Tuesday, September 11, 2018

Iranian hackers targeted universities




Universities are seen as a precious metal by cyber attackers. Higher education institutions targeting the various cyber attacks speed does not interrupt the Iranians of a hacker group, including Turkey allegations he found that 14 76 college major phishing attacks in the country brings quite sound nowadays. Comtera Technology security experts, who are at the forefront of the market with their distribution and solutions in the area of ​​information security, are offering recommendations on how universities can stay away from cyber attacks in the upcoming new school year.

Made a new research, Turkey, Australia, Canada, China, Israel, Japan, Switzerland, United Kingdom and the United States, mainly covering 14 of the country at 76 universities belonging to a total of 300 fake website and the home page reveals that a phishing attack organized and demonstrate. According to findings, these attacks are similar to an attack by the Cobalt Dickens hacker group linked to Iran between 2013 and 2017, which led to the accusation of 9 Iranian citizens of the United States. Therefore, despite the claims of some members of the group of hackers, this attack is thought to be their plan.

The threat areas of cyber attackers are expanding day by day, making them more complex and dangerous. The popularity of mobile devices, the high number of users who want to connect to the campus network, and the attractiveness of the intellectual property resources make the universities an area of ​​cheerleading. Stating that universities should focus on reducing the most before the potential damage that may arise during the attack, Comte Technology security experts share suggestions for universities that will become more targeted with the reopening of the training season.

76 Universities 31 Terabyte Data Worked

The cyber hijackers on the last attack on universities at global level use fake websites or home pages to trick users and victims are directed to their schools' online library system. Students or faculty members entering the user information on the fake home page are then directed to a valid entrance session of the university, or the login information is asked again.

Although most of the domain names can not be found in the survey, most of them appear to have been established between May and August 2018. While most of the identified areas point to a single IP address and DNS name server, the latest attack is known to take place on August 19th.

According to a statement by the US Department of Justice on the subject, hackers have targeted 100,000 college professors worldwide with these operations and have managed to access approximately 8,000 accounts. In the description, it was said that the hackers stole a total of 31 terabytes of academic data.

"Universities should embrace their heads against the threat that they are under threat"

Indicating that cyber-attackers aiming to steal information within antellectual property is a commonplace target for universities, but recently it has been increasing, Comte Technology security experts stress that the head of the universities against the attack, which is thought to be exacerbated by the opening of the new school era, Expressing that it is more difficult to provide cyber security in higher education institutions than in many other areas, Comtera Technology security experts say that these institutions are also interesting for hackers in terms of their research and resources.

Reminding students that even a single student brings at least a few different devices to the campus, universities face countless personal challenges that are not governed by security, and Comtea Technology security experts say IT professionals, faculty, and students are all responsible for building campus network security. For this reason, universities must teach simple rules, such as keeping an informative cyber security education to instructors and students, and at least not opening suspicious mails, not using easy passwords to be seized.

New mechanical player keyboard from HyperX



New mechanical player keyboard from HyperX

HyperX, part of Kingston for gamers, announced the launch of the HyperX Alloy FPS RGB mechanical player keyboard. Alloy FPS RGB keyboard; the Kailh Silver Speed ​​mechanical key switches have a shorter key press time and operate with less pressing force. These keys give gamers faster gaming performance. The full size RGB keyboard also features mouse and mousepads on your desk with a compact design with a robust steel alloy frame.

HyperX extends the Alloy FPS keyboard line by adding RGB design and Kailh Silver Speed ​​key switches to the Alloy FPS model . The Kailh Silver Speed ​​key switches, which operate at just 40g, are available for 70 million times. LED lights on the key-blade slot allow the keyboard to have brighter and more eye-catching RGB illumination with five different brightness levels.

The keyboard also prevents the split of games by disabling the Windows key thanks to the game mode. In addition, the keyboard has anti-ghosting and N-Key Rollover functions. Alloy FPS RGB features an easily accessible USB charging input and detachable braided cable at the back for greater flexibility and performance.

"HyperX is thrilled to offer the new Alloy FPS RGB mechanical keyboard with Kailh Silver Speed ​​key switches," said Marcus Hermann, senior manager of HyperX. "These keys are very short to react very quickly and to reduce fatigue with faster gaming performance. are designed with the push point. Thus, they are ideal for players who want to take advantage of their opponents. "

With the Alloy FPS RGB mechanical keyboard, three special lighting profiles can be created directly on the internal memory of the product. This allows you to use the lighting profiles and macro settings on different devices. With HyperX NGenuity software you can customize LED lighting and every key RGB light 1 . In addition, NGenuity's advanced tools include Game Mode and macro settings.

