LetsByteCode Headlines

The most popular Wikipedia articles of 2012

What would we do without the online encyclopedia Wikipedia? Of course, the information will be extracted once, but with this resource life has become easier. 2012 was rich in various events, but the most interesting users of encyclopedia shown to be from social network Facebook, a young British...
The most popular Wikipedia articles of 2012

Smartphone Galaxy S IV: In April and will support S Pen?

On the Internet, a new batch of rumors about one of the most anticipated smartphones next year, Samsung Galaxy S IV. If we believe the resource PhoneArena, the phone will not wait until April. This could mean that the release will held in February-March.   Another interesting point:...
Smartphone Galaxy S IV: In April and will support S Pen?

Rumors: Apple is developing "smart watches"

According to unconfirmed information, the company Apple is developing “smart watches” that can communicate with other devices of “apple” via Bluetooth. According to Chinese sources, the device is equipped with a 1.5 “display, created by technology PMOLED. It is...
Rumors: Apple is developing "smart watches"

Trend Micro warns of new Java-backdoor

Trend Micro today announced the discovery of a new class of malicious backdoor aimed at infecting HTTP-server implemented to work with Java. The backdoor allows attackers to execute malicious commands directed to the system in which the server is running. Threat is known as BKDR_JAVAWAR.JG,...
Trend Micro warns of new Java-backdoor

Zero-day vulnerability in IE

On December 21 unknown hackers successfully hacked the website of the Council on Foreign Relations, United States (http://www.cfr.org) and posted on the site exploiting a previously unknown vulnerability in Microsoft Internet Explorer. First of incident was spoken about only on December 27,...
Zero-day vulnerability in IE

2013: Vulnerabilities in the software will be the main target for cybercriminals

PandaLabs has today published a review of trends in computer security that are expected to prevail in 2013. Vulnerabilities in the software will be the main target for cybercriminals in the coming year. Luis Corrons, Technical Director of PandaLabs, said: “Without a doubt, this is the...
2013: Vulnerabilities in the software will be the main target for cybercriminals

Glowing Keyboard SVEN Comfort 7200 EL Nightcap

SVEN SVEN Comfort 7200 EL is equipped with a light-blue backlit keys on the entire surface. According to the manufacturer, this solution is optimal to work at night. If the work is delayed long after midnight which emight make the keyboard difficult to work with because of lack of light, so as...
Glowing Keyboard SVEN Comfort 7200 EL Nightcap

POS-terminal network at Restaurant Depot hacked again

Hackers hacked the POS-terminals of Restaurant Depot network and gained access to credit card database of its customers. Hackers again broke into the POS-terminals in New York wholesale trade network Restaurant Depot. Attackers managed to steal data of debit and credit cards of customers, which...
POS-terminal network at Restaurant Depot hacked again

Dr.Web: New Trojan steals passwords from applications

“Doctor Web” fixed network mass mailing through which attackers infect a user’s computer with a Trojan that can steal passwords from many applications. Experts report that users have started to receive letters from malicious trojan from 26 to 27 December. The message contains...
Dr.Web: New Trojan steals passwords from applications

In 2012 Google has removed 51 million references from SERPs

The largest number of requests received in the current year are from RIAA. Copyright owners often turn to the major search companies, demanding search results to be removed from searchs. And Google is no exception. According to TorrentFreak, in 2012, the Internet giant has removed more than 51...
In 2012 Google has removed 51 million references from SERPs

Symantec has discovered a new Trojan-extortionist

Virus blocking startup of the operating system on the victim’s computer. Symantec has detected a new Trojan Online extortionists, which blocks the computers of its victims. Computers are infected in a number of ways, particularly when the user visits malicious sites, passing over...
Symantec has discovered a new Trojan-extortionist

Next Windows will have a new kernel and will get a new interface

Experts believe that the operating system is likely to be a large-scale upgrade to Windows 8 and not a separate product. According to Neowin referring ostensibly to one of the staff of Microsoft, unofficial data has spread over the internet about a new version of the operating system called...
Next Windows will have a new kernel and will get a new interface

New malware is stealing credit card information from POS-terminals

Experts at Seculert found specialized malware that steals details of bank cards from sales terminals under Windows. The malware, named Dexter, is introduced into the system process iexplore.exe, providing it with a restart when disconnected by hand and prepare a list of active processes, each...
New malware is stealing credit card information from POS-terminals

Trojan Android.DDoS.1.origin is capable of DDoS-attacks on various internet resources and can send text messages to the team attacks, says the antivirus company “Doctor Web”. Once installed on the mobile Android-device, the Trojan creates Android.DDoS.1.origin application icon, with...

Russian developers hack encryption of BitLocker, PGP and TrueCrypt

Designed by experts product called Elcomsoft Forensic Disk Decryptor allows unprotect encryption instantly. Specialist company Elcomsoft managed to crack the encryption of BitLocker, PGP and TrueCrypt. All the information is stored in encrypted volumes of data can be analyzed by forensic...
Russian developers hack encryption of BitLocker, PGP and TrueCrypt

Hollywood film company employees convicted of piracy

Staff of Hollywood studios found using torrents at work to download pirated copies of movies, games, and other materials. This was December 25 edition reported by TorrentFreak. The analysis was performed using the service ScanEye, showing downloading any materials produced from a particular...
Hollywood film company employees convicted of piracy

Hacking Gmail account is worth $8000

Attacker tricked accountant to transfer money to bank account. Earlier this year, FBI officially announced the breaking of personal and corporate e-mail addresses for fraudulent transactions. From the publisher Latimes, a resident of Lake Arrowhead, California, Bernie Williams, apparently did...
Hacking Gmail account is worth $8000

India is developing a new operating system for the protection of its cyberspace

Experts began the development of an operating system to become less dependent on foreign operating systems. Staff members of DRDO – Defence Research and Development Organization began to develop their own operating system to create a safer working environment in cyberspace. As of now...
India is developing a new operating system for the protection of its cyberspace

Iran suffered another attack by Stuxnet

As informed by AFP referring to a semi-official news agency in Iran another cyber attack using worm Stuxnet was found. According to the journalist, the victim of the hackers is an industry in the south of the state. Today, Iran’s student news agency (Iranian Students’ News Agency,...
Iran suffered another attack by Stuxnet

