Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

Downloader.Angler!gm

- Tue, 2 Sep 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Babonock

- Tue, 2 Sep 2014 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

W32.Changeup!gen51

- Mon, 1 Sep 2014 00:00:00 +0000

Risk Level: Low. Type: Worm.

Infostealer.Reedum.D

- Mon, 1 Sep 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Asterope!gen1

-

Risk Level: Very Low. Type: Trojan.

Android.Krysanec

- Mon, 1 Sep 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Freezer

- Wed, 27 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Ratenjay!gen3

- Wed, 27 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Preft

- Wed, 27 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Ponik!gen8

- Thu, 28 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Tubrosa

- Wed, 27 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

OSX.Laoshu

- Wed, 27 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Rincux

- Tue, 26 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen130

- Tue, 26 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Changeup!gen50

- Mon, 25 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Worm.

Backdoor.Darkmoon.G

- Tue, 26 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-0546

- Thu, 21 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Miras

- Thu, 21 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Changeup!gen49

- Wed, 20 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Worm.

Trojan.Cryptolocker.H

- Wed, 20 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Ragua

- Wed, 20 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Necurs!gen7

- Thu, 21 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Cryptdef!gen3

- Wed, 20 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Changeup!gen48

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Worm.

Infostealer.Retgate

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-2820

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Exp.CVE-2014-2823

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Exp.CVE-2014-4057

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.FakeAV!gen129

- Mon, 18 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.Maltrec.TS!g17

- Mon, 25 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g34

- Mon, 25 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Volgmer

- Mon, 18 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.2e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.4e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Trojan.5e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.6e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.7e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.8e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.9e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.11e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.MegaSrch.10e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Tarma.12e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.MegaSrch.13e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.14e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.15e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.16e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.17e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.18e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.19e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Graftor.20e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.21e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Adload.22e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.2e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.7e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.6e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.2e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Soft32Dwn.1e

-

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.SoftPulse.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.AdGazelle.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Widdit.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Downware.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bruterdep!gen2

- Fri, 15 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.N

- Sat, 16 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Zbot!gen82

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Trojan.

Trojan.Blueso

- Fri, 15 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Adware.Maltrec.TS!g23

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g24

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g25

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g26

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g27

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g28

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g29

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g30

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g31

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g18

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g20

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g21

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g22

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g23

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g24

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g25

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g26

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g27

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g32

- Mon, 18 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Qhosts!gen1

- Wed, 13 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Trogle

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Backdoor.Goldsun

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Turla!gen2

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Lapadin

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Backtor

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron.B

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Adware.Crossid!gen1

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Citrat

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Changeup!gen47

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Worm.

Trojan.Bruterdep!gen1

- Sat, 9 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Turla!gen1

- Fri, 8 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Loadmoney!gen2

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Korplug!gm

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Scartibro

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Mdropper!gen2

- Wed, 6 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bitterbug

- Wed, 6 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Synolocker

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen127

- Wed, 6 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen128

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Poweliks!gm

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Icoscript

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Skintrim!gen4

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Ldpinch!g2

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Celebrity hacking clouds Apple's upcoming product launch

- Tue, 02 Sep 2014 22:44:15 -0400

Apple logo is pictured inside the newly opened Omotesando Apple store at a shopping district in TokyoBy Christina Farr and Edwin Chan SAN FRANCISCO (Reuters) - Apple Inc has often displayed uncanny timing, with its well-orchestrated end-of-year iPhone releases. In the wake of the breach, cybersecurity experts and mobile developers have called out inadequacies in Apple?s and, more generally, cloud-services security. Thousands have taken to Twitter to express their frustrations with the company. Some security experts faulted Apple for failing to make its devices and software easier to secure through two-factor authentication, which requires a separate verification code after users log in initially.


