WooHoo! At last! Just before christmas Angry Birds appeared in AppWorld.
[Info]Get the HD version here.[/Info]
They released 3 different versions, below a screenshot of the Rio version.
[Info]Get the Rio version here.[/Info]
And the Angry Birds Seasons which is also fun to play.
And it looks amazing on the PlayBook, and plays even better.
[Info]Get the Seasons version here.[/Info]
Hope you have as much fun as I did!
Exactly how people will abuse digital technology for their own ends is difficult to predict, but organizations must plan ahead to protect data and systems.
That’s why eset have been posting their “best guess” cybersecurity predictions on their Threat Blog this month.
Here are 9 of the most important predictions in the form of a short video.
I am using Eset NOD32 an all my systems and highly recommend this software, http://www.eset.com/
In the world of Android, a successful attack on applications hosted on Google’s Android Market is equivalent to a successful attack using Black hat search engine optimization routines, which are often seen in Windows malware, primarily in fake anti-virus software.
By exploiting the reputation of the most reputable content source, Android Market or a search engine, attackers can build a platform for launching attacks, often in the hope of making some money.
The latest two-pronged attack on the Android Market was launched by a malicious developer Logastrod. Logastrod exploited the ease of cloning Android apps, made “trojanized” copies of many popular games and uploaded them to the Market.
The attacker created at least a dozen copies of the most popular games and published them as a free version after adding code to send SMS messages to premium line numbers.
The malicious apps were published to the market early in the morning yesterday in pacific time, most probably to allow the attacker for more time before the applications are removed by the Google security team.
The list of cloned games included:
Misusing premium SMS services is the most common model for malicious mobile malware. When a malicious app is installed, it starts sending or receiving messages, which makes the installation very expensive for the user. The damage is often seen only when it is too late, once a monthly bill is received.
After more than a day on the market, the applications were pulled off by the Android Market security team. Google’s reaction has been quick, but not quick enough – at least ten thousand users downloaded one of the malicious apps from the list.
Naked Security already stated several times that the requirements for becoming an Android developer that can publish apps to the Android market are far too relaxed. The cost of becoming a developer and being banned by Google is much lower than the money that can be earned by publishing malicious apps.
The attacks on Android Market will continue as long as the developer requirements stay too relaxed.
Via Naked Security
Ambulances were allowed to return to Gwinnett Medical Center in Lawrenceville after information technology experts repaired a computer virus that affected the hospital’s entire computer system.
confirmed they detected the virus Wednesday afternoon but could not tell where it came from.
An employee told Channel 2 Action News that the problem got progressively worse until Gwinnett Medical decided to declare
“total diversion” status for its Lawrenceville and Duluth campuses, meaning that, except for extreme emergencies, ambulances had to divert patients to other hospitals in the area.
By Friday night, Gwinnett Medical improved its status to “trauma diversion” only, meaning ambulances could resume bringing
nontrauma patients to the hospitals. A hospital spokeswoman said Saturday afternoon that the hospital had transititioned from paper records to an online system and the facililty had returned to accepting all patients.
“We’ve had a virus to interrupt our system within our hospital,” said Gwinnett Medical Center spokeswoman Beth Okun. “It’s not affecting patient care in any way, shape or form.”
Okun said the virus affected computer interconnectivity, meaning hospital computers are not speaking with each other. That has forced
the hospital to go to a runner system, where needed papers are shuttled by runners from station to station.
Okun added that the virus has attacked interconnectivity only and is not affecting any databases. She assured patients that medical records have not been compromised in any way.
Okun said they did not know how the virus got into the system or when the system might resume normal functions.
“We actually have some of our IT vendor partners that are on site with us that have actually been here since Wednesday,” said Okun. “We’ve also got internal teams that are trying to identify the virus issues.”
Claudio Timoftica learned about the virus while visiting a patient at the hospital. He said the problem has caused delays getting back test results.
“Only somebody without a conscience or a heart would go after a hospital,” said Timoftica. “I don’t know what kind of person he
is, but obviously not that good.”
A group of hackers in China breached the computer defenses of America’s top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter.
According to several sources familiar with the investigation, it seems that the hackers have initially gained access by sending spear phishing emails rigged with malicious links to the Chamber’s employees. One (or more) of them must have followed the link and unknowingly installed the malware.
The break-in at the U.S. Chamber of Commerce is one of the boldest known infiltrations in what has become a regular confrontation between U.S. companies and Chinese hackers. The complex operation, which involved at least 300 Internet addresses, was discovered and quietly shut down in May 2010.
It isn’t clear how much of the compromised data was viewed by the hackers. Chamber officials say internal investigators found evidence that hackers had focused on four Chamber employees who worked on Asia policy, and that six weeks of their email had been stolen.
It is possible the hackers had access to the network for more than a year before the breach was uncovered, according to two people familiar with the Chamber’s internal investigation.
