Michael Jackson hoax
Michael Jackson will come back Michael Jackson is not dead, he’s alive. And he will come back. Soon he will be in the spot light again. He will then wake up humanity with his message: the world is about to be controlled by a secret society or worse, the Antichrist. Michael is in hiding to come back stronger and to expose the New World Order. This is the firm belief of the masses, who seek each other on the Internet. At www.michaeljacksonhoaxforum.com they exchange clues and ideas. They impute Michael of some kind of messianic role. The forum also attracts fierce opponents of the “Jackson-alive’ thought, which results sometimes in threatening messages. That is why these two Dutch initiators use their nicknames Mo and Souza. But Mo does reveal that she’s a 41-year-old resident of Kollumerland. That there’s a consistent pattern in people denying the death of a celebrity, does not Mo’s mind. The evidence showing Elvis is alive is minor in proportion to this case. “Maybe 1/10 part of clues we have about Michael Jackson being alive”. According to Mo and Souza there’s major evidence in the death certificate. “It shows the name Michael Joseph Jackson. That name is not according to his other official identification documents. Those show Michael Joe Jackson as his name. That’s something that can’t be changed overnight”. Soon after Michael’s death was reported they started doubting. Michael was remembered on CNN by his friend Dave Dave, a man whose face has been maimed in 1983 because he deliberately was set on fire by his father. Dave Dave told how Michael took care of him and was like a father to him. Mo and Souza were amazed by Dave Dave’s appearance on CNN: those gestures, that way of talking. “We fell off the couch, and yelled: That’s him!”. Michael’s and Dave’s faces were simply to match by computer. Mo and Souza say say it is unbelievable that the full autopsy was released to the public, while the lawsuit against Jackson’s doctor yet has to begin. The meticulous description of the body does not match the body of Michael, they believe. There is no mentioning of the burns Jackson sustained during shooting a Pepsi commercial. No word on the cosmetic cleft in his chin, or the skin disease lupus. Mo is definitely not a fan of Jackson, she stressed. “The real diehard fans don’t even notice what’s going on. They just write ‘Oh we miss you so much’ on the fan forums, that’s just how far they get. We started investigating because things just don’t add up.” “The ambulance with wich he was transported to the hospital made three attempts to exit the drive way backwards, that makes no sence, as Google Earth shows there’s a huge roundabout on the property. Why didn’t the ambulance speed up, and was there no alarm light nor a sirene?”. To Mo and Souza it’s clear: Michael’s disappearance is linked to other major events: World improvers as Reverend King, President Kennedy and Princess Diana were removed, the secret society of the Illuminati is about to hit, the Age of Aquarius is coming. Kollumerland’s Mo keeps her identity a secret because threats were ventilated towards them. She knows that she’s laughed at, but it is less important. She is convinced that she will have the last laugh when Michael emerges. Please be patient.
NON APRITE LA FALSA E-MAIL DELLA MICROSOFT CHE STA ARRIVANDO IN QUESTI GIORNI !
DA : Microsoft Customer Service” <firstname.lastname@example.org>
OGGETTO : Security Update for OS Microsoft Windows
SEGUE TESTO E ALLEGATO DI 33 KB
QUESTA E-MAIL E’ ASSOLUTAMENTE FALSA E DANNOSA GLI AUTORI DELLA MAIL IN OGGETTO HANNO UTILIZZATO UN SERVER NELLA REPUBBLICA CECA, NULLA A CHE FARE CON I SERVER MICROSOFT.
ALLEGO TESTO E-MAIL :
Dear Microsoft Customer,
Please notice that Microsoft company has recently issued a Security Update for OS Microsoft Windows. The update applies to the following OS versions: Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows Millenium, Microsoft Windows XP, Microsoft Windows Vista.
Please notice, that present update applies to high-priority updates category. In order to help protect your computer against security threats and performance problems, we strongly recommend you to install this update.
Since public distribution of this Update through the official website http://www.microsoft.com would have result in efficient creation of a malicious software, we made a decision to issue an experimental private version of an update for all Microsoft Windows OS users.
As your computer is set to receive notifications when new updates are available, you have received this notice.
In order to start the update, please follow the step-by-step instruction:
1. Run the file, that you have received along with this message.
2. Carefully follow all the instructions you see on the screen.
If nothing changes after you have run the file, probably in the settings of your OS you have an indication to run all the updates at a background routine. In that case, at this point the upgrade of your OS will be finished.