Apple: Some nude shots taken from stars' accounts

- Tue, 02 Sep 2014 20:37:24 -0400

FILE - In this Sunday, March 2, 2014, file photo, Jennifer Lawrence arrives at the Oscars at the Dolby Theatre in Los Angeles. A publicist for Lawrence says the actress has contacted authorities after nude photos of her were apparently stolen and posted online. Intimate images of the Oscar-winning actress began appearing online on Sunday, Aug. 31, 2014, and nude images purported to be of other female celebrities were also being circulated online. The source of the leak was not immediately known. (Photo by Dan Steinberg/Invision/AP, File)LOS ANGELES (AP) ? Apple said Tuesday that hackers obtained nude photos of Jennifer Lawrence and other female celebrities by pilfering images from individual accounts rather than through a broader attack on the company's services.


Apple says its systems not to blame for celebrity photo breach

- Tue, 02 Sep 2014 18:21:52 -0400

APPLE STATEMENT ON CELEBRITY HACKING: OUR SYSTEMS WEREN?T BREACHEDBy Edwin Chan and Christina Farr SAN FRANCISCO (Reuters) - The week before a crucial launch of its new iPhone, Apple Inc said intimate photos of celebrities including Oscar-winner Jennifer Lawrence were leaked online through the apparent hacking of individual iCloud accounts. Apple rushed to restore confidence in its systems' security, saying the celebrity photo scandal that also ensnared swimsuit model Kate Upton, actress Kirsten Dunst and possibly dozens more was the result of targeted attacks on accounts storing personal data and not a direct breach of Apple systems. "We have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet," Apple said in a statement. "None of the cases we have investigated has resulted from any breach in any of Apple's systems including iCloud or Find My iPhone." The celebrity hacking that came to light over the long Labor Day weekend nevertheless ranks among the highest-profile public fiascos for Apple in recent years.


Home Depot probes possible credit card data breach

- Tue, 02 Sep 2014 18:00:23 -0400

Home Depot probes possible credit card data breachHome Depot may be the latest retailer to suffer a major credit card data breach. The Atlanta-based home improvement retailer told The Associated Press Tuesday that it is working with both banks and law ...


Business Highlights

- Tue, 02 Sep 2014 17:43:25 -0400

___ It's no longer safe to recline your airplane seat Squeezed into tighter and tighter spaces, airline passengers appear to be rebelling, taking their frustrations out on other fliers. Three U.S. flights ...

Top South America hackers rattle Peru's Cabinet

- Tue, 02 Sep 2014 17:25:16 -0400

Top South America hackers rattle Peru's CabinetThe Peruvian hackers have broken into military, police, and other sensitive government networks in Argentina, Colombia, Chile, Venezuela, defacing websites and extracting sensitive data to strut their ...


Canada, China quietly hold top-level meeting on strained ties

- Tue, 02 Sep 2014 16:58:27 -0400

Canada's Harper is greeted by China's Wen in a video commercial provided by the NextGen Climate Action campaign against the Keystone XL oil pipelineBy David Ljunggren OTTAWA (Reuters) - Senior officials from Canada and China met quietly in Ottawa last week to discuss relations that have deteriorated so badly that they could threaten Prime Minister Stephen Harper's planned visit to China in November. Canada sees China as an important trading partner and in early 2012 Harper went to Beijing to pitch the idea of Canada as a potential oil supplier. In late July, Canada accused Chinese hackers of being responsible for an attack on a government computer. In early August, China detained a Canadian couple, Kevin Garratt and Julia Dawn Garratt, on suspicion of spying.


Wall Street ends mixed, energy shares fall

- Tue, 02 Sep 2014 16:56:31 -0400

Trader Fred DeMarco works on the floor of the New York Stock ExchangeThe S&P energy index fell 1.3 percent as the prospect of slowing demand for oil in China and Europe and concerns about an oversupply of oil brought Brent crude oil futures to their lowest price since May 31, 2013. Peabody Energy Corp was the biggest loser among the S&P energy names, falling 3.7 percent to $15.29. The strengthening dollar, which rose to its highest this year against the yen, was also seen as weighing on oil prices. We're just seeing energy pulling back a bit after a very big market rally and taking a bit of time to digest those gains," said Adam Sarhan, chief executive of Sarhan Capital in New York.