China deprives Internet users the right to anonymity

Residents of the state will be required to use real names when registering with Internet providers. China would force people to use their real names when registering network providers. Recall that such a policy is already in use with users of microblogging services. Such government actions have...
China deprives Internet users the right to anonymity

Dual-core smartphones teXet TM-5277 and TM-4577 HD-display

The company Alkotel presented their most powerful model in the line of smartphones – teXet TM-5277 and TM-4577. They are equipped with dual-core processors, IPS-display with HD-resolution 5.2 inch and 4.5 inches, respectively, and also supports two SIM-cards in the standby...
Dual-core smartphones teXet TM-5277 and TM-4577 HD-display

NSA carries out secret pentest on SCADA systems

In the press there is information about a secret project Perfect Citizen, held by U.S. National Security Agency. It turns out, the NSA for months covertly pentested computer systems SCADA, which are used to control critical infrastructure, including power networks, gas pipelines, water supply,...
NSA carries out secret pentest on SCADA systems

Google began to track purchases in offline stores

Google Inc. has announced ( on the site of the subsidiary Doubleclick ) the development of new software interfaces Conversions API , which will allow advertisers to combine online and offline methods to monitor the users / customers, which means that the introduction of more advanced and...
Google began to track purchases in offline stores

Researchers: The level of threats to mobile devices continues to grow

Analyzing incidents in 2012, researchers have concluded that the main problem of mobile security is excessively large number of conflicting platforms. Experts from the field of information security from the international organization CIO Council conducted a large-scale analysis of mobile...
Researchers: The level of threats to mobile devices continues to grow

Kindle Fire tablets are infected

“Kaspersky Lab” warns users of Kindle Fire tablets with malware in Amazon App Store. Researcher from Kaspersky Lab Roel Schouwenberg reported the detection of malicious programs in Amazon app store, which allows unauthorized users to get money for an “empty”...
Kindle Fire tablets are infected

VMware closes a serious vulnerability in VMware View

VMware this week released a patch for the product VMware View, eliminating critically dangerous vulnerability that could allow unauthorized users to gain access to the target file system. “VMware View contains a critical vulnerability when working with directories, allow unauthorized users...
VMware closes a serious vulnerability in VMware View

Issue of protecting SCADA-systems in 2013 will be more relevant

According to experts, in the coming year hackers will actively search for vulnerabilities in SCADA-systems and produce solutions for automatic operation. As reported by Computerworld CEO Dale Peterson, in the upcoming year protection of SCADA-systems from threats will only increase its...
Issue of protecting SCADA-systems in 2013 will be more relevant

Google offers free QuickOffice for Google Apps users

Google has released a free app for iPad, which allows business users to edit their company documents using Microsoft Office. New offer by Google is free a Quickoffice iPad App for the tablet. Google bought QuickOffice manufacturer in June in a campaign to develop its own cloud product offerings...
Google offers free QuickOffice for Google Apps users

Symantec warns of another banking malware

Anti-virus company Symantec on Friday issued a warning about the discovery of a new malicious code, aimed at the U.S. banking environment and customers of U.S. banks. According to the classification Symantec new Trojan called Trojan.Stabuniq, its main task is to collect financial data from the...
Symantec warns of another banking malware

Archos - budget tablet Titanium HD with Retina-screen

Archos, known for producing low-cost tablets, has announced Titanium HD model with a 9.7-inch IPS-screen, which has a resolution of 2048 × 1536 pixels. Running on Android 4.1 and is based on two-core processor, operating at a frequency of 1.6 GHz. Archos Titanium HD is equipped with a graphics...
Archos - budget tablet Titanium HD with Retina-screen

Closed wireless headphones Pioneer SE-DRF41M premium

Pioneer introduces the new closed wireless headphones SE-DRF41M, providing digital quality and clarity. Model transmits audio from your PC, TV or sound system in the 2.4 GHz band. Thanks to SE-DRF41M can listen to your favorite music by being in any corner of your house. Headphones have a...
Closed wireless headphones Pioneer SE-DRF41M premium

MSI introduced tablet-ultrabook Slidebook S20

Micro-Star International presented an interesting tablet – ultrabook Slidebook S20, which is already in summer exhibition Computex 2012. He has a fairly good filling and running Windows 8. New product is positioned as the ideal solution for work and leisure. Slidebook S20 can be used as a...
MSI introduced tablet-ultrabook Slidebook S20

Tajikistan will block 131 sites, including VKontakte and Twitter

RIA Novosti reported, since Friday evening communications service under the Government of Tajikistan has given an order to ISPs about blocking 131 websites, among which are popular social networks as VKontakte , Classmates and Twitter. According to RIA Novosti, the majority of the rest sentenced...
Tajikistan will block 131 sites, including VKontakte and Twitter

Facebook - Add photos using drag and drop

In addition to the changes in the privacy policy, making it possible to ensure the delivery of personal messages for a small fee, the world’s largest social network Facebook is noted by a number of interesting innovations. In particular, it adds the ability to upload and share multiple...
Facebook - Add photos using drag and drop

Oracle showed better than expected quarterly results

Oracle Corporation today reported a profit for the second fiscal quarter, was higher than analysts’ forecasts due to increased demand for internet services in Oracle’s business environment. Earlier the head of Oracle CEO Larry Ellison announced a strategy, according to which it...
Oracle showed better than expected quarterly results

Google is preparing a "killer" iPhone - Ceramic X Phone

It seems, Google bought Motorola Mobility not just for patents. As reported by The Wall Street Journal, in 2013, the Internet giant plans to release a smartphone designed to compete with the iPhone and the top-end models of Samsung Galaxy. Inside Google the project is known as X Phone, but at...
Google is preparing a "killer" iPhone - Ceramic X Phone

Samsung launches 14-nm test processors with FinFET

Samsung Electronics has presented its first 14-nm test chip FinFET. These chips are the second mass-market chips after Intel, received their own implementation of a three-dimensional “sandwich” structure-based 3D-transistors, these transistors Tri-Gate, designed for the new Intel...
Samsung launches 14-nm test processors with FinFET

Instagram promised not to sell custom photos

Instagram co-founder Kevin Systrom denied the possibility of selling custom images without the knowledge of their owners. “There is a certain misunderstanding” – he wrote in his blog. Systrom also said that a “misunderstanding” has caused the outflow of people who...
Instagram promised not to sell custom photos