We apologize for any inconvenience this back order may be causing you.
Director of Security Assurance
—–BEGIN PGP SIGNATURE—–
Version: PGP 7.1
—–END PGP SIGNATURE—–
SEGUE ANALISI DETTAGLIATA VIRUS
About 35 percent admitted to not being concerned about cybercrime even though another 20 percent said their companies had been victimized by online crime.
A surprisingly large number of small and midsize businesses appear to be either blissfully unaware of or uncaring about the online security threats they face, according to a survey conducted by security vendor McAfee.
The survey was conducted on officials from 500 US and Canadian companies with less than 1,000 employees each, McAfee said that nearly 45 percent of the respondents didn’t see their businesses as being valuable targets for cyber criminals, while more than half felt their organizations simply weren’t well-known enough to attract the attention of attackers. About 35 percent admitted to not being concerned about cybercrime even though another 20 percent said their companies had been victimized by online crime, and almost one-third of the latter group said they had been attacked at least four times over the past three years.
Perhaps the most surprising finding was that nearly 20 percent of the surveyed companies said they had no security protections at all in place against online threats. Yet 90 percent said they relied heavily on the Internet for their business, noted Darrell Rodenbaugh, senior vice president of McAfee’s midmarket business unit.
“Many SMBs think cybercrime is an issue for larger companies,” Rodenbaugh said. “They think larger companies make better targets because that’s where the money is.” But the reality is quite the opposite, he added.
“Our information says that cyber criminals prefer smaller organizations because they are more easily attacked,” Rodenbaugh said. That’s because smaller companies often have far less manpower and financial resources to invest in IT security than their larger counterparts do.
On average, smaller companies employ just one to two full-time workers to handle all of their IT functions, according to Rodenbaugh. So it isn’t surprising, he said, that many SMBs don’t have anyone dedicated to information security, or that they devote at most an hour per week to security efforts. And often, companies that think they have sufficient protections really don’t, Rodenbaugh said. For instance, roughly half of the respondents who felt their companies had adequate security controls told McAfee that they trusted the default settings on their IT equipment.
For the most part, McAfee’s findings are an accurate reflection of attitudes toward IT security in the SMB market, said Adam Hils, an analyst at Gartner. He agreed that many small and midsize companies, which Gartner considers to be those with between 20 and 1,000 employees indeed don’t think of themselves as likely targets of cyber attacks.
The situation is both the result of a lack of awareness and “a desire to not have to spend on security until you have to,” Hils said. “It’s easy to convince yourself of something if that’s what you want to believe.” But like Rodenbaugh, he said that in actuality, SMBs are more likely to be targets of cyber criminals because their systems increasingly are seen as being easier to break into than the ones at larger companies are.
Hils said that as a percentage of their IT budgets, SMBs do tend to spend more on security than larger companies do typically, 5 percent to 10 percent, as opposed to between 3 percent and 6 percent at bigger businesses. Even so, he added, the actual dollar amounts that small and midsize companies invest in security often aren’t enough to keep them secure. “Most of the time, they’re playing catch-up,” Hils said.
According to Hils, SMBs usually spend most of their security budgets on anti-virus and firewall tools, while focusing less on equally important technologies like intrusion detection and identity management systems. SMBs also tend to prefer working with just one or two security vendors, from which they expect products that address a wide range of threats, he said. That’s one of the reasons why so-called unified threat management, or UTM, technologies have been gaining so much attention among mid-market companies.
|Source : ComputerWorld (US)|
Si tratta di :Bufale e Hoax
What is the MPS?
MPS is a new method to find threats on computer systems, this method uses by a security model to analyze software resources on windows. This security model is analyzing the programs to find unknown threats.
MPS can analyze processes, Modules Kernel and Device Drivers, registry keys, windows services and ports and many other Security feature in windows.
This technique can find many kernel and user rootkits and rates them as a threats (based on security model methods).
MPS mechanism likes a biometric/Robot technology start to prevent attack from automatic application and can freeze them.
Today’s dynamic Internet threatscape is changing so rapidly, that the innovations and creativity applied by malware authors can easily render an information security course’s curricular on malware outdated pretty fast, or worse, provide the students with a false feeling of situational awareness about today’s malware that’s driving the entire cybercrime ecosystem at the end of the day. In fact, one can easily spot an outdated academic curricular on the basis of the malware it’s discussing, and whether or not the lecturer is even bothering to imply that antivirus software the way it is, and the way it’s been for the past couple of years, is only mitigating a certain percentage of the threat, next to eliminating it entirely and urging everyone to “keep their antivirus software up to date.”
