Cyber Security

#‎Report‬: Chinese ‪#‎phones‬ come with preloaded ‪#‎Spyware‬! that can steal personal data, place rogue calls, or turn on the phone’s camera and microphone. The data then send to a server in China.

Share More Protect More Read Full Report:
http://hackersnewsbulletin.com/2014/06/report-chinese-phones-market-preloaded-spyware.html
@Einstein

When I open your above link one of my security software gave me a warning:



So it makes sense to bring the browser first in sandbox mode and only then open the above link. And yes, some companies already have stopped selling at least the Star N9500 (which is a cheap copy of the Samsung Galaxy S4) because of this Trojan. The name of the Trojan is "Uupay.D". It is hidden behind the Google Play-Service and is a continuation of the Uupay.A Trojan which is found in an other handy which is produced from a Chines company named: Goohi. There is an app to find out if the handy is infected. The App G Data Internet Security for Android is the one. If it shows: Infected, then the handy should not be used any more. There is a way to remove this Trojan, but that is best done by a specialist.

But not only Chines products are infected. Base Varia for example, a product from E-plus, which is not a Chines product, had in its system a file called: fede.exe https://www.virustotal.com/en/file/...c66947d498bd5cc0efd350ea/analysis/1382521390/ So not only the Chines try it and do it. Also other Nations with there own interest do the same in different ways.

By the way: Here a link some of the readers may are interested in the coming future: http://www.nsaplayset.org
 

manishchan

Well-Known Member
@Einstein

When I open your above link one of my security software gave me a warning:



So it makes sense to bring the browser first in sandbox mode and only then open the above link. And yes, some companies already have stopped selling at least the Star N9500 (which is a cheap copy of the Samsung Galaxy S4) because of this Trojan. The name of the Trojan is "Uupay.D". It is hidden behind the Google Play-Service and is a continuation of the Uupay.A Trojan which is found in an other handy which is produced from a Chines company named: Goohi. There is an app to find out if the handy is infected. The App G Data Internet Security for Android is the one. If it shows: Infected, then the handy should not be used any more. There is a way to remove this Trojan, but that is best done by a specialist.

But not only Chines products are infected. Base Varia for example, a product from E-plus, which is not a Chines product, had in its system a file called: fede.exe https://www.virustotal.com/en/file/...c66947d498bd5cc0efd350ea/analysis/1382521390/ So not only the Chines try it and do it. Also other Nations with there own interest do the same in different ways.

By the way: Here a link some of the readers may are interested in the coming future: http://www.nsaplayset.org
So what do you recommend?
I think this is happening with all. I have Avast and get the same blocking messge. It just means the URL link may possibly not be safe. That's why blocking :)
 
Post by Umesh in another thread..

Please be vigilant
Just received a message from a friend of mine, that reads
____________________________________________________

Beware of CryptoLocker Virus

Please be alert of the CryptoLocker virus which is affecting both Personal Computers and network drives. We have not had any major incident yet affecting our environment, but we would like to alert you as a precautionary measure.

It presents itself in the form of an email message that will look familiar and authentic. This could be something from a bank or paypal, prompting you to click a link. It may look like a PDF file, but in reality it's an executable file that launches the virus. So please be especially careful of unsolicited email with attachments or links, at the moment - this is one of the ways it is spreading.

Once it's opened, it encrypts all of the documents in your personal "Documents" folder, and can even reach out to files on thumb drives and network drives. It uses strong encryption that truly no one can decrypt, it will not be possible to recover your files. It is apparently easy to remove the malware but impossible to recover the encrypted files. So please be vigilant in backing up your files
 
Ever have one of those calls from the other side of the world where the person at the other end of the phone claims your PC has got a virus and they can fix it up for you? I had one recently and played along with the operator while recording the episode, right up until they want to take remote control of the machine. But it left me wondering; what happens once they get control? So I decided to call them back and let them do *whatever* they wanted while recording both screen and audio.

https://www.youtube.com/watch?v=kjKjyMKj3n4

(The "I" in the above text is not me, as the above text is from the guy who made the video. A video which can be called an eye opener for those who not have much of an idea about a computer and what dangers exit in the world wide web)
 

Vertigo_1985

Well-Known Member
I have 2 hard drives and want to keep one as backup, if i clone a drive will it work similar to original( i.e will it boot properly without having any os in it, it will be just an image of original) ?
 

Einstein

Well-Known Member
Almost everyone involved in developing Tor was (or is) funded by the US government

http://pando.com/2014/07/16/tor-spooks/

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, ‘Oh, it’s another CIA agent.’ If those are the only people using the network.”
 
I have 2 hard drives and want to keep one as backup, if i clone a drive will it work similar to original( i.e will it boot properly without having any os in it, it will be just an image of original) ?
Hi Vertigo

You format first this extern hard disk and then you do the image. How to format? http://www.techiecorner.com/159/how-to-format-external-hard-disk-for-mac-and-windows/ After that you can use this free software "HD Clone" to make the image http://www.hdclone.com and here you can read how to make the image: https://www.ehow.com/how_5900892_clone-laptop-hd.html

Take care / Dan
 

Similar threads