News from trendmicro.

Our researchers at TrendLabs have discovered a new set of rogue antivirus software circulating in the wild. Based on initial analysis, these threats arrive mainly via spammed email messages that contain a link to a bogus celebrity video scandal. We have also received reports that the said link is circulating in instant messaging applications and private messages in social networking Web sites, too.

Once the said URL link is clicked, the Web threat infection chain begins and ultimately leads to the download of a Trojan detected by Trend Micro as TROJ_FAKEAV.CX. This Trojan is a rogue antivirus that displays very convincing (and

for some, alarming) messages, such as the following:

TROJ_FAKEAV.CX also drops another malware, detected as TROJ_RENOS.ACG. RENOS Trojans are known to have very visual payloads that may further alarm users — for example, they modify the system’s wallpaper and screensaver settings to display BSOD (Blue Screen of Death/Doom). Thus, users may be more convinced that something’s wrong with their system, not knowing that their new software is the one causing it.

Rogue antispyware isn’t entirely new, although our researchers have been seeing an increase in activity for the past couple of months (the Anjelina spam being one of the more recent examples).

Perhaps it’s because this is also the time of the year when the more legitimate security suites are releasing their latest software updates, and cyber criminals are riding on this season to ramp up their profits. Bad news for the infected users, though, as their latest versions of “antivirus software” are actually adding more threats to their system.

Trend Micro is still investigating this spam run. Updates will be posted when more information becomes available.


source

Google on Thursday announced that it has launched Gmail for Mobile 2.0 for J2ME-supported devices such as the Nokia N95, as well as BlackBerry phones.

Gmail for Mobile 2.0 offers the option to save multiple e-mail drafts in the phone and adds shortcut keys that enable users of phones equipped with QWERTY keyboards to press 'z' to undo, 'k' to go to a newer conversation, and 'j' to go to an older conversation.

* Overall performance improvement: You should experience significant raw speed improvement, smoother scrolling, and no freezing.

* Multiple accounts management: If you have both a Gmail and Google Apps email account, you can easily switch between them quickly. You will no longer have to use two different mobile apps to access personal and work emails.

* Multiple mobile email drafts: You can save multiple email drafts in your mobile phone, so that you can pick and choose what you would like to send later.

* Powerful shortcut keys: If you have a QWERTY phone, you can use shortcut keys. Hit 'z' to undo, 'k' to go to a newer conversation, and 'j' to go to an older conversation. See Menu/Help in the app for more shortcuts.

* Basic offline support: Can't get a signal? Not a problem. You can compose and read your most recent emails even when there is no signal. Also, any outgoing messages will be saved in the outbox on your phone and sent automatically when you're back in coverage.

Go to m.google.com/mail in your mobile browser to download the new Gmail for mobile for your phone.

by educare | 11:55 PM in | comments (0)

Why take chances with your personal and credit card information?

Trend Micro Internet Security Pro provides the most comprehensive protection available for your personal and financial information -- whether you’re at home or on the road.

Shop, bank and invest online with total peace of mind

Smart security features safeguard your personal and financial information from hackers and identity thieves:

  • Prevent keyloggers from spying on your passwords, account numbers, and other personal information
  • Remotely secure confidential files and folders in case your computer is lost or stolen
  • Automatically check the legitimacy of Wi-Fi “hot spots” when you use your laptop on the road

Proactive defense against present and future threats

Trend Micro Internet Security Pro defends your computer from the latest spyware, viruses and phishing scams, and goes one step further:

  • Automatically alerts you before you are about visit an unsafe webpage
  • Rates safety of links in instant messages and web-based email programs
  • Prevents data thieves, viruses, SMS text message spam and other malware from invading your smartphone
  • Exclusive – First Visitor Protection: Inspects webpage content in real-time – so you’re protected even if you’re the first visitor to a new unsafe website
  • Keeps your protection current with automatic updates

Tools to optimize your PC performance

Trend Micro Internet Security Pro includes powerful, easy-to-use tools to keep your computer running smoothly:

  • Clean up registry and temp files and manage startup programs to boost PC performance
  • Get a complete and customizable snapshot of security activities on your computer

Surf the web without worry

  • Get security updates when you want it through State Aware. Our software stops security updates or downloads when you are doing presentations, watching movies, or playing games and resumes only after you complete your activities.
  • Quick Scan allows you to quickly find and remove most malware when you are running short on time.