Experts predict the first murder of the Internet in 2014

Experts of the company Internet Identity (IID) prepared a report on cyberthreats, which may become relevant in the next few years. It is noted that an increasing number of electronic and other devices to access the network which also include both medical devices and some of which are implanted ,...
Experts predict the first murder of the Internet in 2014

Facebook is testing a paid service to send messages

Social network Facebook has begun testing an experimental feature of paid sending of private messages. Their recipients will be people who are not in the friends list of sender. The experiment was conducted on a limited number of U.S. social network users. The cost of sending messages is not...
Facebook is testing a paid service to send messages

Symantec: Cyber ??Threats Forecast for 2013

Symantec Corporation has published a forecast of trends in the world of cyber security in 2013. According to experts of the corporation in 2013, attacks will become more aggressive and will be not only wage espionage, but also to demonstrate the power of attackers. In addition, the number of...
Symantec: Cyber ??Threats Forecast for 2013

Microsoft re-released a patch for PowerPoint

The vulnerability could allow an attacker to execute arbitrary code on the system. Microsoft re-released the patch, which was intended to remedy a serious security flaw in the application font OpenType. Note that after the release of the original version of the patch, the font was unreadable for...
Microsoft re-released a patch for PowerPoint

Assange threatens to publish a million new scandalous documents

In the near future the WikiLeaks will make documents public, “the contents of which will affect all countries in the world.” According to news agency Agence France-Presse, the founder of WikiLeaks Julian Assange said that in the near future on the portal will be a list of documents...
Assange threatens to publish a million new scandalous documents

Sudoku fans have been targeted by hackers

According to Sophos, scammers infect users’ computers with malware which steals sensitive information. Researchers at Sophos found that hackers have infected computers with malware for an amateur game of Sudoku. The virus steals users’  important information. Potential victims...
Sudoku fans have been targeted by hackers

DESTEN CyberBook T357 tablet with a high degree of protection

DESTEN company announced the Tablet PC which is fully protected under the brand CyberBook – Model T357. T357 is protected by the U.S. military standard MIL-STD 810G vibration, shock and drop resistance, the 152 cm tablet is protected from dust and moisture according to IP65, operating...
DESTEN CyberBook T357 tablet with a high degree of protection

VLC media player 2.0.5: Streaming Player

VLC media player is convenient to use the networks to view the media stream. This tool can not only play video transmitted over the internet, but also relay stream data. Program supports UDP Unicast, UDP Multicast (MPEG-TS), HTTP, RTP / RTSP, MMS. The program is more focused on viewing video...
VLC media player 2.0.5: Streaming Player

W3C published full specification for HTML5

Organization World Wide Web Consortium (W3C) has recently published a new version of the full specifications of HTML5. This means that the development of the language is not shaky but appears to be moving toward completion since 2004. It also published the final specifications for the so-called...
W3C published full specification for HTML5

63% of pirated software in Southeast Asia are infected with viruses

According to Microsoft , 63% of pirated software is sold in South-East Asia, and pre-installed on computers that contains malware. Division of the company that deals with computer security, bought 118 samples of disks with pirated software and subjected to analysis for the presence of malicious...
63% of pirated software in Southeast Asia are infected with viruses

Samsung: Our devices do have a vulnerability

Representatives of Samsung Electronics said that the vulnerability fix will be released soon. According Androidcentral, the company Samsung Electronics recognized the flaws in its mobile devices running on chips Exynos. “We are aware of the vulnerability and plan to release a software...
Samsung: Our devices do have a vulnerability

China has blocked encrypted connection

Technology for detecting encrypted connection used to block VPN-connections. Renowned expert in the field of information security, Bruce Schneier published in his blog about the Great Chinese Firewall has recently been capable of detecting and blocking encrypted connection. “A number of...
China has blocked encrypted connection

Dr. Web: A new trojan blocks access to web-sites

Virus blocks access to Internet resources while forcing victims to make a paid subscription to a variety of resources. Dr.Web anti-virus company reported the discovery of a new virus from the family of Trojans, which specializes in blocking access to various Internet sites. Trojan called...
Dr. Web: A new trojan blocks access to web-sites

Windows 8: The main disappointment of the year

Experts of technological institutions consider the new version of the Windows operating system failure. Publication CIO Journal decided to conduct a survey of users about the new operating system Windows 8, in order to find out whether they are satisfied with the innovative edition. According...
Windows 8: The main disappointment of the year

Amazon will release its own smartphone in the middle of 2013

Apparently, the desire of IT-giants to produce mobile devices under their own brand has become a tradition in the modern industry. For example, “good company” Google has already indicated “google phone”. In addition, for a long time there are rumors about the preparation...
Amazon will release its own smartphone in the middle of 2013

Twitter has reached 200 million active users per month

Twitter announced that it has reached the mark of 200 million active users per month. It is noteworthy that in July 2012 the figure stood at 170 million with the total number of registered users, 500 million, which demonstrates the growing statistics on user activity resource – for...
Twitter has reached 200 million active users per month

Best Tablets of 2012

Tablet PC – a relatively new product. This segment appeared only a few years ago, but today without this gadget one cannot imagine his life. And it all began, as usual, with a product of Apple, in this case the iPad and the others. Choice of operating system largely determines the choice...
Best Tablets of 2012

Twitter launches the option of downloading message archive

Remember the joke about downloading “the whole internet”, common in the early days of the World Wide Web? Laugh laugh, but some Twitter users have had the opportunity to do this trick, though, of course, only to archive their messages in this popular microblogging site. As reported...
Twitter launches the option of downloading message archive

Hack into mailboxes fifty Hollywood celebrities

The federal court in Los Angeles on Monday sentenced a resident of the State of Florida a 35-year-old Christopher Chaney to ten years in prison for hacking into a series of e-mail addresses of Hollywood celebrities, and theft of personal photos and their dissemination. In the period from 2010...
Hack into mailboxes fifty Hollywood celebrities

Experts: Hackers broke into the 14 thousand Indian websites in 2012

Companies that host their sites on the Indian hosts, should pay more attention to information security. In 2012, hackers hacked more than 14 thousand Indian sites. reports Help Net Security with reference to the principal analyst for security company Imperva, Steiman Barry (Barry Shteiman)....
Experts: Hackers broke into the 14 thousand Indian websites in 2012

