer...
CES 2013: Lenovo IdeaCentre Horizon Table PC in the form of tables for multiplayer games

CES 2013: Transformer Lenovo IdeaPad Yoga 11S with Ivy Bridge and Windows 8

Lenovo has introduced a new version of its unusual transformer IdeaPad Yoga – Yoga IdeaPad 11S. In contrast to last year’s predecessor , the 11-inch IdeaPad Yoga 11 , based on the new processor architecture x86, not ARM – Intel Ivy Bridge. Accordingly, as a software platform...
CES 2013: Transformer Lenovo IdeaPad Yoga 11S with Ivy Bridge and Windows 8

CES 2013: Lenovo puts touchscreens on their laptops and ultrabooks

Lenovo has announced new versions of its ultrabooks and laptops – IdeaPad U310 Touch, IdeaPad U410 Touch, IdeaPad Z400 Touch and IdeaPad Z500 Touch. Innovation is to set them with a touch screen with support for 10-point multitouch, as well as changes to certain characteristics. All four...
CES 2013: Lenovo puts touchscreens on their laptops and ultrabooks

LinkedIn user base exceeded 200 million

LinkedIn has reached another milestone in its development. The professional social network today announced that the number of users broke the mark of 200 million people in more than 200 countries around the world. LinkedIn operates today in 19 languages, the company said. “I would like to...
LinkedIn user base exceeded 200 million

Europol: Scammers steal 1.5 billion euros from credit cards each year

According to the experts at Europol, on the basis of 2012 in the EU more than 726 million payment cards (debit and credit) were issued. The total amount of damage caused by fraudsters to card holders of these cards was 1.5 billion euros. It is stated in the report of the regulator «Situation...
Europol: Scammers steal 1.5 billion euros from credit cards each year

Experts: Censorship does not work on pirate sites

Researchers from Northeastern University in Boston conducted a study, the results of which show that blocking pirate sites is ineffective. Experts analyzed the availability of pirated material on file-exchange sites and found that pirates have the time to publish more illegal content than...
Experts: Censorship does not work on pirate sites

TPB on top of Torrent-trackers

Despite the arrests of its founders, TPB is the most popular Torrent-tracker in the world. TorrentFreak published a list of the most popular Torrent-trackers at the beginning of 2013. Despite the harassment and detention of the creators, The Pirate Bay (TPB) maintains a leading position in the...
TPB on top of Torrent-trackers

Web API for cryptographic operations

Consortium organization that develops and implements technology standards for the World Wide Web, W3C presented drafts of web-standard using Web API for implementing cryptographic operations in web-applications. For example, Web Cryptography API defines a JavaScript API to perform basic...
Web API for cryptographic operations

System compromise in Adobe Flash Player and Adobe AIR

Date of publication: 09/01/2013 Modified: 09/01/2013 Danger: High The presence of corrections: Yes Number of vulnerabilities: 1 CVSSv2 rating: (AV: N / AC: M / Au: N / C: C / I: C / A: C / E: U / RL: O / RC: C) = Base: 9.3/Temporal: 6.9 CVE ID: CVE-2013-0630 Vector...
System compromise in Adobe Flash Player and Adobe AIR

Adobe has removed a critical vulnerability in Flash, Reader and Acrobat

Developers have released an update that closes a dangerous vulnerability in three products of the company. According to the post of developers at Adobe, January 8, 2013 a security update was released for the company’s products such as Flash, Reader and Acrobat. Specialists note that the...
Adobe has removed a critical vulnerability in Flash, Reader and Acrobat

Malicious services

In their “threat research in Information Security – 2013″, which is published annually by Sophos, they examined the development of the industry of malicious software to identify new trends in its development. Chief among them are the active use of services that allow you to...
Malicious services

Asus plans to launch Google TV-Device

Google announced that Taiwan’s Asus at CES 2013 will show a new device running the software for GoogleTV. According to unconfirmed reports, it will be a set-top box Asus Qube. Google says that Asus, Hisense and TCL – these new companies partners GoogleTV, whereas before it had joined...
Asus plans to launch Google TV-Device

