Sunday, January 31, 2016

"In Private" Mode might not be "Private" - in EDGE Browser


Any vendor who gives away something free will need to get something back.
That they could use to make money.


From the Article:
Somewhat counterintuitively, Edge actually records browsing history in InPrivate mode. More than this, by examining the WebCache file it is a relatively simple task for someone to reconstruct full browsing history, regardless of whether surfing was performed in regular or InPrivate mode.

Microsoft is aware of the problem, and says:
We recently became aware of a report that claims InPrivate tabs are not working as designed, and we are committed to resolving this as quickly as possible.



For More Info:

Thursday, January 28, 2016

Java changed the world including Browsers - Now the Browser Plug-in is going to vanish



The product performed magic but could not handle the attacks.
Not to forget that we were forced to use older versions because the Java based applications were not catching up with new release of Java.

Anyway I liked the plug-in



From the Article:

Oracle has announced its intent to nail the coffin shut on the Java browser plugin.

The company confirmed Wednesday that it expects to deprecate the plugin in JDK 9, slated for release in September, and JRE, in a future Java SE release.



For More Info:
https://threatpost.com/oracle-to-kill-java-browser-plugin/116065/

Tuesday, January 19, 2016

Tuesday, January 12, 2016

Meet Trochilus - Dangerous RAT (not the rodent) that runs only in Memory



New Remote Access Trojan with a twist


From the article:
Named Trochilus, the malware is part of a multi-pronged malware operation that researchers at Arbor Networks are calling the Seven Pointed Dagger (.PDF).

The malware doesn’t leave much of a trace, and is skilled at evading detection, according to a report on the operation published Monday.

“This malware … appears to run only in memory and does not leave a footprint on the disk, except in the form of encoded files that do not execute by themselves and are resistant to static file malware detection processes and static analysis,” the report reads.


For More details
https://threatpost.com/new-rat-trochilus-skilled-at-espionage-evading-detection/115857/

Monday, January 11, 2016

Interesting - Seven factors that contribute to the normalization of deviance:


Normalization of deviance:
Means that people within the organization become so much accustomed to a deviant behavior that they don't consider it as deviant, despite the fact that they far exceed their own rules for the elementary safety)

 By John Banja , for Healthcare industry.
I am sure it can be generally applied


  1. The rules are stupid and inefficient!
  2. Knowledge is imperfect and uneven.
  3. The work itself, along with new technology, can disrupt work behaviors and rule compliance.
  4. I'm breaking the rule for the good of my patient!
  5. The rules don't apply to me/you can trust me.
  6. Workers are afraid to speak up.
  7. Leadership withholding or diluting findings on system problems





For more details:

Reminder - Support for Internet Explorer 10 and below ends in 2 days so, Upgrade IE or use Firefox (or any other up-to-date browser






Here is a Technet article on benefits of IE 11 (if you are an IE fan)

https://technet.microsoft.com/en-us/browser/mt163707.aspx



IE 11 does have enterprise mode that could be useful for companies that are still using (most of them are) IE

https://technet.microsoft.com/en-us/library/dn640687.aspx

Friday, January 8, 2016

How does human mind treat FACTS and STORIES?



Here is a non-IT  article that discusses how Human Mind reacts to stories.


From the Article:

When a fact is plausible, we still need to test it. When a story is plausible, we often assume it’s true.


 I might refuse money to a man who says that his car broke down; I might question him, ask to see his stalled vehicle, or offer him a ride to a gas station. But I’m unlikely to refuse if the man says that he is trying to make it to his sick child. I can dismiss your hard logic, but not how you feel. 
Give me a list of reasons, and I can argue with it. Give me a good story, and I can no longer quite put my finger on what, if anything, should set off my alarm bells.

Check the link below
http://www.newyorker.com/science/maria-konnikova/how-stories-deceive

Thursday, January 7, 2016

if you a TWC customer - Watchout



America's second-largest cable provider says that the FBI tipped it off to a huge cache of customer login credentials that appears to have been gathered by criminals. TWC told us it is notifying those customers whose logins have been scooped.


For More info
http://www.theregister.co.uk/2016/01/07/twc_customer_hack/