Players are a key target for cybercriminals

10:04:00 PM 2 Comments
Players are a key target for cybercriminals -

Cybercriminals are becoming avid start targeting players to steal their data from their game accounts and those of their virtual objects whose value can reach thousands of dollars for some of them.

gamers

global growth identified cyber attacks Kaspersky announced targeting. Between January and June 2013, are well over two million attacks against players around the world that have been identified, representing almost 11,500 attacks per day, while the number reached 7,000 in 2012.

Kaspersky Lab has identified 10 European countries that are most affected by the attack attempts in the first half of 2013: Spain comes first with 94,700 annual attacks, followed by Poland (85,000), followed by Italy (52 0). France is fourth with 29,300 targeted attacks. Then comes Germany (18 300 attacks), Ukraine, Greece, Romania, Portugal and Serbia.

Players are indeed lucrative targets for cyber criminals. "The increasing use real money to buy virtual items can increase their yields," says Nicolas Burn, Senior Malware Researcher at Kaspersky Lab. "Phishing is also very present and is suitable for video game codes."

to prevent your computer or mobile device to be in danger, use a VPN service now. you must ensure that your online business, your p2p activities and downloads arrive safely.

your internet connection is encrypted with a level top secret that protects you against hackers and illegal ears trying to listen or obtain sensitive information about you. also, your IP address is automatically replaced by an anonymous IP address country you have selected

Finally, your computer is hidden behind the VPN many servers :. When connected to the VPN, no one can access your computer without passing through the protected VPN servers.

VPN Installation is simple and does not take more than 2 minutes. Buy a VPN service or test our VPN offers free now.

Yahoo! closed in China

9:03:00 PM Add Comment
Yahoo! closed in China -

Yahoo China , which was operated by Alibaba Group, e-commerce and Chinese Internet services, has just closed its Web portal.

farewell message posted on the website redirects visitors indeed now.taobao.com and explained that the decision to close the portal Yahoo China is in line with the agreement concluded in 2012 between Alibaba Group and Yahoo !.

gate closure of Yahoo China comes two weeks after Yahoo's email service in China stop, with users invited to transfer their accounts to Alimail Alibaba. In January, Yahoo China ceased Chinese music service, explaining that the company adapts its product strategy.

Indeed, in 05, Yahoo paid $ 1 billion for a 40% stake in Alibaba, before the company became one of the key assets of China's booming e-commerce market. Then, in 2012, the agreement between Yahoo and Alibaba Group refers later to go on the Functioning of the brand Yahoo China for up to four years. The decision of the Alibaba group gradually stop operating its brand Yahoo properties is an example of the difficulties faced by major American Internet companies like Google, eBay and Amazon China. This can be explained by the large government censorship, but also by the inability to efficiently locate and kick some Chinese companies such as Baidu and Tencent.

Yahoo still holds a 24% stake in the Chinese company, which should make public by 2015 and is estimated at about $ 14 billion.

As a Chinese resident, if you want to avoid Internet censorship and access is at your Yahoo services, go to VPN, a service that allows you to choose your country connection. You can base your IP address to be located in one of the 100+ countries where access is not limited and will thus access to the sites of your choice completely anonymous. You can access blocked sites and protect your Internet activity with a secure VPN tunnel including a virtual military encryption. Installing VPN is simple and does not take more than 2 minutes, then do not hesitate.

VPN for China

Customers want to cover their online movements

8:02:00 PM Add Comment
Customers want to cover their online movements -

according to a new US study, more and more users would like to be anonymous online, but still think it is impossible to avoid observation by specific people or organizations.

In a survey of 792 US Internet users, 86% said they have taken specific steps to remove or mask their fingerprints :. namely delete cookies, encryption of email, avoiding use their real names online or hide their IP address

The survey was conducted by the Pew Internet Project Research Center, and subscribed by Carnegie Mellon University. He explained that 59% of Web users surveyed do not believe that it is possible to be totally anonymous online, and 68% of Internet users believe current laws are not good enough to protect the privacy of people online.

This is not due to a lack of awareness, as most Internet users know - according to Pew - that some of their personal information - such as photos, videos, addresses e- email, birth dates, phone numbers, home addresses are available online.