HyperX is taking the slogan "We're All Gamers". Whether you are an amateur or a professional player, each player is designed to exceed expectations with a headset, keyboard, mouse or mousepad.

HyperX Alloy FPS RGB Mechanical Keyboard Specifications

Keyboard

Key switch: Kailh

Type: Mechanics

Backlight: RGB (16,777,216 colors)

Light effects: RGB light on each keypad and 5 brightness levels

Internal memory: 3 profiles

Connection type: USB 2.0 (2 USB connections)

USB 2.0 Transition: Yes (mobile phone charge only)

Query rate: 1000Hz

Anti-ghosting: 100% anti-ghosting

Key Rollover: N-key mode

Media control: Yes

Game Mode: Yes

Operating System compatibility: Windows® 10, 8.1, 8, 7

Key switches

Kailh Silver Speed

Linear, 40 cN starting power

cables

Type Detachable, braided

Length 1.8 m

Dimensions

Width 442,26 mm

Depth 129,81 mm

Height 35,59 mm

Weight (Keyboard and cable) 1100g

Friday, July 27, 2018

Poweghost targets corporate networks!

Kaspersky Lab researchers have identified a new crypto money miner named #PowerGhost. This new miner is targeting #corporate #networks in many regions, especially in #Latin #America. PowerGhost was the latest example of the tendency of#cybercriminals to use miners for income. As this trend grows, corporate companies will continue to be at risk. While miners are charging criminals for their pockets, they sabotage and slow down the corporate networks of corporate companies, damaging all business processes.


#Crypto #money #miners have become one of the most talked-about topics in cyber security. These special "mining" software generate new money using the victim's computers and the processing power of their mobile devices. The harmful miners do this through other users, unaware of the power of their computers and devices. As demonstrated by Kaspersky Lab's previous research, this threat has increased at a rapid pace in recent months and has taken over the ransom software. However, PowerGhost adds a new dimension to this trend. As predicted by researchers at Kaspersky Lab, harmful mining developers are turning to targeted attacks to make more money.


The miner is infected with various openings or remote management tools to the machines. When a machine is affected by this threat, the main body of the miner is being downloaded and working without being stored on the hard drive. When this happens, cybercriminals are automatically updating the mine and releasing it to the network. So the crypto money mining process begins.


"PowerGhost's new targets for crypto-mining software are targeting businesses to install miners," Kaspersky Lab Vulnerability Analyst Vladas Bulavas said. The miner we investigate shows that it is no longer sufficient to target only the users and that the cybercriminals turn their attention to corporate companies. This makes crypto money mining a threat to the business world. "


Kaspersky Lab products identify this threat with the following names:


PDM: trojan.win32.generic
PDM: exploit.win32.generic
HEUR: trojan.win32.generic
not-a-virus: HEUR: The risktool.win32.bitminer.gen


Thursday, May 3, 2018

Terms Bitcoin enthusiasts need to know

As the most valuable member of the crypto money market, Bitcoin stands out as one of the areas invested by many users in recent times. Here are the terms that bitcoin enthusiasts should know ...
The BitCoin market, a new market where many of us are beginning to follow curiously, has become very popular as a platform for those who take risk and those who prefer cautious progress find their investment options. We have compiled the terms for Bitcoin for you ...

Altcoin: An alternative currency that is not as difficult to resolve and therefore to trade as a bitcoin. Since it is less known than Bitco, each subcool may not be traded in every market. Bitco is more cost-effective.
Address: A character bar used to make payments and receive payments. It is also possible to use it as a QR code. If you get a payment from the other side, it is enough to share the address information with them.

Client: The client, a software program, can run on a computer or mobile device. If you connect your work to the network, you can do it on the client.
Inflation: It is a term that shows the continuous increase in the prices used in normal markets during a certain period of time.
Deflation: It is also used in normal markets and is a term that means prices are continuously decreasing over a certain period of time.
Input: Indicates the side on which you pay for the bitcoin market. If bitcoin is already processed, a new bitcoinse input is an address.
Mining: Finding new bitcoin and subcoin through various equipment. Some passwords are broken and coins are accessed for this operation.
Cloud Mining: The process of making the mining process over the internet. There are popular internet sites used for this.
Scamcoin: There are no ideas underneath and coins created to make money. Those who create these coins, collect coins and withdraw from the market.

