Firefox add-on shows you how your browsing is being monitored

Mozilla has developed a Firefox add-on called Lightbeam that could change the way you look at your daily Internet activity. Mozilla says that Lightbeam “enables you to examine individual third parties over time and space, identify where they connect to your online activity and provides ways for you to engage with this unique view of the Web.” As you browse, your activity is constantly being monitored by third parties on the websites you visit, often without any signs or warnings whatsoever.

Lightbeam delivers an interactive visualization of each third-party element on the sites you visit, increasing in size with every new site you travel to. All the information is stored locally as well and can be removed instantly by uninstalling the add-on. Mozilla has been passionate about Internet tracking for quite some time and hopes to illuminate the Internet even further with Lightbeam, giving users a simple tool to keep track of the countless connections occurring through their browsers every day.

Spies and watchmen

spies and watchmen

spies and watchmen

A new publication by Wikileaks shows how new technologies massive spying all possible barriers violate the right to privacy. It is the publication of 200 documents about eighty private industry companies espionage and show that the new technologies allow real time spy communications of millions of people. Hidden Programs (or “passive”, in the jargon) that instantly reconstruct conversations from Facebook, MSN or WhatsApp, without the knowledge neither the user nor the provider. Software that allows not only intercept and record a conversation but at the same time to identify who is speaking and from where. Trojans that infect computers and steal their secret communications encryption keys. Everything you do with the phone, internet, or satellite phone handy, or all communications. Everything can be intercepted and somewhere in the world, is being intercepted. Not even sparing the conversation face to face, because the market today offer powerful headphones to listen to anyone anywhere. So click selling satellite equipment.

The documents, which were analyzed in a joint investigation by Wikileaks and nineteen newspapers of the world, show that there is no defense against massive spying technologies available in the market. It is also an industry virtually unchecked opaque, offering everything from missiles to cell phones for special forces in hazardous areas, with panic buttons connected to a GPS, and sensors to detect and send a signal if the user’s phone is dead. As a private industry has not state control and unquoted no public control of big business, but practically their only customers are governments and large enterprises and Internet telephony.

Among the most important documents is a contract to install the program FinFly telephone from the former Soviet republic of Turkmenistan. The program allows infecting computers with a Trojan that is lowered each time a user accepts an update from iTunes, Winamp, Open Office or similar programs. Inclusive offers trout updates available to the user lowers thinking companies are recognized when they are actually sent by FinFly undetectable Trojans. The documents show that the company would Dreamlab FinFly server installed in Oman.

The “Files of spies” have three parts. The first contains brochures of products offered by various companies. The second shows any contracts and confidentiality agreements. The third is the list of countries visited primarily responsible for these companies in recent years through a track that would have made ​​of her cell phone. This file shows that South America is by far the least visited region by these specialists. Just recorded a visit to Brazil by three experts in June to participate in a training seminar IPP company, which was made to train security forces in the region in intelligence techniques. The IPP website shows that the next seminar in Brazil will be in November 2015. Another country, Chile, is mentioned in part two of the files. It is in an agreement signed between the companies Dreamlab and Gamma, written in German, which identifies Chile as well as Switzerland, Bulgaria and Hungary as Dreamlab customers. In other words, under the contract, Chile client would the company that installed the computer program FinFly infection in Turkmenistan and Oman servers.

The satellite tracking of entrepreneur spying industry also show occasional visits to Mexico, which is also mentioned in a brochure of Thales, who explained how he had installed a communications center with 750 police in Mexico City , a kind of police call center for emergency calls.

Worth mentioning that none of these companies, you know, illegal acts. In many countries like Argentina there are no laws against the sale of these tools, but against its use, since the law of 2010 computer security worth the “penetration” of computers, and only the Intelligence Secretariat is authorized to tap phones. But both telephone companies as large ISPs should buy some of these programs to comply with court orders. However, these spy equipment far beyond what any judge can order, at least in Argentina, because one thing is to order the closure of a site or removal of a photo intrusive, another thing is sort of chats espionage or emails.