A growing number of Internet users say they are concerned about the amount of personal information about them that is online, a figure that has increased from 33% in 09 to 50% in 2013 .

people do not really know how to take control of their information and to ensure that the content of their emails, the people to whom they send e-mails, where they are when they are surfing online, and content of files they download are not accessible to prying eyes.

recent PRISMgate and other revelations of Internet surveillance has made people more willing to protect their personal data without knowing where to start in order to be sure they remain anonymous online.

"Their concerns apply to any one monitoring ecosystem. In fact, they are planning to try to hide their personal information against hackers, advertisers, friends and members of the family they try to avoid observation by the government. "Lee said Rainie, project director of the Pew Research Center Internet has also contributed. report

the section of the survey watching various issues related to security revealed why this desire has recently developed problems that many Internet users have already experienced: 21% had an email account or social network compromised or used without permission, 12% were stalked or harassed online. Last but not least, 11% had stolen important personal information such as credit card or bank account, and 6% had an online scam and lost money due of cybercrime.

Be careful about the data you leave on the Internet, free downloads and free services may mean that you are actually the product. The best way to protect yourself is to use a VPN in order to encrypt all communications and Internet data transfer. Thus, no one can analyze your browsing information and can not offer you ads based on your personal data. In addition, targeted advertising also uses geolocation to increase efficiency. With a VPN, you can easily change your IP address by selecting a host country between several servers worldwide. The VPN allows you to hide both your personal and your country. Your connection is made anonymous and reliable, and you can stay for free on the Internet, away from prying eyes.

bringing together millions of email contact lists NSA

7:01:00 PM Add Comment
bringing together millions of email contact lists NSA -

the famous NSA - that the US intelligence agency - hundreds gathered million digital lists of American contacts through their e-mails or instant messaging services as revealed by the Washington post, referring to documents leaked by Edward Snowden, the former NSA consultant.

For example, during a single day in 2012, the NSA said it had intercepted more than 444.743 contacts lists from Yahoo !, email accounts 82,857 Facebook accounts, 33 697 from Gmail accounts, and 22,881 from various other ISPs in a statement published by the Washington post.

These data represent a typical day of data collection. When these figures are extrapolated over a year, it reached an enormous number of 250 million e-mail address books lists. This would imply that several million Americans have been spied on and get their personal data collected by the government, without them being aware.

These data are very high, since in these e-mail databases, there are also phone numbers, physical addresses, economic information and family, and in some cases, raw lines of a message.

NSA intercepts these lists "on the move" when they are in the Internet exchanges, rather than "resting" in the server computers. And because of this, the NSA does not need to inform Internet groups that contain this information, such as Yahoo !, Google or Facebook.

To circumvent the law which prohibits the collection of data on American citizens on US territory, the NSA intercepts data from different access points "in the world" but not to the States United, said intelligence officials.

during the summer because of the scandal triggered by information Edward Snowden, President Obama promised US review the monitoring programs on the telephone and digital data. Meanwhile, Russia gave Edward Snowden asylum for a year, but the US wants it to be extradited to face charges of espionage and organized leak information about the NSA surveillance program the United States and abroad.

To protect your personal data, select a VPN service: the VPN encrypts your Internet connection and keep private the sites you visit and the information you provide on those sites. Any information you send will go directly into your secure virtual tunnel, including a Russian VPN server. With the service VPN, you can easily direct your traffic from one of 20 available countries. Your computer and your mobile or tablet to connect to the Internet from one of 20 available countries and no one can intercept your online business. Choose the service VPN to surf the Internet safely and anonymously, where you connect to the Internet from.

The cost of cybercrime is in full swing

6:00:00 PM Add Comment
The cost of cybercrime is in full swing -

According to HP, the cost of cybercrime has increased by 78% in four years and in the same time to respond to the attacks has more than doubled. In addition, the attacks become more frequent.

Developed by the Ponemon Institute for HP, the 2013 cost of the study on cybercrime shows that cybercrime has reached US $ 11.56 million cost for a representative sample of US companies, an increase 78% compared to HP first study four years ago. This study also found that the time required to neutralize a cyberattack increased by nearly 130% over the same period, the average cost incurred to address a single attack has reached a million.

