The Federal Trade Commission has accused T-Mobile of placing hundreds of millions of dollars of bogus charges onto its customers’ phone bills. Read more…
More:
FTC: T-Mobile Took Hundreds of Millions of Bogus Charges on Phone Bills
The Federal Trade Commission has accused T-Mobile of placing hundreds of millions of dollars of bogus charges onto its customers’ phone bills. Read more…
More:
FTC: T-Mobile Took Hundreds of Millions of Bogus Charges on Phone Bills
Today, following an investigation to which the Microsoft Malware Protection Center (MMPC) contributed, the Microsoft Digital Crimes Unit initiated a disruption of the Jenxcus and Bladabindi malware families. These families are believed to have been created by individuals Naser Al Mutairi, aka njQ8, and Mohamed Benabdellah, aka Houdini. These actions are the first steps to stop the people that created, distributed, and assisted the propagation of these malware families. There are more details about the takedown itself in the latest blog from the Microsoft Digital Crimes Unit . At the MMPC we have been monitoring both malware families for some time. We have observed the Bladabindi family since at least July 2012. Jenxcus came onto the scene as early as December 2012. During the past year, Microsoft detected more than 7, 486, 833 instances of computers operating Microsoft Windows with some version of Bladabindi or Jenxcus. Figure 1: Heat map showing the global impact of Bladabindi and Jenxcus during the past year Figure 2: Machine encounters per month for Jenxcus Figure 3: Machine encounters per month for Bladabindi These families can install backdoor trojans on your computer, which allow criminals to steal your information, such as your passwords, and use your computer to collect other sensitive information. For example, Bladabindi can take snapshots and record videos without your permission. It can also control your system remotely. These backdoor trojans can also upload new components or malware to your computer to add more malicious functionality. They often communicate with hosts that are typically a Dynamic DNS service such as NO-IP because this makes them more difficult to trace. Figure 4: An example dashboard showing how an attacker controls infected machines Figure 5: The possible commands available to the malware writer These malware families spread primarily through social engineering techniques that try to trick unsuspecting victims into carrying out some action which results in their computer getting infected. For example, Bladabindi can be installed when you: Visit a hacked website. Click on a malicious link in a social media message. Receive and open an email “sent” by friends and family who have been infected with the malware. Bladabindi also plants files with enticing names and icons on removable media and linked drives to lure new victims. There are more example of these techniques in our blog MSRT January 2014 – Bladabindi . Most Jenxcus infections occur through torrents and websites when the malware is bundled with other programs or videos. Jenxcus also tries to trick you into installing it by pretending to be a Flash update that you need to install before watching a video. After infecting a computer, Jenxcus leaves enticing shortcut files on removable media that look like songs or other personal files. When opened these files run a copy of the malware. Through our research we have observed that there is information available in public online forums and group discussions, including tutorials, which allow anyone to download a package and create their own versions of the malware. This makes Bladabindi and Jenxcus a bit different from the previous botnets we have seen. A traditional botnet usually has one command-and-control (CNC) server to control all infected machines. In the case of Bladabinda and Jenxcus there can be a syndicate of botnets and thousands of botnet herders. Figure 6: The communication method of the CNC and the infected system Microsoft added Bladabindi to the Malicious Software Removal Tool in January 2014. Jenxcus was added to the MSRT in February 2014. However, with aggressive infection and distribution methods, the malware authors and the distribution system behind them have continued to affect thousands of Microsoft customers every day. Anyone concerned that their computer is infected with malware should follow the guidance available from the Microsoft Support Virus and Security Center . To help stay protected we also recommend you to install an up-to-date, real-time protection security product such as Microsoft Security Essentials . Tanmay Ganacharya and Francis Tan Seng MMPC
Original post:
Microsoft Digital Crimes Unit disrupts Jenxcus and Bladabindi malware families
Instead of paying full price for Microsoft Office for Mac or Windows, you may be able to buy the full version for just $9.95 if you work for a participating company. Read more…
Visit link:
Get Microsoft Office for $9.95 From Your Employer
Chrome: Gmail does an excellent job of blocking spam, but sometimes you just want to go the extra mile and prevent some mail from ever reaching your account. BlockSender is a Chrome Extension for Gmail that can trick the sender into thinking your email address is incorrect. Read more…
See more here:
BlockSender Bounces Email Back to the Sender
An old MUNI bus in San Francisco is getting a second life with a noble cause. Outfitted with toilets and showers, Lava Mae ‘s refurbished bus will bring mobile bathrooms to homeless people around the city. The long-awaited bus will make its first rounds this weekend . Read more…
Visit link:
A Refurbished Bus Will Bring Showers to the Homeless in San Francisco
Today, the Supreme Court has reversed the decision of the Second Circuit in ABC vs. Aereo. Translation? Aereo lost big. It’s now illegal. And that sucks. Read more…
More:
Aereo Down: Supreme Court Kills the Cord-Cutter’s Dream
This symbol first showed up in the 1770s, appearing in documents of English-Americans who had business dealings with Spanish-Americans. However, it wasn’t until the very early 1800s that it became popularized, around the same time as the first official U.S. dollars were being minted. Previous to this, the symbol had already been in use as an abbreviation for names of Spanish currency, namely as an abbreviation for the Spanish peso “p”. Read more…
View post:
Where the Dollar Sign Comes From
OneDrive just more than doubled its free-storage offering, bringing it up to 15GB . That’s the same amount you’ll get with Google Drive. On top of that, all versions of Office 365 now come with a full 1TB of storage attached. That’s a lot of spreadsheets. Read more…
Taken from:
OneDrive just more than doubled its free-storage offering, bringing it up to 15GB.
Tomorrow is launch day in Canada and the U.S. for the Surface Pro 3, and to make sure the device has as smooth a launch as possible, Microsoft has released a set of updates for the tablet-hybrid. The updates include a slurry of performance boosts, as well as a fix for a power button issue that was annoying some. If you have a review device, the code should be live for you now. Otherwise, you… Read More
Link:
Microsoft Updates The Surface Pro 3 Ahead Of Its Release Tomorrow
Microsoft is gearing up to begin shipping its Surface Pro 3 tablet, and many have already had a chance to test out the latest in tablet/laptop hybrids. One early tester is Penny Arcade’s Mike Krahulik (aka Gabe) who was a huge fan of the Surface Pro 2, because with the stylus, it was an awesome digital artist tool for hand-drawn creations. Gabe wasn’t so impressed with the Surface… Read More
Read the original:
Microsoft Brings Penny Arcade Artist To An Engineering Team To Work Out Surface Pro 3 Issues