Maximum Security. Online Freedom.

Trend Micro Internet Security Pro. Enjoy all of your online activities with complete confidence.

Keep your personal information and PC safe -- Order Internet Security Pro today!

Protect up to 3 PCs per household for $69.95 per year. Discounts are available for 2-year or 3-year licenses. Buy now or Renew

Trend Micro Mobile Security

Protects against viruses, SMS text message spam and other malware attacks for Microsoft Windows Mobile and Symbian OS based smart phones. It also prevents data theft and service disruptions. The key features are:

  • Monitors inbound and outbound data activity
  • Blocks unauthorized activity with built-in adjustable-protection firewall
  • Blocks spam SMS text messages from unknown senders
  • Provides automatic real-time virus/spyware scans with optional manual scan
  • Delivers updated pattern files automatically via Internet connection
  • Simplifies configuration

Antivirus Software


Kaspersky AV provides all types of anti virus protection:anti virus scanners, monitors, behavior blockers and integrity checkers The Kaspersky Anti Virus 2009 application was designed to be the backbone of your PC’s security system, offering protection from a range of IT threats. Kaspersky Anti Virus 2009 provides the basic tools needed to protect your PC. Essential Protection ·

Protects from viruses, Trojans and worms · Blocks spyware and adware · Scans files in real time (on access) and on demand · Scans email messages (regardless of email client) · Scans Internet traffic (regardless of browser) · Protects instant messengers (ICQ, MSN) · Provides proactive protection from unknown threats · Scans Java and Visual Basic scripts Preventive Protection · Scans operating system and installed applications for vulnerabilities · Analyzes and closes Internet Explorer vulnerabilities · Disables links to malware sites · Detects viruses based on the packers used to compress code · Global threat monitoring (Kaspersky Security Network) Advanced Protection & Recovery ·

The program can be installed on infected computers · Self-protection from being disabled or stopped · Restores correct system settings after removing malicious software · Tools for creating a rescue disk · Data & Identity Theft Protection · Disables links to fake (phishing) websites · Blocks all types of keyloggers Usability · Automatic configuration during installation · Wizards for common tasks ·

Visual reports with charts and diagrams · Alerts provide all the information necessary for informed user decisions · Automatic or interactive mode · Round-the-clock technical support · Automatic database updates

Get Trial at Kaspersky Lab

Antivirus Software


Looking to get in on the hot low-price notebook market, Lenovo is launching its own bargain laptop offering to compete with small notebooks, such as the MSI Wind and Eee PC. The new laptop, the IdeaPad S10, will ship in October in time for the Christmas season. It will retail starting at $399.

The new notebook features a small footprint with a 10.2 inch LCD screen. The dimensions of the notebooks are 9.8 x 7.2 inches. Weight is 2.4 pounds with the lightest configuration. The notebook is also "super-slim", according to Lenovo, measuring in at approximately 1 inch thin. The device features a slightly-shrunk keyboard which is 85 percent of the size of a standard full-function PC keyboard.

As far as looks, the IdeaPad looks rather slick with a variety of finishes. It can be ordered in "classic white", "bold black", or glossy "ruby red". The white models will have a grayed base.

A couple steps are taken with the design to insure long battery life, a big concern for ultra-portables. First, it uses LEDs to backlight the LCD more effectively than traditional designs. Secondly, it uses Intel's popular Atom processor, in particular the 1.6 GHz N270 with a 945 GSE express chipset.

As the laptop is designed to be used primarily as an internet/word processing machine, connectivity is another major focus. Lenovo added WiFi (b/g), Bluetooth, Ethernet, and an Express Card slot, in order to allow users to get broadband by a variety of methods. The device will also feature 2 USB ports, a 4-in-1 multi-card reader, and a built-in web camera for video messaging. Graphics will be provided by an Intel Integrated Graphics GMA 950 chip.