Cyber ​​attacks are increasingly sophisticated cybercriminals are increasingly specialized and share information to obtain confidential data and interrupt critical business functions.

the average annual cost of cybercrime by company reached US $ 11.56 million, the range is between 1.3 and 58 million. This represents an increase of 26% or $ 2.6 million, compared with the average cost reported in 2012.

Businesses face on average 122 successful attacks per week, t.v. 102 in 2012.

The time to resolve a cyberattack is 32 days, with an average cost associated with the attack is US $ 1,035,769 or US $ 32,469 per day on average, which means an increase of 55 % over last year -. 591.780 dollars for a time to solve the attacks of 24 days on average

the most costly cybercrime activities are those related to malware and denial of service. The theft of information continues to be the highest external cost, followed by disturbances. On an annual basis, account information loss for 43% of total external costs, and is down 2% compared to 2012. business interruption or loss of productivity accounts for 36% of external costs, is up 18% from 2012.

If the cost of cybercrime differs depending on company size, small structures show a much higher cost than the large groups of employees
the cost of cybercrime is significantly higher in the following areas :. financial services, defense, energy and public services in retail, hospitality and consumer products.

HP with this study of US companies, the Ponemon Institute conducted specialized studies in Australia, Germany, Japan and the UK for the second consecutive year. A survey of French companies was conducted for the first time this year. Among the countries studied, American companies have shown the greatest impact in terms of cybercrime, with an average total cost of $ 11.6 million, the cost of up to $ 5,10,000 for French companies appear.
The latest report found that Norton 2013 every second, 12 people surfing the Internet in the world become victims of malicious acts online. This is actually more than 1 million people every day. During one year, 378 million adults worldwide are victims of cybercrime.

To avoid becoming a target for cyber criminals, use a VPN service when surfing the Internet and that, regardless of where you are: all your internet activities are anonymous and protected by a military complex coding type using VPN and PPTP VPN open. In addition, through the virtual VPN tunnel that you establish your secure VPN connection appears as a connection from your chosen country, you will change and hide your IP address. This is true if you connect from your computer, your mobile phone or tablet. And you can use the free Wi-Fi networks without your computer by taking the risk that your traffic is intercepted.

Installing a VPN today, or follow us on the blog VPN and social networks to take advantage of some free VPN offers.

McAfee assessment of cybercrime in Q3 2013

4:59:00 PM Add Comment
McAfee assessment of cybercrime in Q3 2013 -

McAfee has unveiled its latest analysis of the key trends of cybercrime in the third quarter of 2013 :. it shows that cybercriminals are not many holidays this summer

"during the summer, we added 20 million new samples in the" zoo "McAfee, which now includes a total of 170 million elements. "We also found four major trends that require both individuals and businesses to be cautious about how they protect their data," said Francois Paget, one of McAfee Labs researchers . This includes an increase in attacks on Android devices 30%, growth of "signed" malware, spam increased (+ 125%) and increased use of virtual currencies.
about the increasing attacks on Android, McAfee researchers have identified a new family of malware (Exploit / MasterKey.A) that allows a cyberpirate go beyond verifying the digital signature corrupt applications. They also identified a new type of malware that, once installed, downloads a second layer, without the user's knowledge.

"Signed" malware also increased by 50% compared to the third quarter. This concerns the validity of most digital certificates that are currently underway. They also raise questions about how businesses and individuals can now distinguish the valid certificates of those corrupt. This trend is even stronger mobile, growing from zero to almost 25% of Android malware samples recorded during the last three years.

Regarding the increase in spam (+ 125%), it was boosted in September allegedly due to "snowshoe spammers" or affiliate marketing practices, which seeks to legitimize vis-mark -vis its consumers.
Finally, virtual currencies, a market estimated in 2012 by Yankee Group to nearly $ 47.5 billion, it still draws more pirates. These virtual currencies (or bitcoins) suffer no regulation or control and represent an unprecedented opportunity for money laundering. They are also stimulated by the development of parallel Internet markets, including counterfeit drugs, arms sales, drug buy, etc ... And although the best known of these sites, called Silk Road, was closed on October 1st, these illegal markets persist and they seem to dry up soon.

to avoid becoming a victim of cyber criminals use a VPN in order to encrypt all communication and data transfer over the Internet, if you use a PC, mobile phone or tablet. Thus, no one can analyze your browsing information and send you malware. With a VPN, you can easily change your IP address by selecting a host country between several servers worldwide. The VPN allows you to hide both your personal and your country. Your connection is made anonymous and reliable, and you can surf safely on the Internet, away from prying eyes.