Samsung introduced a set of hardware to upgrade TVs

Samsung has introduced a set of hardware upgrade Evolution Kit for TV Smart TV in 2012. It was first shown at last year’s CES, and this time the Korean Corporation has brought to the exhibition a full production version of the Evolution Kit. With the help of the previous model series TVs...
Samsung introduced a set of hardware to upgrade TVs

History of Consumer Electronics Show in Photos

After a few days of opening its doors to one of the world’s largest consumer electronics trade show – Consumer Electronics Show. CES opening is scheduled for January 8, the show will continue for four days, until 11 January. The first Consumer Electronics Show was held in June...
History of Consumer Electronics Show in Photos

Archos TV connect convert Android into PC

Archos company introduced an interesting device that can turn your TV to a “computer” with Android OS. ARCHOS TV connect intends to connect to a TV via HDMI-cable. Operated via a rather non-standard panel, which includes several groups of controls. Usual Android-device buttons on...
Archos TV connect convert Android into PC

CES 2013: Gorilla Glass 3 will be even stronger

Corning, maker of the famous glass Gorilla Glass, which is often used in today’s smartphones, said it will demonstrate at CES 2013 a new version of its product. It claims it will have a number of advantages over Gorilla Glass 2, shown in January last year at the same exhibition. According...
CES 2013: Gorilla Glass 3 will be even stronger

Pinterest buys culinary service Punchfork

Pinterest launched a corporate M & A-strategy and this week announced the acquisition of service Punchfork, which is a network aggregator for recipes. Neither Pinterest or Punchfork have reported the transaction value, but its conditions are completely closed, the founder of the service,...
Pinterest buys culinary service Punchfork

Qualcomm announced a new network technology StreamBoost

Qualcomm Atheros announced a new technology StreamBoost, with which the company plans to help build a new generation of WiFi-routers and gateways, with improved performance and support for the transfer of movies and online games streamed at home networks. StreamBoost based on wireless LAN...
Qualcomm announced a new network technology StreamBoost

Samsung has introduced powerful ultrabooks with Windows 8

Samsung has introduced two new models of laptops running the operating system Windows 8: Series 7 Ultra and Series 7 Chronos. Cost  of the computers is yet to be announced. Series 7 Chronos will be equipped with a hard disk up to 1 TB, Radeon HD 8870 with 2 GB of memory on board, as the...
Samsung has introduced powerful ultrabooks with Windows 8

Canonical has released Ubuntu Phone System

Canonical announced specialized version of Ubuntu Linux, created for smartphones. The new version of the popular operating system is designed to create at least some competition in the mobile Linux-like operating system, which is now dominated by Android. Canonical said that they have created...
Canonical has released Ubuntu Phone System

Microsoft has released a hot fix for Internet Explorer

Microsoft has released an emergency fix for Internet Explorer, a vulnerability exploited by hackers on the Internet to break into computers which has been fixed. Error is in the older versions of the browser, the latest IE 10 is not affected by the problem. According to the company, the problem...
Microsoft has released a hot fix for Internet Explorer

Thirty years of the Internet

Thirty years of running the Internet as the current system is celebrated in the United States. One of its creators, Vinton Cerf, from January 1, 1983 all of the computers that were part of a network of ARPANET / network DARPA Pentagon – translated into protocols TCP / IP / Transmission...
Thirty years of the Internet

Hackers can interfere in voting for "Oscar"

Some members of the Academy of Motion Picture Arts and Sciences have expressed concerns that the results of electronic voting for “Oscar” this year may have been compromised by hackers. Voting for nominees’ for Oscar-2013 started on December 17 and will end on January 3. For...
Hackers can interfere in voting for "Oscar"

Hacking Cisco IP-phone

Two weeks ago a student of intrusion detection systems for Columbia Ang Kui (Ang Cui) published a report on exploiting vulnerabilities in the kernel CNU (Cisco Native Unix) in IP-phones of Cisco 7975G, 7971G-GE, 7970G, 7965G, 7962G, 7961G, 7961G-GE, 7945G, 7942G, 7941G, 7941G-GE, 7931G, 7911G,...
Hacking Cisco IP-phone