Home Depot says probing 'unusual activity' after data breach report

- Tue, 02 Sep 2014 16:23:51 -0400

A sign outside The Home Depot store is pictured in Monrovia, CaliforniaHome Depot Inc said on Tuesday it was working with law enforcement to investigate "some unusual activity" related to customer data but that it could not confirm if it had become the latest retailer to be hit by a large-scale security breach. "At this point, I can confirm that we?re looking into some unusual activity and we are working with our banking partners and law enforcement to investigate," Home Depot representative Paula Drake wrote in an emailed statement to Reuters. "If we confirm that a breach has occurred, we will make sure customers are notified immediately." The statement came after security website KrebsonSecurity first reported that multiple banks had seen evidence that Home Depot may be the source of stolen credit and debit cards put up for sale on underground markets. Retail customers faced a massive data breach during last year's holiday season when hackers stole at least 40 million payment card numbers and 70 million other pieces of customer data from Target Corp .


Apple Blames 'Targeted Attack,' Not iCloud, for Celebrity Photo Hack

- Tue, 02 Sep 2014 15:29:14 -0400

Apple Blames 'Targeted Attack,' Not iCloud, for Celebrity Photo HackAfter hackers stole and released several dozen female celebrities' personal photographs over the Internet this weekend, apparently by breaking into their iCloud accounts,†Apple has finally responded in full.† In a new statement by the company, the company says†iCloud, which stores multimedia taken on Apple products, and the Find My iPhone feature, which allows users to track a missing device,†were†not hacked. When we learned of the theft, we were outraged and immediately mobilized Apple's engineers to discover the source. None of the cases we have investigated has resulted from any breach in any of Apple's systems including iCloud(R) or Find my iPhone.†We are continuing to work with law enforcement to help identify the criminals involved.


Apple provides key new details on the massive iCloud hack of nude celebrity pics

- Tue, 02 Sep 2014 14:46:02 -0400

Apple provides key new details on the massive iCloud hack of nude celebrity picsApple is needless to say not very happy that some hackers figured out how to swipe a trove of nude celebrity pictures that were uploaded onto iCloud but the company is insisting that the problem has nothing to do with iCloud?s overall security. FROM EARLIER:†Claimed hacker behind iCloud nude photos theft says it took ?months? of planning to pull off heist 9to5Mac has just published an official statement sent out by Apple in which the company offers key details about how some users? iCloud accounts were compromised. The company says that after investigating the hack, it?s determined that the hackers involved used a ?very targeted attack on user names, passwords and security questions, a practice that has become all too


AP Interview: Iran says it disrupts nuclear plots

- Tue, 02 Sep 2014 11:18:47 -0400

This Monday, Sept. 1, 2014 photo shows a nuclear research reactor at the headquarters of the Atomic Energy Organization of Iran, in Tehran, Iran, which went online with American help in 1967 _ before Iran?s 1979 Islamic Revolution strained ties between the two countries. The deputy head of Iran?s nuclear department has told The Associated Press that the Islamic Republic has disrupted plots by foreign spies to recruit its nuclear experts. Asghar Zarean, who is in charge of security for Iran?s nuclear program, said foreign intelligence agencies targeted the experts when they traveled abroad. (AP Photo/Vahid Salemi)TEHRAN, Iran (AP) ? Iran has disrupted plots by foreign spies to recruit its nuclear experts and stopped sabotage attempts through faulty foreign equipment supplied for its facilities, the deputy head of the Islamic Republic's nuclear department told The Associated Press.


Five Best Tuesday Columns

- Tue, 02 Sep 2014 10:41:44 -0400

Five Best Tuesday ColumnsThe†Nato summit†this week in Wales represents a crucial opportunity for America?s most important allies to start doing more to share the burden. A western-dominated world is therefore in danger of looking increasingly like an anachronism ? and that is the proposition that, in their different ways, President Vladimir Putin of Russia, Isis and the Chinese military are testing." Vladimir Putin, its historic foe, has been allowed to engineer its humiliation." By talking loudly, but doing nothing, Putin's position only grows stronger among those who back him.†"All intelligence out of Moscow says the same, that [Nato's]†bombast merely emboldens Putin.