The notebook will be sold in two different configurations. The first has 512 MB of memory and an 80 GB hard drive. The second, which likely be priced somewhat higher, ups the memory to 1 GB and features a 160 GB hard drive. No solid state drive options have been announced yet. Both configurations come with Windows XP preinstalled, courtesy of Microsoft's stay of retirement on XP for ultra-portables.

The notebooks will be available through a number of major retailers, through Lenovo's partners and direct through Lenovo's website.

Liu Jun, senior vice president, Consumer Business Group, Lenovo states, "IdeaPad netbooks are the latest in a string of recently announced Lenovo products, designed specifically for consumers worldwide and developed through our heritage of technological innovation and exceptional engineering. As rapidly as the technology changes, today’s consumers are looking for mobile products that feature the best of basic computing functions in an extremely compact and affordable form, and Lenovo designed the IdeaPad netbooks for that purpose."

Lenovo also hinted that some countries will have 9 inch screen smaller version available and that Linux preinstalls would also be available in some countries. It is unclear whether the U.S. will get any of these options.

One key factor in the notebook's success or failure will be the battery life. Initial metrics place the life at around 3 hours with 3-cell battery, and up to 6 hours with 6-cell battery, but final measurements remain.

Lenovo's computer lineup, for those unfamiliar, is actual derivative of IBM's former offerings. The Chinese company purchased IBM Personal Computing Division from IBM and rebranded it to launch its computing efforts, back in 2005.

source

McAfee and Secure Computing come to a multi-million dollar agreement to help add to McAfee's portfolio

Security maker McAfee today announced it plans to acquire enterprise network security company Secure Computing Group for $465 million. The $5.75 per share is a 27 percent increase of the company's Friday closing price of $4.52.

"Today’s announcement of this pending acquisition is a natural extension of McAfee’s security-only focus," said Dave DeWalt, chief executive officer and president of McAfee.

"We expect the pending combination of McAfee and Secure Computing will create an annual projected combined revenue of just under $500 million in the network security segment of our SRM portfolio. We believe that this pending acquisition will allow us to immediately establish a leading and highly competitive position in the network security space."

The McAfee purchase is the company's biggest acquisition, and will help the company boost its presence in corporate network security while increasing the number of companies that use its products. McAfee has a global partner base of 12,000, and will receive 2,000 more solution providers once the deal is approved.

Specifically, McAfee hopes to cash in on Secure Computing's TrustedSource technology, which will be marketed towards small and medium size businesses looking for secure software technology without going through the hassle of installing lots of software.

The only major concern, according to analysts, is attempting to make Secure Computing's software easier to use, as the company has a notorious reputation for creating software that is hard to install and manage.

McAfee Chief Executive Dave DeWalt, who took the job in 2007, has used corporate buyouts to help the company expand its software portfolio. The security company already purchased, SafeBoot, Reconnext, Onigma, and other companies in recent months.

The deal will be completed once the Department of Justice and Federal Trade Commission approve the buyout under the Hart-Scott-Rodino Act. Neither company is expecting products from the planned acquisition. The transaction should close before the end of 2008.

Moving forward, McAfee will likely enter database security and security information management, a move that will happen by more company acquisitions.

Source: DailyTech


IBM & Los Alamos supercomputer might be as fast as your brain.

Not even a week after the new Roadrunner supercomputer was juiced up and put to work, scientists are hard at work trying to push the machine to its limits. Housed at the Los Alamos National Laboratory, the primary goal of the supercomputer is to model the safety of the United States' aging nuclear weapons stockpile. At over a certified petaflop, the machine renders calculations in a day that would take every person on Earth a calculator and 46 years to accomplish.

A supercomputer of this power will be incredibly useful for modeling things other than nuclear decay and global climate. At over a quadrillion – a million billion – calculations per second, Roadrunner is the only computer on Earth that can keep up with one of the few things more amazing than itself: the human brain.

Los Alamos researchers are putting this power to work with a program dubbed PetaVision. The program was created to model neuron and synapse interaction in the visual cortex of the human brain. The brain uses over a billion neurons and trillions of synapses alone to process the visual information it receives and is one of the most complicated processes known to exist in grey matter.