Here are some of the bells and whistles that appear in brochures business intelligence:

– VasTech : Monitoring massive satellite phone . Discover the communication protocol and analyzes the extracted information. Mobile phone networks and Internet : monitoring massive network data storage , voice recognition , traffic data processing . With the Zebra program can take voice , SMS , MMS , email and fax. You can store ” thousands” of terabytes of information ( A tera thousand gygas ) . You can listen to a hundred thousand conversations simultaneously , or capture interceptions billion per day.

  • Cassidian : missiles and anti-aircraft systems . Sensors and radars. Detection equipment nuclear explosives and chemical weapons . More than 25,000 employees worldwide in 700 projects in 80 countries for over 400 clients .
  • Hidden Technology : All kinds of gadgets and gizmos connected with GPS signals , including devices with magnets to stick them under cars .
  • Glimmerglass , Netoptic , NetQuest : Fiber Optic Technology . You can intercept the submarine fiber optic pipes that take and bring communications from one continent to another to intercept communications of entire countries from outside of these countries , but countries ‘ knowledge. For example, Gmail Hotmail or Skype servers are out of Argentina , come and go through these pipes fiber optic and can be intercepted.
  • Cobham : Intercept tactics. As a person is moving , it changes cell antenna which receives the signal. This program allows you to jump from antenna to antenna with the puncture.
  • Scantarget : Analyze real- time web . Search on SMS , Twitter , Facebook , blog , chat forums , etc. . key words to know if anyone is planning a terrorist attack.
  • Ipoque : massive interception and network monitoring . Detects encrypted protocols such as Skype , BitTorrent , SSLand and VPN tunnels . You can search the web up to 25,000 keywords simultaneously.
  • Qosmos : Software that intercepts 550 000 gygabits in real time. All communications of a city like Lauquen Dam fit in 200 gygabits . It also allows more than one thousand enforce “rules” or instructions simultaneously.
  • Silicom : Give a ” redirector ” that acts as a triple plug to redirect electricity to more than one place. In this case you can redirect millions of data to another country or a spy agency without the user or the provider of value added services to find out, using the technique ” man in the middle ” (man in the middle) , which in this case would be duplicated and redirects interceptor communication. 
  • Autonomy Virage : Cameras and face recognition .
  • CRFS : radiofrequencias monitoring . Radios detection trout. Intercept radio communications.
  • Berkeley electronics: microphones detects interference on cellular communications .

From today “spies files” are available on the site Wikileaks

By  Santiago O’Donnell

5 Firefox Security Settings for Safety

Firefox Security Settings for Safety

It’s time for Halloween in the U.S. and people have scary things on their mind. There are scary things on the Internet as well, but Firefox doesn’t want you to get “tricked.” For a Halloween “treat” instead, here’s an overview of some of the security settings you’ll find in Firefox.

For PC users, go to your Firefox Menu and select Options > Options. In that menu, click on the Security tab (with the lock icon). Here are some of the settings you can chose to increase (or decrease) your security on Firefox and how they can protect you:

Firefox Security Settings for Safety

  • Warn me when sites try to install add-ons: Firefox will always ask you to confirm installations of add-ons (those little pieces of software that enhance your Firefox experience — a full list found here). To prevent unrequested installation prompts, Firefox warns you when a website tries to install an add-on and blocks it. You can add exceptions to this rule for sites you trust — just click Exceptions, enter the site name and click Allow.
  • Block reported attack sites: Check this if you want Firefox to check whether the site you are visiting may be an attempt to interfere with normal computer functions or send personal data about you to unauthorized parties over the Internet (note that the absence of a warning does not guarantee that a site is trustworthy).
  • Block reported Web forgeries: Check this if you want Firefox to actively check whether the site you are visiting may be an attempt to mislead you into providing personal information (this is often referred to as phishing). (Note that the absence of a warning does not guarantee that a site is trustworthy. For more information, see How the phishing and malware protection in Firefox works.)
  • Remember passwords for sites: Firefox can securely save passwords you enter in Web forms to make it easier to log in to websites. Clear this checkbox to prevent Firefox from remembering your passwords (for example, if you’re on a public computer). Even with this checked, however, you’ll still be asked whether to save passwords for a site when you first visit it. If you select Never for This Site, that site will be added to an exceptions list. Use Exceptions to access that list.
  • Use a master password: Firefox can protect sensitive information such as saved passwords and certificates by encrypting them using a master password. If you create a master password, each time you start Firefox it will ask you to enter the password the first time it needs to access a certificate or stored password. You can set, change or remove the master password by checking or unchecking this preference or by clicking the Change Master Password… button. If a master password is already set, you will need to enter it in order to change or remove the master password.