One of these people said the group behind the break-in is one that U.S. officials suspect of having ties to the Chinese government. The Chamber learned of the break-in when the Federal Bureau of Investigation told the group that servers in China were stealing its information, this person said. The FBI declined to comment on the matter.
A spokesman for the Chinese Embassy in Washington, Geng Shuang, said cyberattacks are prohibited by Chinese law and China itself is a victim of attacks. He said the allegation that the attack against the Chamber originated in China “lacks proof and evidence and is irresponsible,” adding that the hacking issue shouldn’t be “politicized.”
In Beijing, Foreign Ministry spokesman Liu Weimin said at a daily briefing that he hadn’t heard about the matter, though he repeated that Chinese law forbids hacker attacks. He added that China wants to cooperate more with the international community to prevent hacker attacks.
The Chamber moved to shut down the hacking operation by unplugging and destroying some computers and overhauling its security system. The security revamp was timed for a 36-hour period over one weekend when the hackers, who kept regular working hours, were expected to be off duty.
Chamber officials say they haven’t been able to keep intruders completely out of their system, but now can detect and isolate attacks quickly.
The Chamber continues to see suspicious activity, they say. A thermostat at a town house the Chamber owns on Capitol Hill at one point was communicating with an Internet address in China, they say, and, in March, a printer used by Chamber executives spontaneously started printing pages with Chinese characters.
“It’s nearly impossible to keep people out. The best thing you can do is have something that tells you when they get in,” said Mr. Chavern, the chief operating officer. “It’s the new normal. I expect this to continue for the foreseeable future. I expect to be surprised again.”
Read more here via wsj
The loose-knit hacking movement “Anonymous” claimed Sunday to have stolen thousands of credit card numbers and other personal information belonging to clients of U.S.-based security think tank Stratfor. One hacker said the goal was to pilfer funds from individuals’ accounts to give away as Christmas donations, and some victims confirmed unauthorized transactions linked to their credit cards.
Anonymous boasted of stealing Stratfor’s confidential client list, which includes entities ranging from Apple to the U.S. Air Force to the Miami Police Department, and mining it for more than 4,000 credit card numbers, passwords and home addresses.
“Not so private and secret anymore?” the group taunted in a message on Twitter, promising that the attack on Stratfor was just the beginning of a Christmas-inspired assault on a long list of targets.
Anonymous said the client list it posted was a small slice of the 200 gigabytes worth of plunder it stole from Stratfor and promised more leaks. It said it was able to get the credit details in part because Stratfor didn’t bother encrypting them — an easy-to-avoid blunder which, if true, would be a major embarrassment for any security-related company.
Austin, Texas-based Stratfor provides political, economic and military analysis to help clients reduce risk, according to a description on its YouTube page. It charges subscribers for its reports and analysis, delivered through the web, emails and videos.
Lt. Col. John Dorrian, public affairs officer for the Air Force, said that “for obvious reasons” the Air Force doesn’t discuss specific vulnerabilities, threats or responses to them.
“The Air Force will continue to monitor the situation and, as always, take appropriate action as necessary to protect Air Force networks and information,” he said in an email.
Miami Police Department spokesman Sgt. Freddie Cruz Jr. said that he could not confirm that the agency was a client of Stratfor, and he said he had not received any information about a security breach involving the police department.
It soon became clear that proprietary information about the companies and government agencies that subscribe to Stratfor’s newsletters did not appear to be at any significant risk, and that the main threat was posed to individual employees.
Hours after publishing what it claimed was Stratfor’s client list, Anonymous tweeted a link to encrypted files online with the names, addresses and account details.
“Not as many as you expected? Worry not, fellow pirates and robin hoods. These are just the “A”s,” read a message posted online that encouraged readers to download a file of the hacked information.
It also linked to images online that it suggested were receipts for charitable donations made by the group manipulating the credit card data it stole.
“Thank you! Defense Intelligence Agency,” read the text above one image that appeared to show a transaction summary indicating that an agency employee’s information was used to donate $250 to a non-profit.
One receipt — to the American Red Cross — had Allen Barr’s name on it.
Barr, of Austin, Texas, recently retired from the Texas Department of Banking and said he discovered last Friday that a total of $700 had been spent from his account. Barr, who has spent more than a decade dealing with cybercrime at banks, said five transactions were made in total.
“It was all charities, the Red Cross, CARE, Save the Children. So when the credit card company called my wife she wasn’t sure whether I was just donating,” said Barr, who wasn’t aware until a reporter with the AP called that his information had been compromised when Stratfor’s computers were hacked.
“It made me feel terrible. It made my wife feel terrible. We had to close the account.”
Stratfor said in an email to members that it had suspended its servers and email after learning that its website had been hacked.
“We have reason to believe that the names of our corporate subscribers have been posted on other web sites,” said the email, passed on to The Associated Press by subscribers. “We are diligently investigating the extent to which subscriber information may have been obtained.”
The email, signed by Stratfor Chief Executive George Friedman, said the company is “working closely with law enforcement to identify who is behind the breach.”