Instagram users outraged

Instagram photo hosting service, introduced in paragraph Agreement under which it reserves the commercial rights to sell all photos uploaded by users. In this case, the owner of images will not receive any fees. Changes will take effect from 16 January 2013. From that day, the company will...
Instagram users outraged

Cisco plans to sell Linksys

Cisco Systems, the world’s premier manufacturer of solutions and equipment for computer networks, intends to sell Linksys, known for home wireless routers, reports Bloomberg. Recall that the vendor was purchased by Cisco in 2003 for half a billion dollars, but is unlikely to sell it for...
Cisco plans to sell Linksys

Experts: Many users can continue to use Windows XP after the cessation of its support

Analysts believe that if Microsoft will not release an update for Windows XP, and users will continue to work with it, it can lead to a global crisis in the field of technology. Many experts doubt that Microsoft will stop supporting the operating system Windows XP. Recall that this time...
Experts: Many users can continue to use Windows XP after the cessation of its support

Indian government has launched a "five-year plan" to update cybersecurity

The authorities intend to establish channels of communication agencies of critical infrastructure in real-time. The Government of India announced the launch of a five-year plan to improve security of critical infrastructure facilities throughout the country. According to the agency (National...
Indian government has launched a "five-year plan" to update cybersecurity

Creator of fake antivirus sentenced to prison

Swedish creator of the fake anti-virus program was sentenced to two years in prison for participating in a number of cyber crimes, because of which fraud victims lost about $71 million. Crime was that developers offer users to buy fake antivirus software, thereby affecting computers. It is...
Creator of fake antivirus sentenced to prison

Microsoft Windows 8 shows error 0xC004C4AA

When you try to illegally obtain a legitimate version of Microsoft Windows 8 shows error 0xC004C4AA. Microsoft has removed the opportunity to get a legitimate version of Windows 8 with false activation through KMS (key management system) and update via Windows Media Center. Recall that this...
Microsoft Windows 8 shows error 0xC004C4AA

Wikileaks found a way to get funding

WikiLeaks payments will be made through a new organization “Fund for press freedom.” The idea of creating the site “Foundation for Press Freedom appeared after WikiLeaks said in Twitter, as a result of blocking its banking operations to the company’s account there are...
Wikileaks found a way to get funding

Wireless and lightweight headphones RAPOO H8060

Looking for an easy and convenient device for home and office, but don’t want to be constrained by lots of wires? Headphones RAPOO H8060 can receive a signal from up to 10 meters from the transmitter, the device will listen to music or watch a movie, not being tied to a particular place....
Wireless and lightweight headphones RAPOO H8060

Apple's iPhone violates patent rights of Sony and Nokia

A jury of the Federal Court of Delaware found that iPhone 3G, 3GS and 4 illegally use patented technology. Federal grand jury in Delaware, USA, found that Apple iPhone violates three patents owned by patent-holding MobileMedia Ideas, formed the company Sony, Nokia, and MPEG LA. The jury’s...
Apple's iPhone violates patent rights of Sony and Nokia

Navigator Prology iMap-7000Tab runs on Android

In winter 2012 the brand Prology introduced new navigator Prology iMap-7000Tab. This model will be suitable for both traditional navigation, and entertainment, in fact, combining the power of a navigator and a tablet based on Android. Navigator Prology iMap-7000Tab 7 inch (178 mm) can be used...
Navigator Prology iMap-7000Tab runs on Android

Hackers conduct DDoS-attacks on U.S. banks

Attacks carried out by a botnet Brobot and fake DNS-servers. According to the company Arbor Networks, for last week observed significant increase in the level of activity of hackers who conduct DDoS-attacks on computer systems of U.S. banks. The intention to carry out attacks by hackers of Izz...
Hackers conduct DDoS-attacks on U.S. banks

McAfee: Hackers are planning a large-scale attack on the United States under the name "Project Blitzkrieg"

According to experts, cyber criminals target at least 30 major U.S. banks. Researchers at antivirus company McAfee have found that cybercriminals are preparing a number of large-scale attacks against the United States, which would be implemented in the spring of next year. The project named...
McAfee: Hackers are planning a large-scale attack on the United States under the name "Project Blitzkrieg"

Leaked: UN report on climate

The document contains information that can “break” the stereotype about man-made climate change. A draft report of the Intergovernmental Panel on Climate Change (IPCC) is freely available on the Internet, which is slated for release in 2014, in which some analysts have considered...
Leaked: UN report on climate

USPTO has recognized a key Apple patent invalid

The verdict of the jury, have recognized Samsung in violation of a number of patents Apple, in connection with which it will have to reimburse the American company damages of more than $ 1 billion, is increasingly questioned, since it is the second patent as those identified in this lawsuit,...
USPTO has recognized a key Apple patent invalid

Update WP8 Apollo + will also support GIF and WAV

Reportedly, Microsoft is preparing a release of updates for smartphones running Windows Phone 8, which could be code named Apollo + or Portico. Previous rumors indicated that the version of the OS can run a VPN (which is important for corporate users), fixes for Wi-Fi connections, and various...
Update WP8 Apollo + will also support GIF and WAV

AnyGlove liquid to use on touchscreen with gloves

For the owners of touchscreen phones there is a good reason not to love the cold season, capacitive touch screens on most cell phones accept the team, give only bare hands and a special stylus. This means that every time we have to remove the gloves and once again freeze our hands, because the...
AnyGlove liquid to use on touchscreen with gloves

Microsoft did not pay UK tax on profits of $ 2.7 billion

Software giant translated online-payments in Ireland and Luxembourg, where the tax rate is much lower. Microsoft did not pay taxes to the British Government from its online-sales of its new operating system Windows 8 and other developments, which is £ 1,7 billion (about $ 2.7 billion). In...
Microsoft did not pay UK tax on profits of $ 2.7 billion

Doctor Web: The site of the Dalai Lama spreads Trojans

The company “Doctor Web” extended the few Trojans with hackers hacked websites. In particular, malicious software downloaded from the official online resource of the Dalai Lama. Puts at risk not only for users of Windows but also Mac OS X. A few days ago, users were informed by...
Doctor Web: The site of the Dalai Lama spreads Trojans

Chobi Cam Pro 2: The smallest camera with Night Vision

It would seem that not so long ago night vision associated with the common man with the bulky military equipment, it is kind of unsightly glasses and cameras. These devices are not just too big and ugly, they weigh a lot more, and cost as a small car. Times change and technology changes with...
Chobi Cam Pro 2: The smallest camera with Night Vision