And that’s just what’s available in the Firefox Security Settings menu. Firefox is all about defending your Internet privacy and security with features like Private Browsing  and Do Not Track,  among others. Read the blog post on 6 ways to stay secure on Firefox or read this for a comprehensive list of Firefox Security features and stay safe online!

Article published on mozilla.org

Removal Guide of Backdoor.Win32.Poison.ckym

Is your computer infected with trojan Backdoor.Win32.Poison.ckym? Having trouble getting off Backdoor.Win32.Poison.ckym by yourself? This step-by-step guide can help you safely and quickly remove Generic.dx!baaq virus.

Backdoor.Win32.Poison.ckym Description

Backdoor.Win32.Poison.ckym is very dangerous trojan that can allow allows remote access to your system. Backdoor.Win32.Poison.ckym hides in the system very secretly, it disguides as some important files which vary from different computers. Those pirate files hide away the original files and add themselves to the same locations, many people will not realize they are runing a virus when then click on the subrogated files. Backdoor.Win32.Poison.ckym is capable to take administrative control to the infected system and it shields your own security center, firewall and deactivate a lot other software. What Backdoor.Win32.Poison.ckym does is to make your computer more vulnerable and under attack. Backdoor.Win32.Poison.ckym exploits security holes in the back ground and connects malicious sites to download spyware to your system.

What Harms does Backdoor.Win32.Poison.ckym do to a Computer?

  1. Trojan Backdoor.Win32.Poison.ckym is installed/ run without your permission and won’t allow you to remove it.
  2. Trojan Backdoor.Win32.Poison.ckym compromises the infected computer and welcome all kind of parasites to enter the infected system.
  3. Trojan Backdoor.Win32.Poison.ckym gives difficulty to web browser activities and gives randomly redirects.
  4. Trojan Backdoor.Win32.Poison.ckym can modify import system files and registry entries which may deactivate a lot of functions on the system.
  5. Trojan Backdoor.Win32.Poison.ckym dreadfully slows down computer speed and makes your computer stuck frequently.

How to Remove Backdoor.Win32.Poison.ckym Completely and Safely

Backdoor.Win32.Poison.ckym has added a lot of registry entries and files to the system, you just need to find out the locations and delete them, and then virus will be gone. Please be aware that manual removal of Backdoor.Win32.Poison.ckym requires expert skills dealing with registry editor, program files, dll. files, processes, any mistake may lead to system malfunction. It is recommended to contact Tee Support online computer experts for help to get rid of Backdoor.Win32.Poison.ckym safely and quickly.

1. Press Ctrl+Alt+Del to open Taskmanager and stop Backdoor.Win32.Poison.ckym Process:

[Random].exe

2. Check the following directories and remove Backdoor.Win32.Poison.ckym associated files:

C:\Program Files\[random]

C:\WINDOWS\system32\[random]

C:\Documents and Settings\[user name]\Application Data\[random]

C:\Documents and Settings\[user name]\Local Settings\Temporary Internet Files\[clear all the files inside]

C:\Documents and Settings\[user name]\Local Settings\Temp\[clear all the files and folders inside]

3.The registry entries of Backdoor.Win32.Poison.ckym that need to be removed are listed as follows:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "[random].exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{ } "[random].exe"

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main “Start Page” =>"random"

Spyware tips

Spyware is any kind of software that collects personal information on your computer, like surfing habits, browsing history, etc. in order to deliver advertisements for products or other services without the users consent.

A brief history of spyware

Spyware first started picking up steam around the year 2000, mainly as software that delivered annoying popup ads while browsing the internet.  Since then, it has created two major industries; the companies that deliver spyware for advertising revenue, and the many companies that create spyware removal software, both free and to purchase.

AOL partnered with the National Cyber-Security Alliance in 2005 to conduct a study about spyware, and found that 61 percent of people surveyed had some form of spyware, 92 percent of which didn’t know it was present, and 91 percent of which did not give permission for it to be installed.