“Stratfor’s relationship with its members and, in particular, the confidentiality of their subscriber information, are very important to Stratfor and me,” Friedman wrote.
Repeated calls to Stratfor went unanswered Sunday and an answering machine thanked callers for contacting the “No. 1 source for global intelligence.” Stratfor’s website was down, with a banner saying “site is currently undergoing maintenance.”
Wishing everyone a “Merry LulzXMas” — a nod to its spinoff hacking group Lulz Security — Anonymous also posted a link on Twitter to a site containing the email, phone number and credit number of a U.S. Homeland Security employee.
The employee, Cody Sultenfuss, said he had no warning before his details were posted.
“They took money I did not have,” he told the AP in a series of emails, which did not specify the amount taken. “I think ‘Why me?’ I am not rich.”
One member of the hacking group, who uses the handle AnonymousAbu on Twitter, claimed that more than 90,000 credit cards from law enforcement, the intelligence community and journalists — “corporate/exec accounts of people like Fox” news — had been hacked and used to “steal a million dollars” and make donations.
It was impossible to verify where credit card details were used. Fox News was not on the excerpted list of Stratfor members posted online, but other media organizations including MSNBC and Al-Jazeera English appeared in the file.
Anonymous warned it has “enough targets lined up to extend the fun fun fun of LulzXmas through the entire next week.”
The group has previously claimed responsibility for attacks on companies such as Visa, MasterCard and PayPal, as well as others in the music industry and the Church of Scientology.
Via Ap Wire
The latest update to Facebook® for BlackBerry® PlayBook™ tablet – version 2.1 – launched today in the BlackBerry App World™ storefront, and it includes a much-requested feature – Facebook Groups.
Let’s take a look at what’s new in this release.
Facebook Groups is designed to let you share and interact with the groups that you are interested in the most. With Facebook Groups on the BlackBerry PlayBook tablet, you can view groups that you’re a member of, post updates, photos and videos, view profiles of group members and send messages, and get notified of new group posts and interactions so you never miss an update.
Improved Media Access
You let us know in your comments and feedback that media viewing and uploading wasn’t intuitive in the application. We heard you loud and clear, and the Facebook app team has made some improvements by adding new photo and video buttons on the Photos tab to make it even easier to view friends’ photos and videos from their Profiles. The photo and video uploading capabilities are also now more apparent on the Photo tab, and are accessible from your Profile or through the Photos feature on the navigation grid. Simply click the Photos or Videos button to upload the corresponding media type.
If you haven’t already downloaded Facebook for BlackBerry PlayBook tablet v2.1, you can do so by going to BlackBerry App World.
Published on Inside BlackBerry Blog .
Folks at N4BB have made a nice demo video on how to setup a hotspot with your BlackBerry;
Original link here
Volkswagen has agreed to stop its Blackberry servers sending emails to some of its employees when they are off-shift.
The carmaker confirmed it made the move earlier this year following complaints that staff’s work and home lives were becoming blurred.
The restriction covers employees in Germany working under trade union negotiated contracts.
Campaigners warned that the move would not be suitable for all companies.
A spokesman for VW said: “We confirm that this agreement between VW and the company’s work council exists”, but would not comment further.
Under the arrangement servers stop routing emails 30 minutes after the end of employees’ shifts, and then start again 30 minutes before they return to work.
“We wanted to take a preventative approach to tackling the issue,” said Gunnar Killian, VW’s works council spokesman.
“At Volkswagen flexitime is between 0730-1745, with our new arrangement workers can only receive emails between 0700 and 1815.”
The move follows criticism of internal emails by Thierry Breton, chief executive of the French information technology services giant, Atos. He said workers at his firm were wasting hours of their lives on internal messages both at home and at work. He has taken the more radical step of banning internal email altogether from 2014.
Last month the maker of Persil washing powder, Henkel, also declared an email “amnesty” for its workers between Christmas and New Year saying messages should only be sent out as an emergency measure.
Industry watchers say the moves reflect growing awareness of a problem.
“It’s bad for the individual worker’s performance being online and available 24-7. You do need downtime, you do need periods in which you can actually reflect on something without needing instantaneously to give a reaction,” said Will Hutton, chair of the Big Innovation Centre at The Work Foundation.
“Secondly it has a poor impact on an individual’s well-being. I think that one has to patrol quite carefully the borderline between work and non-work.
“So I can see why some firms are taking this action, the problem is that a universal response is impossible… but certainly we should have the capacity to be opted out of it rather than be opted in.”
Union officials in the UK have also cautioned other firms against repeating Volkswagen’s move without consultation.
“The issue of employees using Blackberrys, computers and other devices out of working time is a growing one that needs to be addressed as it can be a source of stress,” Trades Union Congress (TUC) secretary general Brendan Barber told the BBC.
“However other organisations will need different solutions and what works in VW may not work elsewhere.
“By working in partnership with their union, Volkswagen’s policy will have the support of all their employees. Where employers simply introduce policies on their own, however well-meaning they may be, they are unlikely to be successful.”
Via BBC News