Stop Calling the Theft of Celebrity Nude Pictures 'Leaks'

- Tue, 02 Sep 2014 09:32:55 -0400

Stop Calling the Theft of Celebrity Nude Pictures 'Leaks'As private images ripped from the iCloud accounts of celebrities papered the internet last weekend, most people writing about the story called the release of the photos "leaks," even though they were nothing of the sort.


Claimed hacker behind iCloud nude photos theft says it took ?months? of planning to pull off heist

- Tue, 02 Sep 2014 09:05:46 -0400

Apple provides key new details on the massive iCloud hack of nude celebrity picsHacking into iCloud and swiping nude photos of various celebrities isn?t a one-night operation ? it apparently takes months of planning. The Daily Mail notices that a man†who has claimed responsibility for this week?s big iCloud photo heist has posted details about how long it took to†supposedly pull†off the hack. The man, who is now apparently being investigated by the FBI, apparently headed up a group of hackers who were collectively responsible for the theft. FROM EARLIER: Nude photos of Jennifer Lawrence, Ariana Grande and others leak in alleged iCloud hack ?This is the result of several months of long and hard work by all involved,? wrote the hacker. ?We appreciate your donations and applaud your excitement. I will soon


Both Apple and FBI confirm investigation of nude celebrities photos fiasco

- Tue, 02 Sep 2014 08:15:10 -0400

Apple provides key new details on the massive iCloud hack of nude celebrity picsPersonal data from various celebrities ? nude photos†and videos†allegedly belonging to many well-known personalities from various entertainment businesses ? have been stolen by a hacker or group of hackers and posted online a few days ago, an event known online as ?the Fappening.? While some celebrities denied the leaked pictures, others confirmed their existence, and it looks like both Apple ? whose iCloud service might have been somehow compromised in this particular hack ? and the FBI are investigating the matter, The Register reports. FROM EARLIER: Nude photos of Jennifer Lawrence, Ariana Grande and others leak in alleged iCloud hack Even though a massive iCloud hack that could put at the risk personal data for millions of users is very


Both Apple and FBI confirm investigation of nude celebrity photos fiasco

- Tue, 02 Sep 2014 08:15:10 -0400

Apple provides key new details on the massive iCloud hack of nude celebrity picsPersonal data from various celebrities ? nude photos†and videos†allegedly belonging to many well-known personalities from various entertainment businesses ? have been stolen by a hacker or group of hackers and posted online a few days ago, an event known online as ?the Fappening.? While some celebrities denied the leaked pictures, others confirmed their existence, and it looks like both Apple ? whose iCloud service might have been somehow compromised in this particular hack ? and the FBI are investigating the matter, The Register reports. FROM EARLIER: Nude photos of Jennifer Lawrence, Ariana Grande and others leak in alleged iCloud hack Even though a massive iCloud hack that could put at the risk personal data for millions of users is very


10 Things to Know for Today

- Tue, 02 Sep 2014 06:00:04 -0400

FILE - In a Monday, Jan. 17, 2011 file photo, gun violence protesters participate in a lie-in during an anti-gun rally at the Capitol in Richmond, Va. Nearly six in 10 Americans want stricter gun laws in the aftermath of last month's deadly school shooting in Connecticut, with majorities favoring a nationwide ban on military-style, rapid-fire weapons and limits on gun violence depicted in video games and movies and on TV, according to a new Associated Press-GfK poll. A lopsided 84 percent of adults would like to see the establishment of a federal standard for background checks for people buying guns at gun shows, the poll showed. President Barack Obama was set Wednesday, Jan. 16, 2013 to unveil a wide-ranging package of steps for reducing gun violence expected to include a proposed ban on assault weapons, limits on the capacity of ammunition magazines and universal background checks for gun sales. (AP Photo/Steve Helber, File)Your daily look at late-breaking news, upcoming events and the stories that will be talked about today:


Houston Astros fire manager Bo Porter

- Tue, 02 Sep 2014 03:39:13 -0400

FILE - In this july 20, 2014, file photo, Houston Astros manager Bo Porter watches his team during the first inning of a baseball game against the Chicago White Sox in Chicago. The Astros have fired manager Bo Porter in his second season with the club. General manager Jeff Luhnow says the decision wasn't based on Houston's record but because "we need a new direction in our clubhouse." The Astros entered Monday, Sept. 1, 2014, in fourth place in the AL West with a 59-79 record, second worst in the league. (AP Photo/Nam Y. Huh, File)HOUSTON (AP) ? The Houston Astros are looking toward the future, and they decided there is no time like the present to get going on that.