George Ledin, a professor at Sonoma State University thinks that coding malware helps students better understand the enemy. What is Ledin trying to achieve anyway?
“Ledin insists that his students mean no harm, and can’t cause any because they work in the computer equivalent of biohazard suits: closed networks from which viruses can’t escape. Rather, he’s trying to teach students to think like hackers so they can devise antidotes. “Unlike biological viruses, computer viruses are written by a programmer. We want to get into the mindset: how do people learn how to do this?” says Ledin, who was born to Russian parents in Venezuela and trained as a biologist before coming to the United States and getting into computer science. “You can’t really have a defense plan if you don’t know what the other guy’s offense is,” says Lincoln Peters, a former Ledin student who now consults for a government defense agency.” “
To code an undetectable malware in an academic environment in order to scientifically prove that signatures based malware scanning wouldn’t detect the just coded malware, or to keeping providing a false feeling of security by the wrongly positioned antivirus software? That’s the question Sonoma State University’s George Ledin seems to asking, and he’s naturally receiving a lot of criticism from companies “making their living fighting viruses” reaching such heights as companies speculating on not hiring his students, now capable of coding malware. The companies however, forget one thing – how easy is in fact to “generate” an undetectable piece of malware using the hundreds of malware builders that they are aware of, ones that come very handy for internal benchmarking purposes for instance.
For the past couple of years, antivirus software has been a pure reactive security solution, namely compared to pro-active approaches embraced by the vendors who are in catch-up mode with the malware authors, it was reacting to known threats. Two months ago, Eva Chen, Trend Micro’s CEO made some very bold, but pretty realistic statements on signatures based malware scanning, and how the entire industry was wrongly positioned for the past 20 years :
“In the antivirus business, we have been lying to customers for 20 years. People thought that virus protection protected them, but we can never block all viruses. Antivirus refresh used to be every 24 hours. People would usually get infected in that time and the industry would clean them up with a new pattern file. In the last 20 years, we have been misrepresenting ourselves. No-one is able to detect five and a half million viruses. Nowadays there are no mass virus outbreaks; [malware] is targeted. But, if there are no virus samples submitted, there’s no way to detect them.”
Precisely, so what Ledin is blamed for is in fact an outdated fact by itself starting from the basic nature of how antivirus software works. The very same outdated approach of proving a known fact will be taken by the upcoming “The Race to Zero” undetectable malware coding contest to be held at this year’s Defcon security conference. Moreover, in between vendors counting how much malware they are detecting, taking a peek at publicly obtainable statistics on detection rates for malware in the wild, you will see how dynamic “the best antivirus software” position is, since it literally changes every day. And theoretically, even “the best antivirus software” wouldn’t be able to detect the malware coded by Ledin’s students, or the one that someone requested to be coded for hire, a service that’s been getting increasingly popular these days due to its customerization approach.
Ironically, the IT underground is a step ahead of George Ledin, using distance learning approaches by including video tutorials on how to use malware kit, including practical examples of successful attacks and providing tips from personal experience while using it. Coding an undetectable malware in 2008 isn’t rocket-science, with do-it-yourself malware builders providing point’n’click features integration that used to be only available to a sophisticated malware author a couple of years ago. Then again, having an undetected malware, doesn’t mean that they’ll be able to successfully spread it and infect millions of users, so from a strategic perspective it’s all about the tactics and combination of tactics that would use in their campaign.
Before you judge Ledin’s vision, ask yourself the following – does coding malware ultimately improve the career competitiveness of his students in the long-term, or isn’t what he’s trying to prove a known fact already?
Written by Dancho Danchev
Si tratta di :News
A New York City man who claimed in an apparent Internet video hoax that he had poisoned millions of bottles of baby food because he wanted to kill black and Hispanic children was arrested on Thursday, the authorities said.
The man, Anton Dunn, caused a video to be posted on YouTube on April 20, Manhattan prosecutors said. In it, he said that he had poisoned bottles of Gerber baby food and that he could not be caught, the authorities said.
Gerber and the Food and Drug Administration found no evidence of tampering. Prosecutors said Gerber received complaints expressing alarm about the safety of its products after people saw the video.
Mr. Dunn is charged with sending threats in interstate commerce and falsely claiming to have tampered with a consumer product.