Driver Magician 3.71: backup drivers

Updated easy to use program for backing up drivers and restore them in Windows. When you reinstall the system usually takes a long time to install a driver for a driver with a different drive. If you have a Driver Magician, you will only need to specify the correct driver, and backs them up. No...
Driver Magician 3.71: backup drivers

Firmware for Plextor M5 Pro increases reading speed up to 100,000 IOPS

Released in early August, a series of 2.5 “solid state drives Plextor M5 Pro professional class received a firmware update that improved work multicore controller Marvell 88SS9187 Monet and speed random read from 94 thousand to 100 thousand operations of input-output operations per second...
Firmware for Plextor M5 Pro increases reading speed up to 100,000 IOPS

Hackers attacked the UN conference in Dubai

Attacks directed against the decisions of the conference, which can tighten Internet censorship. On Monday, December 3, in Dubai, UAE, hosts International Conference on Telecommunications and digital technology, in which, under the auspices of an international organization is attended by...
Hackers attacked the UN conference in Dubai

December issue patches for Windows will contain seven bulletins

According to preliminary reports, Microsoft will release as many as five “critical” bulletins for their products. According to the post of developers Microsoft, December 11 this year, the software giant will release seven security bulletins containing fixes for vulnerabilities in...
December issue patches for Windows will contain seven bulletins

8-character password can be cracked in Windows within 5.5 hours

Security researcher shows how passwords are unreliable today. Security researcher Jeremy Gosney, also known as epixoip, demonstrated how to quickly crack even a complex password, if it is protected with encryption methods which are unreliable. At the conference Passwords ^ 12 in Oslo, Norway,...
8-character password can be cracked in Windows within 5.5 hours

Google Chrome maintains its leading position in the market of Internet browsers

According to the company StatCounter, the most popular browser today is Google Chrome. Analyst firm StatCounter gives evidence that the share of Google Chrome on the market of browsers for the last month has increased from 34.77% to 35.72%. Indicators browser Opera, on the contrary, have...
Google Chrome maintains its leading position in the market of Internet browsers

Switzerland notified the CIA and MI6 of a serious data leakage

Employee in the IT-department for several years carried out the building of NDB sensitive data on a personal hard drive. According to Reuters, the Swiss authorities have warned the intelligence in the U.S. and the UK of serious data breaches, which were stolen by the former member of the...
Switzerland notified the CIA and MI6 of a serious data leakage

Publication of messages in another tweet via SMS fraud

Security expert Jonathan Rudenberg to disclose information about the vulnerability in Facebook, Twitter, Venmo payment system and other services which are linked to the mobile phone number. He has discovered a vulnerability in August 2012 – and notified security departments of the...
Publication of messages in another tweet via SMS fraud

Opera 12.11 vulnerability when opening a GIF-file

In the browser Opera 12.11 there is vulnerable Write AV , which is shown when you open a GIF-file which crashes the browser. Because of incorrect exception handling in Opera when opening a specially crafted GIF-file there is heap corruption. Theoretically, this vulnerability in the browser can...
Opera 12.11 vulnerability when opening a GIF-file

Backdoor to FOREX-traders

Java-applet on a popular Web site Trading Forex (tradingforex.com) used to install backdoors on computers of traders. The malicious code is detected by antivirus company Websense . Experts can not say specifically whether the attackers chose this site to distribute malware, or is it one of many...
Backdoor to FOREX-traders

Spyware Crisis backs up your SSID and RSSI

Symantec has published another article with the new results of the analysis of unique spy program called Crisis. This program is found in July 2012 , and it immediately attracted the attention of anti-virus experts. Crisis affects users of Windows and Mac OS through Java-applet, and the devices...
Spyware Crisis backs up your SSID and RSSI

Malware Shylock determines Remote Desktop Protocol

Malware authors have long since learned to determine the host environment to conceal or deceive the enemy. Well-written malware will not show any activity when running in a virtual machine, or will the so-called false activity . The idea is to make it difficult to reverse engineer the program...
Malware Shylock determines Remote Desktop Protocol

A set of exploits for MySQL

More tools exploit unpatched vulnerabilities in the database management system. In Full Disclosure published a number of exploits for vulnerabilities in the database management system (DBMS) MySQL versions 5.1.x and 5.5.x. Among other things, an anonymous user posted under a pseudonym Kingcope...
A set of exploits for MySQL

September 11 attacks, this time in cyberspace

According to the former head of the U.S. intelligence community, terrorists can cause damage to the banking system and the country’s critical infrastructure. The former head of the National Security Agency U.S. John McConnell said that the state could soon be at a threat of repetition...
September 11 attacks, this time in cyberspace

The IAEA denies theft of sensitive data by breach

According to experts, the hackers could steal secret dossier UN accusations Tehran to develop nuclear weapons. Leaders of the international organization IAEA denies reports that as a result of hacking a computer network department at the beginning of this week, hackers stole sensitive data or...
The IAEA denies theft of sensitive data by breach

DDoS-attacks are not profitable for cybercriminals

According to researchers at Group-IB, hackers are increasingly turning to more profitable types of fraud. According to the experts of Group-IB, DDoS-attacks as a form of criminal earnings is losing its popularity among hackers for a more profitable bank fraud. This was during the 2012...
DDoS-attacks are not profitable for cybercriminals

Julian Assange: Facebook - Dream intelligence

According to the founder of WikiLeaks, a social network is a source of information. Founder of WikiLeaks Julian Assange called the social network Facebook a information resource, which previously any intelligence of any country could only dream of. According to Assange, accounts in social...
Julian Assange: Facebook - Dream intelligence

Austrian arrested for supporting Tor network

The accused is charged with distribution of child pornography. Residents of Austria, William Weber faces up to 10 years in prison for the production and distribution of child pornography. himself accused claims that he was not involved in the crimes – guilty of all but one of its computers...
Austrian arrested for supporting Tor network