Inquiries begin into nude celebrity photo leaks

- Mon, 01 Sep 2014 22:30:01 -0400

FILE - In this Sunday, March 2, 2014, file photo, Jennifer Lawrence arrives at the Oscars at the Dolby Theatre in Los Angeles. A publicist for Lawrence says the actress has contacted authorities after nude photos of her were apparently stolen and posted online. Intimate images of the Oscar-winning actress began appearing online on Sunday, Aug. 31, 2014, and nude images purported to be of other female celebrities were also being circulated online. The source of the leak was not immediately known. (Photo by Dan Steinberg/Invision/AP, File)LOS ANGELES (AP) ? The FBI said Monday it was addressing allegations that online accounts of several celebrities, including Oscar-winner Jennifer Lawrence, had been hacked, leading to the posting of their nude photographs online.


10 Things to Know for Tuesday

- Mon, 01 Sep 2014 21:00:37 -0400

Your daily look at late-breaking news, upcoming events and the stories that will be talked about Tuesday:

This iPhone case makes it easier than ever for thieves to steal your ATM PIN

- Mon, 01 Sep 2014 14:45:08 -0400

This iPhone case makes it easier than ever for thieves to steal your ATM PINIn light of this weekend?s†massive celebrity photo leak, mobile security is†bound to be a major†topic of discussion in the weeks to come. How can we keep our private data safe if†actors and actresses whose lives often revolve around†keeping things private are this vulnerable? With the amount of information we store on our phones, in our email, in cloud storage, we?re always going to be at risk, but there are†ways that hackers can get private data from us without accessing any of our devices. At the beginning of the year, thermal imaging company FLIR announced the FLIR One, an iPhone 5 and iPhone 5s-compatible case with a infrared camera. Although there are plenty of legitimate uses for an infrared camera, there


Here?s how all those celebrity nudes might have been stolen

- Mon, 01 Sep 2014 12:40:59 -0400

Here?s how all those celebrity nudes might have been stolenAfter a massive breach†that saw hackers†steal nude†pictures and videos from phones belonging to†various celebrities, fingers have been pointed†at Apple?s iCloud as the potential point of access. Now, various reports have emerged detailing the way these phones may have been obtained, and revealing Apple?s involvement in the process. FROM EARLIER: Nude photos of Jennifer Lawrence, Ariana Grande and others leak in alleged iCloud hack Online publication The Next Web reveals that hackers aware of an iCloud security issue (found in the Find My iPhone service) and may have taken advantage of it to break into the phones of the affected†celebrities, who include Jennifer Lawrence, Ariana Grande, Kate Hudson and many more. Apparently, a Python script was posted on Github†last Monday that


Nude photos of Jennifer Lawrence, Ariana Grande and others leak in alleged iCloud hack

- Mon, 01 Sep 2014 09:20:55 -0400

Apple provides key new details on the massive iCloud hack of nude celebrity picsWith just over a week to go until the iPhone 6 is finally unveiled, Apple?s most important product launch of the year, the company may have a major scandal to deal with that?s directly related to its iOS ecosystem. Mashable reports that hackers managed to break into†a number of iCloud accounts belonging to certain celebrities, and alleged†nude photos†and even compromising videos have been posted as a result. It?s not clear how the hack was possible or whether or not iCloud was indeed hacked by a malicious third party interested in stealing such sensitive information in order to sell it online. The hackers first took to 4chan to tease the ?goods,? revealing they managed to access handsets belonging to quite a


China's Tencent shuts messaging accounts after censorship rules-state media

- Fri, 29 Aug 2014 04:40:36 -0400

A picture illustration shows a WeChat app icon in BeijingChina's Tencent Holdings Ltd has suspended more than 300 accounts on its WeChat mobile messaging app and banned around 40 others as government restrictions on spreading political news online take effect, state media said on Friday. Earlier this month, China imposed new rules on what kind of information can be spread via instant messaging apps as well as restrictions on accounts which can broadcast news to large numbers of followers. Of the 357 accounts closed down by Tencent as of August 25, 46 were permanently banned while the rest were suspended, the official Xinhua news agency said on its microblog.