Arbitrage: It is the business of making profit by taking advantage of the variable value of different financial assets of different financial assets, including both normal markets and bitcoin and subcontinental markets, and by performing trading transactions.
Chart: A bitcoin given to the table showing the increase or decrease in the price at certain time intervals. Investors should follow up frequently.
Wallet: The wallet used to transport bitcoins. It can also be used for storage. It keeps the keys used to reach bitcoins at various addresses. You can view the bitcoins you have in a wallet and the addresses they contain.

Sunday, April 15, 2018

Linkedin supports GIF

After popular social media accounts like Snapchat and Instagram started to offer GIF, GIF feature was activated in LinkedIn Messenger.

In the past days, LinkedIn came up with GIF support for LinkedIn after this explanation of Tenor from the GIF platforms stating that they were working on GIF support for LinkedIn Messenger. This feature will be available to users over time. As an added bonus, Tenor was purchased by Google in the past days.

Huawei's foldable phone comes early

Technology giants like Apple and Samsung want Huawei to be on stage with their flip phone. The first details are that Huawei will introduce foldable phone, Samsung and Apple earlier.
According to the rumor, Huawei will design the foldable phone differently than Samsung's. Samsung's choice for this subject is outward folding design. The company will not opt ​​for the OLED screen from Samsun Display, as Apple uses on iPhone X. Instead, the Huawei foldable phone will use OLED panels produced by LG Display.

Major companies like Samsung, LG, Oppo and ZTE are still working on foldable phones. Along with this news, it became clear that Huawei joined the caravan. For additional information, ZTE has a device like this in the industry called Axon M. Also, the ZTE Axon M does not have a twist. Instead, double screen was selected. Finally, it is known that Huawei wants to introduce the foldable phone model next November.

Moto G6 Play once more leaked!

Moto G6 Play, one of the entry-level phones Motorola is expected to introduce in May, has once again been displayed. The design of the Moto G6 Play was completely clear.
The Motoro G6 Play, a new entry-level phone that looks like the design point for the Moto X4, which the company last year went to the market, will come with a 5.7-inch display with a 18: 9 screen format. The device will provide users with 3 GB of RAM and 32 GB of internal storage.


Saturday, April 14, 2018

Turkish Airlines sold the its ticket to Los Angeles for 32,200 TRY



Turkish Airlines' business class seat prices on Los Angeles flights rose to 32,200 TL between 16-24 April due to intense demand.
According to the news of Habertürk Gökhan Artan, on some long flights like Turkish Airlines (THY), 'busines class' ticket prices are sometimes noticeable due to intense demand. The highest ticket price of THY is also on the Los Angeles line, which is known as the City of Angels, extending along the Pacific Ocean in southern California. Boeing 777-type aircraft with a 13-hour flight cost the price of a 'business class' round-trip ticket from Istanbul to Istanbul.

the price of traveling to Los Angeles in the business class class, starting April 16th and returning April 24th, was up to 33,200,000 TL, making THY the most expensive ticket ever sold. THY is carrying a large number of Iranian-born US transit passengers on their Istanbul-Los Angeles intercontinental flights.

Tuesday, April 3, 2018

The features of the LG G7 have been revealed!

The features of the LG G7 have been revealed by a user named OnLeaks who stands out with their previous leak. There is almost no frame on the side of the phone design. However, there is a thicker frame at the bottom than at the edges. On the back of the device is a horizontally positioned dual camera. Beneath these cameras is a fingerprint sensor.

At the bottom of the LG G7 is a USB Type-C and a 3.5 mm headphone jack. At the top is a SIM card slot. The power button is positioned next to it. The phone, which has a 6-inch screen, is receiving the Snapdragon 845 processor. The device has 4 GB of RAM and 64 GB of internal storage, or 6 GB of RAM and 128 GB of internal storage. The expected phone is expected to be introduced in April, as well as the wireless charging feature.

Nokia 2010 is back after years of legend!


The company continues to release modernized versions of Nokia's old phones. HMD Global's current goal is to bring Nokia 2010 back to the market in 1994. HMD Global plans to release the phone for the 25th anniversary. Therefore, the device is expected to be introduced at the Mobile World Congress 2019 event.