Test Post from LetsByteCode

Test Post from LetsByteCode http://letsbytecode.com

Microsoft is preparing a full Linux support in hosting Azure http://ping.fm/XDsbP
Check Point has released a new Security Acceleration Module - Check Point Software Technologies today announced a ne... http://ping.fm/xVPeK
Hackers have created a backdoor in the program Simurgh - The software allows you to hide the name and location of us... http://ping.fm/FdchV
CSIS: observation of the first of its kind tiny banking Trojan http://ping.fm/lrcXs
A hacker broke into servers of GameReplays.org - As a result of exploitation, 10,000 users data has been compromised... http://ping.fm/gareR
American Hospital will pay $ 750,000 for the compromise of data of more than 800 thousand people http://ping.fm/H8ldB
Experts: Companies of Hong Kong a target for Chinese hackers http://ping.fm/Tk4dL
Anonymous attacked Grand Prix, "Formula 1 in Canada - Hackers came out in support of students protesting against a s... http://ping.fm/G96Ai
Flame could exploit the vulnerability in WM Player - Security experts believe that Flame developers can use zero-day... http://ping.fm/WGmJK
McAfee: 17% of users are using unprotected computer systems - The greatest number of unprotected computers were repo... http://ht.ly/1k8XgY
Revealed details of total U.S. Internet monitoring - Special software records the Department of Homeland Security pu... http://ping.fm/yWPdD
New Bit.ly now Bitmark-ED - Good News!!!!!! New subtle yet classy look of bit.ly. As we already know that this is th... http://ping.fm/THt3Y
"Kaspersky Lab" published details of investigation of Flame virus attack http://ping.fm/cd7kL
Oracle has released a beta version of NetBeans 7.2 - Oracle on Friday released a beta version of its free software d... http://ping.fm/nHWSj
Hackers threaten new wave of anti-capitalist attacks - Newly formed hacker movement agitating # OpNewSon Internet us... http://ping.fm/C1WeD
Microsoft employees download pirated content with BitTorrent http://ping.fm/7tinD
"Kaspersky Lab" and the International Telecommunication Union have discovered a new kind of cyberweapon http://ping.fm/uadRO
For 11 months Google has removed about 2.5 million references to infringing Resources http://ping.fm/LfWP3
Researchers have created a TLS extension that can detect fake SSL-certificates http://ping.fm/egzpb
Blocked access to KickAssTorrents - According to the court, blocking access to the pirate sites will prevent crimina... http://ping.fm/tEaCa
Jailbreak Absinthe 2.0 for iOS 5.1.1 - Team Chronic-Dev Team and the iPhone Dev Team announced the release of new ve... http://ping.fm/ly1iF
Trusteer: hackers attack online-banking services in Germany - Hackers used a Trojan horse program that can change th... http://ping.fm/hWOLX
Hackers broke into accounts of Diablo III players - In the course of a successful attack on the servers of the game,... http://ping.fm/xhd2G
Polish sources CERT found fake P2P-traffic - A large number of sources of P2P-wheeled traffic are located in Russia,... http://ping.fm/HWPvn
ICANN: A group of Anonymous should be taken seriously - Vice President Jeff Moss, a hacker group called pretty dange... http://ping.fm/qd7Od
Apple has control over the domain iphone5.com - If you try to go at iphone5.com to users opens a blank page. Previou... http://ping.fm/cFNer
ISC: July 9, 300 thousand infected with DNS Changer computers will be disconnected from the Network http://ping.fm/qg2dI
Setup a Custom App with a Custom Tab Icon on Facebook Page - Setup a Custom App with a Custom Tab Icon using Woobox'... http://ping.fm/usVwT
Add a Custom Pinterest Tab on Facebook Page - Visit http://ping.fm/b4uf6  & click on Install Page T... http://ping.fm/VGDhw
Russian designers have come up with a killer P2P - Company Pirate Pay, which owns the technology to block P2P traffi... http://ping.fm/3w7JI
Trustwave: Hackers are actively exploiting a vulnerability in PHP http://ping.fm/Tc0Q3
Iranian banks were denied the right to communicate with foreign customers through e-mail http://ping.fm/iCfsy
Even Google has to install a security update - The experts of the Research Center PositiveResearch discovered and he... http://ping.fm/lPXZj
The Pentagon intends to expand cooperation with the private sector in the fight against cybercrime http://ping.fm/REtiM
Level 1- Error while creating AVD (Unable to find a userimg.data file for ABI armeabi) http://ping.fm/jfftU
Google Play has fake antivirus - Specialists have found 15 software products that offer "secure" mobile device. Expe... http://ping.fm/TTxaj
Members will pay for the Adobe security update - Removal of a critical vulnerability in Photoshop CS5 will cost $ 19... http://ping.fm/HTLpB
Panasonic has introduced technology to improve road safety http://ow.ly/1jB3JK
The decline in the supply touch panels will be the harbingers of the new iPhone http://ow.ly/1jB3JI
3D-media players Digma HDMP-650 and HDMP-651 with Android http://ow.ly/1jB3JJ
Motorola MOTOGO! with the QWERTY button and Google http://ow.ly/1jASvo
Mac OS Lion stores passwords in cleartext - After the February security update, the debugger log file that stores th... http://ping.fm/Mq3MZ
U.S. will fine Google for "hacking" Safari - The Federal Trade Commission intends to charge the company a fine of $ ... http://ping.fm/agfaF
Anonymous Hackers attacked Kremlin.Ru - Hackers in the group "Anonymous" have brought down this afternoon, the offic... http://ping.fm/FZnld
Trustwave has recorded a new set of exploits on the Web - A set of exploits Redkit uses all of the most well-known v... http://ping.fm/F9LFz
Lockheed Martin will lead the Pentagon Centre for Cybercrime http://ping.fm/gZASE
Syrian authorities are using viruses to fight with the opposition http://ping.fm/JKlF0
Emergency Security Patch for Adobe Flash Player - The vulnerability allows a remote user to compromise a vulnerable ... http://ping.fm/AnnO9
Programming languages ??are not subject to copyright - The Court concluded its hearings SAS Institute and decided th... http://ping.fm/54Rpp
Doctor Web: Android in the sights of new Trojans - Victims of new malicious programs are devices based on Android OS... http://ping.fm/TKmCr
PHP eliminated a vulnerability that existed since 2004 - The vulnerability allows to discover the source code and co... http://ping.fm/g7fHR
Google Drive integrates with Chrome OS - This week, Google announced a long-awaited cloud service Google Drive (Driv... http://ping.fm/YAspm