U.S. banking group says unaware of any 'significant' cyber attack

- Thu, 28 Aug 2014 21:07:02 -0400

JP Morgan Chase & Co sign outside headquarters in New YorkThe group, known as the Financial Services Information Sharing and Analysis Center, or FS-ISAC, includes all major U.S. "There are no credible threats posed to the financial services sector at this time," the group said in an email to its members. FS-ISAC told members in the email that it decided not to raise its barometer of threats facing banks during a regularly scheduled conference call on Thursday.


You have to check out these crazy CIA spy gadgets from 50 years ago

- Thu, 28 Aug 2014 16:24:19 -0400

You have to check out these crazy CIA spy gadgets from 50 years agoHave you ever watched a James Bond or Mission Impossible movie and wondered if any of those absurd gadgets could actually be put to use in the real world? Well as it so happens, the spies on the silver screen aren?t too different from our own Central Intelligence Agency of the mid-1900s. CNET has cobbled together a slideshow of some of the most fascinating pieces of spy tech in the history of the CIA ? some of them need to be seen to be believed. The bug you see above you is one of the highlights of the CIA Museum Artifacts collection. The Dragonfly Insectothopter, as it is known, was the first insect-sized flying vehicle to ever be developed by


Here's Why Angelina Jolie Is a Movie Star

- Thu, 28 Aug 2014 16:01:56 -0400

Here's Why Angelina Jolie Is a Movie StarToday Angelina Jolie got married; She was also the subject of a piece on Gawker' Defamer by Tom Scocca asking why she's considered a movie star, considering that she's mostly in crappy movies that aren't really very beloved. Scocca takes aim at some outright flops (Pushing Tin, Alexander) and some mid-sized hits (The Bone Collector, Salt), and notes that one of her biggest movies (Mr. and Mrs. Smith) probably did better because of all the publicity surrounding her relationship with Brad Pitt, and her subsequent films (The Good Shepherd, A Mighty Heart and Beowulf) did badly. "Julia Roberts and Sandra Bullock and Robert Downey Jr. and Leonardo DiCaprio?big names who appear, as Jolie does, on Forbes' lists of the highest paid†actresses†or actors?have histories of making hugely beloved hit movies," Scocca writes, while "Angelina Jolie's megastardom is completely independent of the substance of her movie career."


FBI Probing Cyber Attack on Major U.S. Banks

- Thu, 28 Aug 2014 10:11:29 -0400

FBI Probing Cyber Attack on Major U.S. BanksComputer hackers carried out a coordinated cyber attack on JPMorgan Chase and at least four other banks this month, a U.S. The FBI has begun investigating the case and is "working with the United States Secret Service to determine the scope of recently reported cyber attacks against several American financial institutions," FBI spokesman Paul Bresson said in a statement. In an email†statement to The Wire, Greg Kazmierczak, CTO of computer security company Wave Systems, said the attackers "performed a zero-day attack to gain initial access to the network."


JPMorgan probes possible cyber attack; reports other banks hit

- Thu, 28 Aug 2014 08:50:58 -0400

JP Morgan Chase & Co sign outside headquarters in New York(Reuters) - JPMorgan Chase & Co is investigating a possible cyber attack and working with law enforcement authorities to determine the scope, a company spokeswoman said on Thursday morning. The bank was taking additional steps to safeguard sensitive or confidential information, though it did not see unusual fraud activity at this time, company spokeswoman Trish Wexler said. JPMorgan disclosed the investigation after the FBI said Wednesday evening it was investigating media reports earlier in the day that several U.S. "We are working with the United States Secret Service to determine the scope of recently reported cyber attacks against several American financial institutions," FBI spokesman Joshua Campbell said in a statement late Wednesday.


JPMorgan and other banks hit with mysterious ?sophisticated cyberattack?