NSA also monitor online games

3:58:00 PM Add Comment
NSA also monitor online games -

according to a new paper published by Edward Snowden, the former NSA agent, and published on the website ProPublica, online games like World of Warcraft and Second Life are monitored since 08 by the American and British intelligence services .

According to the document, terrorist and criminal organizations are using online games to communicate without being known, transfer money or planning attacks. Thus, the spies would have created their own characters to infiltrate the field of online games and possible witnesses suspects exchanges.

However, according to the Guardian and the New York Times, which analyzed all the documents, the secret services have placed as many agents on the case where a group of "confliction" (this term refers to military effort in place to prevent interference or collisions between professionals in the same camp) had to be created.

Moreover, the company behind World of Warcraft revealed that neither the NSA nor his British counterpart (Government Communications Headquarters) had requested permission to gather information about the players through their game. These agencies all approaches create more problems than the activities of US citizens can not be controlled unless justice prior approval. Moreover, according to former intelligence officers and employees of these video game companies, there is no evidence that terrorist groups do use these platforms to communicate with online play.

The best way to limit the traces you leave on the Internet is to use a VPN service. A VPN reduces your online movements by replacing your routing information: your IP address will be replaced by an anonymous IP address. Our secure DNS servers keep secret requests that you make, so that no one can take a look at your browsing history. Your Internet connection is encrypted with a secret top-level system that protects you against hackers and ears trying to listen or obtain sensitive information about you. Your computer is hidden behind the many VPN servers :. When connected to the VPN, no one can access your computer without passing through the protected VPN servers

How NSA elite team works

2:57:00 PM Add Comment
How NSA elite team works -

Sneak in the TAO, the elite division of the NSA with equipment similar to that of James Bond!

So far, the NSA had led to many new media with the case of PRISM, a scandal involving major players in the Internet, through its massive data espionage . online people "suspected of being dangerous" But the NSA has much more sophisticated means, when he aims to collect targeted information: access to customized operations (CAT) is a team of elite hackers specialize in data theft, revealed by the German magazine Der Spiegel.

the elite unit would be collected "some of the most relevant information that our country has ever seen," according to comments . anonymously by one of the leaders of this elite team for information, TAO uses various means: a kind of James Bond arsenal of sophisticated spy equipment to targeted interception equipment material to slip special software

Among the high-tech gadgets, the TAO would be. and exploited some USB keys containing radio transmitters to compile data in transit to them, but also the computer screen cables that can record everything that happens on the screen. And that material power is coupled with detailed knowledge of the Internet and all kinds of software. All defects (Internet, architecture of the weaknesses of common software ...) are operated to spread spyware. The German newspaper said that the resumption of Windows error reports to Microsoft may be through the NSA in order that it can optimize its operations spyware.

Last but not least, the CAT can also intercept the material ... If any of the NSA "targets" to place an order to buy electronic equipment (computer or other things), the package may pass through the hands of the TAO expert before reaching the customer. With support from the FBI and / or CIA, the elite team creates a check on deliveries. After a stint at TAO, the material contains the software required for the user to be spied closely. According to documents recovered by Der Spiegel, this method would be "much more productive."

This information is added to the sum of revelations that leaked into illegal methods of the NSA. American documentary filmmaker Laura Poitras, which is close to Edward Snowden, also contributed to this article in Der Spiegel.

The best way to ensure that your personal data is not followed is to use a VPN service. The reduced VPN your online movements by replacing your routing information by anonymous IP address. Secure DNS servers VPN keep secret requests that you make, so that nobody can see your browsing history. in addition, your Internet connection is encrypted with a very robust system that protects you against hackers and illegal ears trying to listen and obtain sensitive information about you. Your Internet connection is hidden behind many servers VPN :. When connected to the VPN, no one can access your computer or mobile device without using VPN protected servers

Crime: between the internet and reality

1:56:00 PM Add Comment
Crime: between the internet and reality -

cybercrime is gaining ground in the real world with the same approaches used by cybercriminals and traditional criminals. We also note that more and more cases of crime involving the use of digital media, "said the French security information Club (CLUSIF) in its 2013 Panorama.

According to Eric Freyssinet, Head of Division of the fight against cybercrime in the French National Police, one can speak of "the internationalization of organized crime with links between the two worlds. And France is highly targeted by these criminals: there were only French trade data on some servers found by the security company Symantec "

He also cited a criminal group" apparently based in Israel " which involves cybercriminals "apparently. based in Ukraine to collect targeted positions IT business information for passwords, credit card numbers while money transfers took place. "

CLUSIF noted that 2013 saw many cybercriminals arrests, particularly related to the group Anonymous, "but they have not disappeared shots to stop these activities are temporary and closed services reopened in a very short period of time." commented the report

"the methods used by the group were taken and improved by some circles of criminals," said the CLUSIF. in 2013 was the "year of decomposition" of this system Anonymous, "the movement has become a victim of its own success and opportunists have used the movement as a screen to demand "their actions and" echo motion codes, "explains Fabien Cozic, the consultant for cybercrime Lexsi society.

the Anonymous group is also an international movement to fight for online freedom. It aims to both private companies such as Sony government systems, Visa and Amazon and. Last October, 13 alleged members of the group of hackers were indicted in the US for a series of attacks against US companies and organizations.

For you not become the weakest link in cybersecurity, choose to have a VPN service today :. VPN encrypts your Internet connections and private guard the sites you visit and the information that you leave on these sites

Any information you send will go directly into your secure virtual tunnel. With the service VPN, you can easily direct your traffic from one of 20 available countries. Your computer and your mobile phone or tablet to connect to the Internet from any of these countries and no one can intercept your online business. You will be able to download all the content you want and even access blocked sites without any problems. Changing your IP simply by the service VPN is one of the most important steps to surf the Internet safely and anonymously.

Cybercrime, a difficult threat to evaluate

12:55:00 PM Add Comment
Cybercrime, a difficult threat to evaluate -

cyber attacks are increasingly, via the Internet scams are becoming more sophisticated as criminals hone their attacks like true professionals. Cybercrime has never been heavy and threatening, while specialists are struggling to determine its extent

"Cybercrime statistics do not work. Sometimes you multiply that by ten, because people do are not aware of being a victim, but also because some of them, such as businesses, are reluctant to complain because they fear it may have some negative impact on their image, "said the Lieutenant Philippe -Colonel Mirabeau, in charge of cybersecurity within the French police.

The French National Observatory for responses to crime and criminal (ONDRP) admits that offenses recorded by the police does not represent "a direct measure of phenomena related to cybercrime."

in its latest review, ONDRP saw a sharp increase in fraudulent access or maintain an automated data processing system, common in the theft of data on companies, which amounted to 1,427 in in 2012 against 419 in 09 (+ 240%).

ONDRP evaluates the targeted 42% increase in 2012 in the cyberworld, with criminals increasingly targeting small businesses and subcontractors to achieve more.

"Before, we used to meet on the battlefield, now is the Internet," said Jean-Marc Grémy.

Governments are also concerned. In 2012, during the French presidency of the G20, the home of the state and the Ministry of Finance have been targeted by a major cyberattack. These major attacks occurred in several countries, including Estonia, the United States and Canada.

These risks are all the more serious that organized criminal groups, who were drug professionals, vehicles and prostitution are evolving cybercrime, which is much more lucrative with less criminals risks.

more, criminal networks are becoming more professional, trying to recover some computer experts, who were economic victims and are likely to put their skills to their separation.

"We can not focus only on the facts alleged. We need a broader response, more transversal, allowing us to anticipate these new forms of cyber threats," said the experts of the Central Police (DCPJ).

to prevent cybercrime, opt for a VPN service today: the VPN encrypts your Internet connections and keeps private the sites you visit and the information that you leave on these sites

Any information you send will go directly into your secure virtual tunnel .. with the service VPN, you can easily direct your traffic from one of 20 available countries. Your computer and your mobile phone or tablet to connect to the Internet from any of these countries and no one can intercept your online business. You will be able to download all the content you want and even access blocked sites without any problems. Changing your IP simply by the service VPN is one of the most important steps to surf the Internet safely and anonymously.