Microsoft Mail has undergone massive hacking of accounts - A critical vulnerability in the e-mail service Hotmail by... http://ping.fm/9eUxq
Multimedia Player COWON Z2 based on Android - South Korean company, COWON has announced the release of a new multime... http://ping.fm/oMuZi
Sun needs a flexible approach http://ow.ly/1jdsUQ
Aisha India's "sister" Siri - The Indian company has released a smart phone Micromax Superfone A50 Superfone Ninja,... http://ping.fm/Hp8hr
Func GP-14: a game player with Android http://ow.ly/1jdkM6
Duracell on the Protection of Information - Flash drives with USB solidly occupied a niche in the market of devices ... http://ping.fm/JUQlU
Trojan.Spambot.11349 steals accounts from mail clients - The company "Doctor Web", a Russian developer of IT securit... http://ping.fm/hLisZ
Most interesting news and events for the week from 21 to 28 April http://ow.ly/1jdk5U
Reference design NVIDIA GeForce GTX 670 cooler includes a "side" fan http://ow.ly/1jdk5S
Smartphones and Sony Xperia LT29i LT30i with two or four cores will be released this year http://ow.ly/1jdk5T
Trend Micro: Using HTML5 can lead to creation of botnets in browsers http://ping.fm/GQO2X
Kaspersky: Apple lags behind Microsoft's 10 years in the field of information security http://ping.fm/EYN4Z
Phishers prey on bank customers - According to G Data SecurityLabs, banking theme remains popular with phishers. Acc... http://ping.fm/CRUWB
Hackers attacked Philippine portals on the grounds of conflict with China http://ping.fm/SKtUB
Microsoft: Conficker worm and all dangerous - The company has published a global report for the second half of 2011.... http://ping.fm/aDAbZ
Hackers broke into the portal of Afghan government - Government web-site of the Taliban in Afghanistan has been comp... http://ping.fm/iXPBu
U.S. and Britain have closed 36 fraudulent web-sites - Portals with  compromised data on bank cards were blocked. Du... http://ping.fm/5d5xm
PHP IDE Review : CodeLobster - For a long time, I worked in PHP for development. I’ve developed Java Web application... http://ping.fm/heilt
Hacking has led off an oil terminal in Iran - Hackers have introduced malware into the computer system of the Minist... http://ping.fm/Rm8fH
Hackers managed to disrupt the correct operation of CIA site http://ping.fm/UAPmI
India the world leader in terms of outbound spam - Sophos researchers have published a spam report for the first qu... http://ping.fm/7LSjY
Companies do not encrypt critical data - Study systems encryption has shown that, despite last year's incidents of i... http://ping.fm/1I5F6
The gaming industry this week. 16-22 April 2012 http://ow.ly/1j4Dqg
Trojan steals data from IBM through motion sensor and accelerometer phone http://ping.fm/a8ZS4
SpyEye botnets are sold at a reasonable price - Researchers are concerned about attempts to increase the risk of com... http://ping.fm/KTkvU
MalSec: A new group within the Anonymous - Announced a new hacker group Malicious Security (MalSec), which is going ... http://ping.fm/p582y
Facebook users is rapidly approaching one billion people - The number of Facebook users is rapidly approaching one b... http://ping.fm/JCgyw
A critical vulnerability in OpenSSL - The vulnerability allows a remote user to compromise a vulnerable system. Open... http://ping.fm/LqdOJ
Google has detected 20,000 malicious web-sites - Company experts believe that the portals have become the victim of ... http://ping.fm/JZsva
Austria has arrested a 15-year-old hacker - All stolen information by the hacker were published in public domain. Au... http://ping.fm/VN1qE
Hacker from Estonia indicted in the U.S. - An attacker could infect more than 4 million computers around the world w... http://ping.fm/rRLFz
Websense: Traditional methods of protecting computer systems no longer apply http://ping.fm/d8ShO
Facebook users will receive e-mail addresses in accordance with the names of pages http://ping.fm/vhfCd
The new virus for Mac exploits a vulnerability in Java - According to Sophos, the virus as well as Sabpab Flashback ... http://ping.fm/AG9HS
Trend Micro: the most dangerous is the Android mobile OS - According to researchers, the most secure operating syste... http://ping.fm/xZMgw
ISSSource: To Stuxnet worm epidemic intelligence agencies involved in the U.S. and Israel http://ping.fm/x8eMr
Quarterly report on "the worst hosts" - Researchers led the list of the worst hosts, as well as describe the trends ... http://ping.fm/3010l
Linking from one webpage to a section of another webpage - To link from one web page to a section/part of another pa... http://ping.fm/AYLl1
Adobe Photoshop CS6 Beta. Familiarity with the latest version of the popular image editor http://ow.ly/1iKVMX
Savings: the cause of failure of computer systems could be a virus http://ping.fm/X6iEM
Bitdefender warns of fraud on Facebook - Attackers try to force the victim to download a number of malicious applica... http://ping.fm/btWFu
Sophos: Attacks with a black search engine optimization for frequent queries on the eve of Easter http://ping.fm/0vLAS
British Ministry of Internal Affairs website hacked - Hackers of the Anonymous group blocked the website of the Mini... http://ping.fm/9I6aj
The gaming industry this week. 8.2 April 2012 http://ow.ly/1iEShK
Electronic books are gaining popularity http://ow.ly/1iEShL
Flashback virus hit 550,000 vehicles - Malware could hit 550,000 devices based on Mac OS X. Make anti-virus company,... http://ping.fm/8A0in
A large Indian company accused of fraudulent visas - The company designed the backdated documents and did not pay ro... http://ping.fm/avhV3
Dell is going to buy Wyse Technology - Dell has announced an agreement to purchase the defining Wyse Technology, whi... http://ping.fm/6EFBY
European hackers attacked the site of U.S. Department of Health http://ping.fm/ngJIu
The main forum "Al-Qaeda" restored - Web-site Shumukh al-Islam, the main forum of supporters of a terrorist organiza... http://ping.fm/nleyl
How to Use Pinterest for Business - isn't just another social media network. What appears to be the fastest-growing ... http://ping.fm/mwe9m
Hitachi GST has released the first 4-terabyte enterprise hard drive http://ping.fm/dOUli
Visa has stopped cooperation with Global Payments - Visa has removed from the register of Global Payments satisfy th... http://ping.fm/tsCJy
TeaMp0isoN hacked Croatian web-site of NATO - On the home page of the resource hackers posted a message, which indic... http://ping.fm/k20WO
Leonid Kuvaeva spammer was sentenced to 20 years in prison - Kuvaeva sentenced to 20 years' imprisonment and to pay ... http://ping.fm/ttQCE
Researchers have found MBR-rootkit for Android - DKFBootKit can be integrated into the boot process and run up to th... http://ping.fm/4rrIl
Leakage of up to 10 million VISA and MasterCard - Company VISA and MasterCard warned banks about the incident in a U... http://ping.fm/Ohuaz
The gaming industry this week. March 26 - April 1, 2012 http://ow.ly/1iu3tT
Microsoft revealed details of the backup service in Windows Server 8 http://ping.fm/Lstuc
The first flexible E-Ink displays - LG is the world's first mass-producer to begin flexible "electronic paper" disp... http://ping.fm/Bt8Rm
Red Hat has earned a billion dollars - In the free software market you can make big money. The undisputed leader in ... http://ping.fm/NaQ2Q
Add Model Code in Related Product Search in Administration, Opencart http://ping.fm/JWNw9
Java-exploit added to Blackhole Kit - On hacking forums, there was "good news", which added a new set of powerful Bl... http://ping.fm/eajPX
Trojan MacControl found in Word documents - The company's specialists AlienVault found a Trojan that spreads from MS... http://ping.fm/5PAkR
Please do not take down the Sality botnet - "The last couple of days I spent on the study of botnet Sality, which co... http://ping.fm/4n79I
Animated GIFs with 3D effect - American artist and designer Dane Fagerholm (Dain Fagerholm) has mastered a new area ... http://ping.fm/u3eOp
Symantec: Users need money for subscription to a rogue antivirus Windows Risk Minimizer http://ping.fm/1r73q
Microsoft defused another botnet - Armed with a court order, the corporation held a series of raids. Employees of Mi... http://ping.fm/fDCbj
Hacker tools designed for DoS-attacks using UDP-protocol - Hacker and an expert in computer security, who uses an al... http://ping.fm/rt6kJ
Flat Rate Plus Free Shipping Extension, Opencart - This is a pretty cool extension if you are looking out for an off... http://ping.fm/vUWsH
Fatal error: Allowed memory size of bytes exhausted, Opencart http://ping.fm/EtpgH
AutoSEO on opencart : deadcow_SEO - DeadCow SEO is the best auto-seo extension that I have come across. It generates... http://ping.fm/fDKEY
Comparative performance tests of Windows 7 and Windows 8 - PCWorld magazine has published the results of performance... http://ping.fm/VboEI
Banking Trojans Cridex/Dapato infects through WordPress-site http://ping.fm/DsMZH
Cost of 25 petabytes of storage files of Megaupload is $9,000 a day http://ping.fm/Ms5oh
Commodore AMIGA mini chip offers Intel Core i7, 16GB RAM and Blu-ray in a compact package http://ping.fm/H8jQy
AMD Opteron 3200 chips for web hosting - AMD has introduced a new platform designed to create a server for web hosti... http://ping.fm/xvwIv
New iPhone may get a screen with a diagonal of 4.6 inches - New details become known about the next generation iPhon... http://ping.fm/odYYl
Intel canceled the 3.4-watt output of the controller Thunderbolt Cactus Ridge http://ow.ly/1ifK7n
Intel introduced a family of television systems on a chip Atom CE5300 http://ow.ly/1ifK7o
Nokia will dismiss thousands of workers of the plant in Finland http://ow.ly/1ifK7p
Google removed six critical vulnerabilities in Chrome - Google has released an update to Chrome 17.0.963.83, which e... http://ping.fm/55PKv
Firefox will encrypt Google search by default - This innovation allows users to protect themselves from attack by th... http://ping.fm/hiaQQ
Georbot stole classified documents and made audio and video with web-cameras http://ping.fm/ql9Qg
Sites of the largest banks are dangerous to users - Researchers discovered the vulnerability of sites in VTB24, Home... http://ping.fm/gNi0g
First look at ASUS PadFone: Why embedded smartphone into a tablet? http://ping.fm/MswGW
Cybercriminals use fake Google Play to spread malware - On the fake website Google Play mobile applications offer us... http://ping.fm/5iCRj
The new version of the Linux kernel contains code to mobile OS Android http://ping.fm/tVrhg
The Court of India dismissed the case against Microsoft - The lawyer said Microsoft, on the sites of the corporation... http://ping.fm/9sjz7
OPSWAT: Microsoft Security Essentials most popular antivirus program among users of the U.S. http://ping.fm/idyp7
Microsoft: The number of extortionists using malicious programs is rapidly increasing http://ping.fm/Wxc9I
The activities of ICANN have been criticized - In the U.S. Department of Commerce requested that ICANN has tightened... http://ping.fm/AZSQY
Russian hacker has won the contest Facebook Hacker Cup - For winning the contest hacker got 5000 dollars and a troph... http://ping.fm/DidEI
Representatives of music and film industry in India oppose blocking pirate sites http://ping.fm/qNuLl
ElcomSoft Analyzes 17 Smartphones’ Secure Password Managers, Finds No Security http://ping.fm/WbkfQ
Australia held a national contest of cybersecurity - The event will be held for the first time in the history of the... http://ping.fm/J8ffl
Kaspersky Lab has detected "incorporeal" bot - According to the research company, the malicious program is entirely ... http://ping.fm/ntnqX
Banner with a message for the author of SOPA - In the area of residence of the author of the bill SOPA will be locat... http://ping.fm/Nxk2S
Barcelona fans were victims of phishing - Phishers stole credentials of users of social network Facebook, creating a... http://ping.fm/hc3Ho
ISPs in U.S. will deal with violators of copyright on the Internet http://ping.fm/tCg4D
Sophos: Anonymous OS can contain viruses - Experts say you should not trust the operating system, allegedly created ... http://ping.fm/CE3A6
Facebook, Apple and Twitter were charged with illegally accessing personal information of users of smartphones http://ping.fm/6sATA
New protection for IE10 - Development Team 10 Internet Explorer continues to acquaint the public with the new browse... http://ping.fm/20b6F
A drop of water turns a smartphone into a microscope - Camera smartphones are becoming better and better, gradually ... http://ping.fm/AbCgf
The myth of the cyberwar - When it comes to these bombs is more powerful than they are so destructive. In the compu...