- Thu, 28 Aug 2014 08:30:34 -0400

JPMorgan and other banks hit with mysterious ?sophisticated cyberattack?JPMorgan and at least four other unnamed U.S. banks have been targeted by hackers, The New York Times and Bloomberg report, although it?s not clear what the purpose of this ?sophisticated cyberattack? really was. FROM EARLIER: Your credit card might already be for sale on the black market The hackers apparently broke into†the networks of the banks, where they managed to extract ?gigabytes of data,? including checking and savings account information. Bloomberg says the attack might be politically motivated, with Russian hackers targeting U.S. banks in response to the Ukraine crisis-related sanctions against Russia, but the Times says the FBI and security experts have not reached that†conclusion yet. The cyber heist might be related to economic espionage, or the hackers


FBI, Secret Service investigate reports of cyber attacks on U.S. banks

- Wed, 27 Aug 2014 23:36:42 -0400

JP Morgan Chase & Co sign outside headquarters in New YorkFederal Bureau of Investigation said it is investigating media reports that several U.S. "We are working with the United States Secret Service to determine the scope of recently reported cyber attacks against several American financial institutions," FBI spokesman Joshua Campbell said in a statement late on Wednesday. JPMorgan Chase & Co was the victim of a recent cyber attack, according to two people familiar with the incident who asked not to be identified because they were not authorized to speak publicly about the matter.


FBI investigating reports of attacks on US banks

- Wed, 27 Aug 2014 22:58:18 -0400

NEW YORK (AP) ? The FBI said Wednesday it's working with the Secret Service to determine the scope of recently reported cyberattacks against several U.S. financial institutions.

Hackerspaces help techies turn ideas into reality

- Wed, 27 Aug 2014 21:28:41 -0400

People work on computers at a communal workbench at HeatSync Labs in Phoenix, in this photo made Wednesday, July 23, 2014. The nondescript garage-like workshop nestled between restaurants, a flower shop and jewelry stores offers a space where inventors and tinkerers can work on projects and share ideas. (AP Photo/Emaun Kashfi)MESA, Ariz. (AP) ? Inside a nondescript garage-like workshop nestled between restaurants, a flower shop and jewelry stores along Main Street, ideas are taking shape.


JPMorgan attacked by Russian computer hackers: report

- Wed, 27 Aug 2014 16:12:40 -0400

JP Morgan Chase & Co sign outside headquarters in New York(Reuters) - JPMorgan Chase & Co and at least one other bank were attacked by Russian hackers in mid-August and the FBI is investigating whether the assault was in retaliation for U.S.-government sponsored sanctions against the country, according to a report by Bloomberg News citing two unnamed sources. The attack resulted in the loss of sensitive data and authorities are investigating whether it was linked to recent infiltrations of major European banks, the report said, citing one of the sources. ...


This is the phone Sony will launch to take on Apple?s iPhone 6

- Wed, 27 Aug 2014 15:25:34 -0400

This is the phone Sony will launch to take on Apple?s iPhone 6After several years of complete and total domination by Samsung and Apple, a handful of rival device makers are finally starting to see some gains in the global smartphone market. Huawei and Lenovo have experienced some solid growth in recent quarters, and up and comer†Xiaomi is among a handful of smaller Asian†companies seeing big gains in that region. Meanwhile, Sony has continued to struggle despite launching several solid smartphones over the past couple of years. The fall and the coming holiday shopping season are expected to be the†hottest period in Apple?s storied†history, with a record holiday quarter expected on the back of the iPhone 6, 5.5-inch iPhone phablet and iWatch. To combat the new iPhone 6, which is widely expected


Top-secret project could produce the most exciting Android phone ever made

- Wed, 27 Aug 2014 11:00:04 -0400

Top-secret project could produce the most exciting Android phone ever madeForget the OnePlus One ? there could soon be a brand-new Cyanogen-enhanced Android phone coming that will blow other Android phones away. Per Engadget, Cyanogen and a mysterious startup called Nexbit have announced that they?re working together on ?something really cool,? although they never specify what that ?something? actually is. There are some very good reasons to think it?s going to be a killer new Android phone, however. FROM EARLIER: In a potential major blow, HTC loses the man behind its gorgeous smartphone designs The biggest reason to think this is that Nextbit boasts a strong roster of talent that?s been poached from Amazon, Google and HTC, highlighted by former HTC exec†Scott Croyle. For those of you who don?t recall,