Supercomputers like Roadrunner bring new possibilities for modeling human recognition systems, and the advances are not likely to stop there. In the past, computers have been unable to flawlessly perform cognitive tasks that the human brain does easily; tasks like picking out a face in a crowd, or detecting oncoming vehicles in traffic. Such a large step up in processing power may enable scientists to breech this difficult wall in mimicry.

The researchers used PetaVision to set a processing record with Roadrunner, spinning up to an astonishing 1.144 petaflop/s. "Just a week after formal introduction of the machine to the world, we are already doing computational tasks that existed only in the realm of imagination a year ago,” explains Terry Wallace, associate director for Science, Technology and Engineering at Los Alamos.

The supercomputer's architecture is based on a hybrid node system. Each node contains two AMD Opteron dual-core and four PowerXCell 8i processers. The PowerXCell CPUs are derived from the same Cell processor used in the Sony Playstation 3 and act as computational accelerators for the Opterons.

Source from DailyTech

Drive and Save Money

by educare | 9:41 PM in | comments (0)

Ever since the increase in fuel price recently, many have resorted to various ways and mean to cut down on everyday expenses ( save more money). Since everybody start their campaign on “ save more money” , here some tips on driving that can help to save fuel:

1. Always maintain your car – fuel efficiency from a well-tuned engine can be affected by up 4%
2. Using correct engine oil- contribute another 1% to 2%
3. Tyre pressure check -tyres under-inflated by 1 psi can reduce fuel effiency by 3%.
4. Remove unnecessary items – every 10kg less could save 15ml of fuel for every 50km you drive.
5. Plan your journey – avoid clocking unnecessary.
6. Accelerate smoothly – save 10% of fuel when you drive smoothly
7. Optimum speed recommended – 80km/hr on highway, improve 30%
8. Avoid long engine idling – 5 minutes idling cost RM 0.18

Use these fuel-saving tip to ensure you not waste your fuel and money unnecessarily.

I recently picked up a copy of Justin Michie’s Traffic Tips Report (Free for a limited time from here). Let’s face it, getting traffic to your website or blog is a never ending challenge. But it’s a necessary challenge, because without traffic you can’t do much of anything. So you are probably – like me – always on the lookout for new traffic generation methods and as many good ways to do it as you possibly can.

The Traffic Tips Report claims to do just that. This is a recently released report from expert internet marketer Justin Michie. Being an internet marketer himself, Justin should have a good hold on traffic generation. But as with anything online I thought it was worth taking a closer look. And the results were actually quite impressive.

For starters, the report doesn’t just show you a few ways to generate website traffic, it delivers 247 unique ways to get traffic to your site. Right from the start that’s something that any website or blog owner can use. On top of that, the report is actually free! Justin is currently giving it away to anyone who wants it.

And even though it’s free, the methods outlined in this report should be able to increase your traffic significantly in just a matter of days. The great thing about this report is that it includes both free and paid traffic generation methods. So whether you are just starting out and you have time to invest but little money, or you’ve been making money online for awhile and have the money but not the time – there are plenty of ideas in here to up your traffic stats.

Just don’t let the amount of ideas in here overwhelm you – don’t try to do it all at once, pace yourself! Some of the methods will result in short term traffic and others will result in long term traffic. If you start with a few of short term and a few long term methods from this report you can give your site a quick burst of traffic right away while building long term traffic. This will help your traffic grow quickly and still sustain itself so you’ll be getting plenty of visitors month after month.

The report has been reviewed by some of the most successful and well known internet marketers. Joel Comm and Willie Crawford both highly recommended it, when Justin was charging money for it. (It had been selling at the discounted rate of $7 at http://www.TrafficTipsReport.com.) Joel calls it a “really valuable resource” that all internet marketers should have. And Willie “recommends it to all of his clients and subscribers.” When you have endorsements like these you really can’t go wrong!

Another great thing about this report is that it will work for any type of niche. It doesn’t matter if you have a website on puppies or a blog about day trading. There are traffic generation methods in it that will work for everyone and every niche.

As we all know the internet is constantly evolving. To be successful, you have got to stay ahead of your competition. You can easily do this by using some of these unique marketing methods Justin has outlined. If you use just one of these methods, you could easily double the amount of traffic you are receiving. Just imagine what could happen if you use ten, fifty or all 247? You would have a traffic explosion! All from one little report.

So if you are looking for unique ways to drive more traffic to your site, you really need to look no further than the Traffic Tips Report. If you want a copy (while it’s still free) you can download it from here. It's a no brainer decision!

Make Money Online

by educare | 4:41 PM in | comments (0)

All people around the world start talking on online business. That is the power of online business which you could not get with off line businesses. If you are new or even old online marketers, look at below for income generating opportunities and how you could capitalize it better.

  • Google Adsense - this is well known program. I have to include this option because I get tons of readers who are newbies. This is a program operated by Google and very established online programs. Join Google Adsense today!
  • Kontera Program - this is quite a new program compared to Google Adsense. This is a way where the Kontera highlights certain keywords within a blog or website. If noticed this blog, you will see certain words or phrases being highlighted by double underline. That is Kontera at work, and when people click on this highlighted words, the blog or website owner makes some money. Join Kontera today!
  • Text Link Ads - is another way a website owner could monetize a site. You basically allow people to advertise on your site, or you promote their affiliate program for people who are looking for ways to advertise their website/blog in other people's sites. Join Text Link Ads today!
  • ReviewMe - this a place where you could get opportunity to review other people blogs and give your opinions. But in order to gain credibility for your review, your blog needs to be highly ranked and has quite big number of readers. Join ReviewMe today.
  • Shopping Ads - this is another program which could earn you money. It shows related ads and normally with photos of an item. It works base on clicks too. Join ShoppinAds today!
  • DealDotCom - this is a affiliate program which pays for two level. Yes, two levels where anyone who sign up under you as an affiliate marketer, you will make a cut of the commission. If anyone who sign up under them as an affiliate marketer, you make a cut too. That is not all, you make this commission forever even for next 100 years. Furthermore, you too could be an affiliate marketer under DealDotCom. Join DealDotCom today!
  • Bidvertiser - this is one of growing competitor for Google adsense. They are still small, but becoming more famous everyday in CPC. Unlike Google adsense which makes you wait until your earning reaches USD100, Bidvertiser will pay you even when you reach USD10. Great starter for beginner who wants to feel the money from their website/blog. Join Bidvertiser today.
Why don't we try ?

Phish in the (Photo)bucket

by educare | 11:15 PM in | comments (0)


by Sarah Calaunan (Fraud Analyst)

Photobucket is, by far, one of the largest photo-sharing sites in the world. It is generally used for personal photographic albums, remote storage of avatars displayed on Internet forums, and storage of videos.

Lots of people may opt to keep their albums private, allow password-protected guest access, or open them up to the public. And now this photo-sharing site is being attacked by phishers.

The login page above looks exactly like the original site that lures the users to enter their user name and password.

Once victims enter their credentials, phishers can use them to obtain full access to victims’ Photobucket accounts, and may use the latter’s albums to insert malicious code.

Image-hosting sites have grown intensely popular and are widely used. A report from McCann released in March of this year has stated that a global volume of 63.2% of all active Internet users visit photo-sharing Web sites on a daily basis.

Martyn Williams, IDG News Service

Sony Computer Entertainment began accepting applications on Thursday for a closed beta test of its PlayStation Home virtual environment.

PlayStation Home is a virtual world where users are represented by avatars and can meet and interact with other users via text chat, voice chat and other unspecified communications methods, according to Sony. In demonstrations given by the company it looks something like a combination of the online Second Life virtual community populated by personal avatars along the same lines as Nintendo's Mii avatars, albeit with an appearance closer to that of a person and less like a cartoon.

It was first announced in July last year and at the time Sony said it would be available globally in the "fall" of 2007 but that was delayed until "spring" 2008 at the Tokyo Game Show last year. Then, earlier this year Sony said it would be delayed again until a beta test in the second half of this year, which is a promise it has made good on.

Applications are initially being accepted from Thursday until Aug. 11 from users in Japan only. Sony expects to offer access to about 10,000 gamers during the beta, which will begin in late August.

During the beta stage users will be able to play the games that make up Bandai Namco's "Namco Museum" package, which include PacMan, in the service's "Game Space."

Similar closed beta tests are due in other markets at about the same time and an open beta test will commence later this year, said Sony.