While spyware started out as being mildly intrusive, just displaying advertisements and such, spyware has grown into a virus like industry.  Spyware these days can changecomputer settings like redirecting web traffic, disabling operating system features, essentially disabling the user’s ability to use the computer properly.

Some spyware today even goes as far as searching for known spyware removal software and removes them upon installation, making their software that much harder to remove.

The spyware threat keeps getting worse

Once the term Spyware was well known, and spyware removal software was more abundant, the spyware industry looked to be stomped out of existence for a short time.  But the companies that create spyware started using more advanced techniques to infect their users, and started making their software harder than ever to remove.

Infection can happen many ways now.  Spyware can be bundled with any type of other software, and most commonly through software that is “required” to perform some sort of function on a website.  For example, you might want to download a file from a website, but in order to do so they require you to use their software to retrieve the file, and by agreeing to their terms of service you are also agreeing to install their bundled spyware.

Spyware can be installed from several other methods as well.  Here are some of the most common methods:

  • In file sharing networks like Limewire, spyware companies cloak their files to appear like movies or songs, but once you try to play them it installs their software
  • Popup windows that claim you are “infected” with spyware and to click on their box to remove it, but what it’s really doing is installing spyware on your system
  • Some websites cloak their spyware inside of ActiveX controls (like an embedded movie player), installing their software once you agree to install the ActiveX component
  • Toolbars for your internet browser

Some of the nastiest spyware I’ve seen lately is nearly impossible to remove, even with good spyware removal software and a good computer technician.  One that I came across recently not only persisted after removal, but Windows essentially stopped functioning entirely after removal was attempted since the files were so extremely embedded into theoperating system.

Spyware Removal

Back when spyware was first introduced, it wasn’t really that hard to remove if you knew what to look for, like unrecognized programs in the startup section of your registry, etc.

Spyware today is not so easy to remove.  Not only are they hidden from your list of installed programs, but even if they are listed, removing from there doesn’t normally get rid of the software.  Most of today’s spyware has services that run in the background looking to see if the program is removed or stopped, and reinstalls or starts it back up again if this is detected.

My favorite program for removing spyware is Spybot Search and Destroy.  It’s not only free, but it’s very good at its job as well.  Spybot doesn’t just remove spyware, it also has features to help block future infections, a feature naturally called “immunization”.

There are a few others I have used in the past as well, like AdAware.  Microsoft also has a free product called Windows Defender that features automated scans, and has the abilty to detect spyware and keep it from being installed once installation is detected.

Always do your homework before installing any software that claims to remove spyware, since this is a very popular technique lately to install even more spyware, forcing you to purchase their software to get rid of what they installed in the first place.

Software

Twitter Worm Spreading via Direct Messages

The word of the day today is “Phishing”. It’s sounds like fishing, but instead of using bait to catch smelly swimming fish, you cast your lines (links) and try to catch unsuspecting half-awake people or moms trying to use the computer.

I noticed my email inbox was full of messages from Twitter. Tons of news direct messages, but they looked like they were from robots so I saved it for later. Then I found this being reported on Mashable this morning.

We have received multiple reports that a new, convincing, and dangerous worm and phishing scam is making the rounds on Twitter. Hacked accounts are sending DMs to users and stealing their login information. In fact, one of our own has received one of these direct messages.

Unsuspecting users are receiving DMs with the following text:

Tweetie

f you get this DM, DO NOT VISIT THE LINK. It takes you to a replica of the Twitter login page where the hackers will steal your account and use it to send out more infected DMs to your friends.

If you’re one of the unlucky ones to be fooled by this worm, make sure you change your password. Also delete any tweets or DMs that have the link. If you can’t log into your account, reset the password and contact Twitter Support.

This is not the first worm to hit Twitter, but this one is especially dangerous because the login page is convincing and it is spreading via DMs from friends you trust.

Make sure you guys never click on links you don’t trust and never give out your password. Just in case you need a refresher.

Update:

“Not on Twitter. You should get cyber filters on your email and this would lessen the impact. Once they have your password changing it won’t do much cos the scammers will ask for it to be sent to them as they forgot it.”
Thank you to: Backintheair