Netflix opposes Comcast-TWC merger in gigantic 256-page FCC petition

- Tue, 26 Aug 2014 19:45:59 -0400

Netflix says it lost customers thanks to slow streaming on ComcastNetflix has filed a 256-page petition with the FCC asking the regulator to deny the proposed Comcast-Time Warner Cable†because†it would cause†?serious public interest harm.? FROM EARLIER: Netflix rails against ISPs even as it agrees to pay off yet another one for better connections Netflix has defended Net Neutrality numerous times before, all the while having to ink interconnect deals with four major ISPs (including Comcast and TWC) to ensure its customers get an enjoyable movie streaming experience. In its lengthy FCC petition, Netflix explains that a Comcast-TWC giant would have huge leverage over†Netflix, Hulu and other competing providers, as it would not only be in a position to charge these services fees for faster service,†but also provide competing video-on-demand services


Thousands of Android phones are being hijacked by terrifying ransomware

- Tue, 26 Aug 2014 18:15:04 -0400

Thousands of Android phones are being hijacked by terrifying ransomwareAndroid users beware ? another major malware threat has taken the mobile world†by storm. According to San Francisco-based security firm Lookout, nearly 900,000 Android phones have been targeted by a form of ransomware called ?ScarePackage? in the last 30 days, The New York Times reports. ?This is, by far, the biggest U.S. targeted threat of ransomware we?ve seen,? Jeremy Linden, a senior security product manager at Lookout told the Times. ?In the past month, a single piece of malware has affected as many devices in the U.S., as a quarter of all families of malware in 2013.? If you?ve never been infected with†ransomware before, consider yourself lucky. Ransomware locks you†out of your†device and overlays a message on the screen which


Banks to meet with Treasury Department on cyber threats: sources

- Tue, 26 Aug 2014 12:08:35 -0400

By David Henry and Lauren Tara LaCapra NEW YORK (Reuters) - A group of Wall Street banks plan to meet the U.S. Treasury Department and other government officials next month to talk about how to cooperate to fend off cyber attacks, people familiar with the matter told Reuters. Bankers and government officials say they want to figure out ways law enforcement can alert financial firms about cyber attacks without violating the privacy of businesses that are victimized. A multitude of federal agencies, including the Federal Bureau of Investigation, Secret Service, Department of Homeland Security and National Security Agency, help monitor and fight the hackers that have increasingly targeted financial institutions in recent years.

 

Twitter / SecureMac

http://twitter.com/SecureMac

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

- Fri, 18 May 2012 14:52:24 +0000

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

- Thu, 05 Apr 2012 01:30:08 +0000

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

- Tue, 20 Mar 2012 06:00:04 +0000

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

- Fri, 16 Mar 2012 20:18:06 +0000

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

- Tue, 13 Mar 2012 18:52:23 +0000

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

- Mon, 05 Mar 2012 21:06:20 +0000

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

- Fri, 17 Feb 2012 16:55:34 +0000

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

- Wed, 08 Feb 2012 05:58:53 +0000

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

- Fri, 27 Jan 2012 02:19:15 +0000

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

- Thu, 26 Jan 2012 16:06:39 +0000

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

- Thu, 26 Jan 2012 16:04:23 +0000

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

- Wed, 25 Jan 2012 16:54:46 +0000

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

- Thu, 19 Jan 2012 20:39:49 +0000

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

- Wed, 18 Jan 2012 22:30:24 +0000

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

- Fri, 06 Jan 2012 19:20:40 +0000

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

- Wed, 04 Jan 2012 17:03:38 +0000

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

- Fri, 23 Dec 2011 15:50:24 +0000

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

- Tue, 20 Dec 2011 17:09:59 +0000

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

- Mon, 28 Nov 2011 17:23:17 +0000

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty

- Fri, 25 Nov 2011 05:08:17 +0000

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty