Will 2010 be the Year of Spam?

If you think spam attacks were bad in 2009, just wait until 2010 gets going.

In its 2

Artwork: Lou Beach
009 Annual Security Report [PDF], the networking gurus at Cisco predict that worldwide spam volumes will increase by 30 or 40 percent over 2009 levels. So get ready for a fresh glop of discounted penile-enhancement pills, strange women "winking" at you through nonexistent dating sites, and faux Nigerian princes promising $100 million waiting for you overseas. The hardest hit by this gush of obnoxiousness will be social networking sites, especially the king of them all: Facebook.

spam chartSocial networking isn't just for kids anymore. Since businesses and organizations began digging into the gambit of cyber friends and fans, spammers have taken the opportunity to ramp up efforts to grab the attention of the unsuspecting. Facebook claims that site visitations increased 105 percent from December 2008 to December 2009. (Click on the chart for a close-up view.)With these kinds of numbers, it's no wonder spamming has followed suit.

One of the most notorious spam attacks on Facebook was Koobface, a malware bot that commandeered Facebook profiles and turned them into infectious zombies. Koobface tricked victims by posing as Facebook friends, thereby increasing chances that people would follow malicious links. Koobface is not alone -- according to Project Honey Pot (via Times Online), a system for identifying spammers and the spambots used, "Since 2004 the number of bots has nearly quadrupled ever year. In 2009, there were nearly 400,000 active bots engaged in malicious activity on any given day with several million active over the course of any month."

Apart from simply destroying computers, Facebook spam has also been used to empty wallets. "Facebook has also been used to launch '419' scams. The scam normally starts when a Facebook user is fooled into handing over Facebook login credentials, or has their login credentials stolen by keylogger malware on their machine. With these stolen credentials, the criminal logs in to the user's Facebook account and sends messages to the user's Facebook friends, asking them to wire money -- supposedly because the user is stranded in a foreign country," the Honeypot report says.

There are, of course, ways to protect yourself against spam attacks. The most effective method is common sense. By now, most people should recognize the difference between legit e-mail messages and a hacker's silly attempt to burrow under the covers. And antispam support has become a lucrative industry itself -- coincidentally, Cisco itself touts a spam and virus blocker on Facebook. Web security leader Websense recently launched Defensio 2.0, "which analyzes and classifies user-generated content on Facebook to prevent the posting of malicious and inappropriate content, and enhances the real-time threat intelligence of the Websense Web Security Gateway." Such measures are a clear indicator that Facebook has adopted a poor disposition that requires protection.

Read More ..

How to Avoid Haiti Quake Scams

When a major disaster like the quake in Haiti hits, good people and groups around the world step up to offer help and donations. Right behind them evil scammers around the world scramble to intercept those donations. In the next few days you'll probably encounter numerous e-mails, Facebook groups, and tweets with links to sites requesting donations to help the quake victims. How can you separate the valid charities from the frauds?

Here are ten tips to ensure your donations go to the right place.

  1. Sanity-check URLs. Some scammers are sloppy. If an e-mail message claims to be from the International Red Cross, say, but the URL links point to something wildly different, stay away! Not sure? In most e-mail clients you can point to a link with the mouse and see the actual URL in the status bar or in a tooltip.
  2. Decode Short URLs. If a tweet or other post includes a shortened URL pointing to a charity site, don't click it. Instead, use one of the many services that retrieve the full URL. Here again, if it looks wrong, stay away.
  3. Don't Even Click Valid URLs. Even if the links in an e-mail appear to be valid, don't click them. Instead, navigate directly to the organization's web site and look for information about helping disaster victims.
  4. Run a Background Check. We can't all be familiar with every legitimate aid group. Before visiting a group you don't recognize, check the site's ownership using www.whois.net or another site that supplies whois data. This should give you the full company name, an address, a contact name, and a phone number. If the results don't jibe with the stated name, stay away.
  5. Do a History Check. You'll surely feel safer donating to a charity Web site that's been around for a while. Go to the Internet Archive and check the site's history. If there's no history, the site is very recent. Yes, it could be that the organization was formed to help with the current crisis, but it could also point to an opportunistic scam.
  6. Ask the Better Business Bureau. The Better Business Bureau online offers a page that lets you check their charity reviews. You can search by name, URL, e-mail address or phone number. A positive response means it's a valid charity, but "not found" isn't necessarily a black mark. For example www.icrc.org, the Web site for the International Committee of the Red Cross, isn't in the BBB database.
  7. Don't Donate Cash. If the charity asks for cash, offers to send a messenger to pick up your donation, pressures you to donate more than you've offered, or otherwise seems over-eager, disengage right away. Your safest donation is a check, made out to the organization and not to any individual.
  8. Beware Collateral Damage. Scammers trolling for cash aren't your only worry. As with other newsworthy search terms, searches about the Haiti quake may turn up malicious Web sites. The bad guys get these sites into search results using what's called "SEO poisoning" (SEO means Search Engine Optimization). Click the wrong one and you may be hit with a drive-by download; let's hope your security suite blocks it.
  9. Give to Groups. You may get an appeal through e-mail or social networking from an unfamiliar individual claiming to be a victim and asking for your direct help. It may seem hard-hearted, but don't respond. Impersonating a victim is much easier than impersonating a charity. If the appeal touches your heart, make your donation to a known aid organization.
  10. Give Proactively. Supposing you do want to donate money toward aiding the quake victims, don't wait for an invitation. Locate a likely charity that's helping in that area and contact them to make your donation. Now you can ignore any other possibly-unsafe requests for donations with a clear conscience.

Of course these tips aren't limited to the Haiti quake. You should take care whenever responding to requests for help, or to any unsolicited e-mail or social networking contact. That way your help will go to those who need it, not to the vultures.

Read More ..

Nexus One: Cheaper Than an iPhone Inside


The Nexus is raising quite the ruckus. From the squabble over the device's name to complaints over poor 3G performance and subpar support, Google's first foray into phone sales is taking some unfortunate twists.

One can only hope Google and T-Mobile will get to the bottom of the problems (Google, for its part, has said it's "committed to sorting out the few kinks" in its new systems). In the meantime, we can take a closer look at what's inside the Nexus One and what your hard-earned money is actually buying.

Inside Google's Nexus One

The Nexus One, manufactured by HTC, costs $529 unlocked or $179 with a two-year T-Mobile contract. The phone itself, according to a new analysis, actually contains about $174 worth of hardware -- five bucks less than the iPhone 3GS.

The analysis is by a company called iSuppli. It broke down all of the phone's components to estimate the "bill of materials," or total hardware cost. The estimate doesn't include manufacturing expenses, nor does it take into account things like packaging, accessories, and royalties. (It also, as far as I know, does not apply to those weird supersized versions of the phone.)

(click on image above to enlarge)

Not surprisingly, the Nexus One's 1 GHz Snapdragon processor is its most expensive part, followed by the OLED display. Here's the breakdown, according to iSuppli:

  • Processor: $30.50
  • Display: $23.50
  • Memory: $20.40
  • Touchscreen assembly: $17.50
  • Camera: $12.50
  • MicroSD Card: $8.50
  • Bluetooth/wLAN: $8.20
  • Battery: $5.25

The rest of the cost is taken up by parts such as electrical components, power management technology, and other mechanical hardware.

Read More ..

Spyware Doctor™ Receives Choice Award

San Francisco, December 1, 2009: Leading security software vendor, PC Tools, has been awarded the prestigious PCMag.com Editors' Choice Award on October 15, 2009, for its brand new product Spyware Doctor with AntiVirus 2010.

According to PCMag.com reviewer Neil J. Rubenking, "Spyware Doctor with AntiVirus 2010 adds numerous new guards against malware and promises enhanced malware detection and cleanup-and delivers." Rubenking states that the product, "totally knocked his socks off!"

"PC Tools is honored to have received the PCMag.com Editors' Choice award for the new 2010 release of our flagship product, Spyware Doctor with AntiVirus," says Michael Greene, Director, Product Strategy, PC Tools. "This accolade is a testament to the powerful protection Spyware Doctor with AntiVirus provides and recognizes the achievement of our highly skilled research and development team."

PC Tools Spyware Doctor with AntiVirus provides a diverse combination of technologies with powerful multi-layered protection at every entry point. Rubenking credits Spyware Doctor with AntiVirus 2010 for setting a new record in the malware blocking test, scoring 9.7 of 10 possible points. "The latest Spyware Doctor proved effective in every area of malware removal and blocking. It's a great product."

Some of the product 'pros,' as noted by PCMag.com, include, "actively cleans malware found during installation, can install or scan in safe mode;" and, a "top scorer in malware-removal and malware-blocking tests."

You can see the full PCMag.com review here.

Read More ..

Windows 7: Five Unique Features

Other parts of this story package are dedicated to explaining how to replicate Windows 7 features on a Vista or XP machine--and we offer so many suggestions that you may be starting to think that perhaps there's no compelling reason to upgrade to Windows 7 after all. If so, you should think again. Though Vista and XP users can enjoy some of the new operating system's goodies, either directly or by proxy, various highly desirable features are available only in the genuine article. Here are five that will require you to roll a 7.

Device Stage: Whereas Vista barely seems to recognize the presence of cameras, phones, printers, and other external devices, Windows 7's Device Stage treats them like royalty. The operating system devotes a slick-looking status window to each device, so you can browse files, manage media, and perform other device-specific tasks.

HomeGroup: At long last, Microsoft promises to take the pain and frustration out of home networking for users of its operating system. Set up a HomeGroup, and then add PCs and other devices--and without further ado you can share files, printers, and the like. Why did it take seven versions of Windows to get this right?

Jump Lists: Like souped-up Recent Documents menus, Jump Lists provide quick access to application-specific documents and/or tasks. For example, you can right-click the Internet Explorer taskbar icon and choose from a list of frequently visited Web sites or from a list of available tasks (such as New Tab and InPrivate). Once you get started using Jump Lists, you'll wonder how you ever got along without them.

Libraries: Most of us have documents, music, pictures, and video scattered across multiple folders on our PCs. Libraries are special folders in Windows 7 that catalog these items under a single roof, regardless of where you actually store them on your hard drive. And best of all, Libraries are easy to share within your HomeGroup.

One-click Wi-Fi: Unlike Windows Vista, Windows 7 makes choosing a wireless network to connect to simple and convenient: Click the system-tray icon, and choose from the resulting list of available hotspots. Granted, you can find third-party connection managers for Vista, but nothing this streamlined and unobtrusive.

Read More ..

SOLUTION: Windows Vista Updates for MS Office Fail if MS Office Live Add-In is Installed

In October, three Windows updates (KB973709, KB972581, KB974234) for MS Office failed repeatedly on my Vista Home Premium (32-bit) Acer laptop and on my Vista Home Premium (64-bit) Asus desktop. They were failing for others, too, according to my fruitless research. Everyone had suggestions, but no one had a solution. Bad me, I hid the updates and moved on.

A few days ago, three more MS Office updates (KB973593, KB973704, KB974561) failed, too, although all updates other than those for MS Office installed without incident.

An unrelated problem for a client with MS Office and MS Office Live Add-In led me to the solution.

  • Download and Save the updates individually by KB number from www.microsoft.com/downloads
  • Uninstall Microsoft Office Live Add-in and restart your computer
  • Install each update individually from the downloaded files. I needed to restart and install KB974234 separately one the 64-bit machine.
  • Restart your machine and re-install MS Office Live Add-in

Why bother? Because these were all Security Updates for one of the world’s most popular office suites – natural bait for malware. And manual updating is a lot easier than dealing with a comprised installation of MS Office.

Read More ..

Internet Explorer Loses Ground in 2009

Use of Internet Explorer (IE) hit its lowest point ever in December and, overall, was down just over 7 percent for the entire year, according to year end numbers from one Web analytics firm.

Although IE continues to be far and away the leader for browsers, the recipients of Microsoft's (NASDAQ: MSFT) involuntary largesse are the usual suspects -- Firefox, Safari, Chrome and Opera.

In December, Microsoft's share of the browser market fell to 63 percent, according to Web tracking firm Net Applications.

That's down 7 percent since last January, when IE held just below 70 percent share.

In the same time, Mozilla's Firefox grew by 2.5 percent to a little more than 24.5 percent share at the end of December. Apple's (NASDAQ: AAPL) Safari, by comparison, picked up just less than 1 percent to 4.46 percent.

The biggest surprise, however, was that Google's (NASDAQ: GOOG) Chrome browser surpassed Safari. Chrome jumped from a market share of just 1.5 percent last January to a little more than 4.5 percent in December.

Additionally, for the first time, that puts Chrome ahead of Safari's share of just under 4.5 percent.

Meanwhile, Opera, from Norway's Opera Software, held table at just under 2.5 percent.

Microsoft's situation is made more tenuous by its recent anti-trust settlement with the European Commission (EC), according to one analyst.

The company and the EC, the European Union's executive branch, settled their row over bundling IE with Windows in December, with the adoption of a "choice screen" that lets users choose whichever browser they want as their default when starting up a new PC for the first time. The screen will present the top dozen browsers in a random order, blocking much of Microsoft's inherent advantage over other browser competitors.

That will likely drive IE's market share even lower, particularly in Europe.

"We have browser wars again," Rob Enderle, principal analyst at the Enderle Group, told InternetNews.com.

"By allowing people [in the EU] to make these choices when they buy a new PC, that should accelerate the slide," he added.

The company's market share has been gradually sliding for more than five years, ever since the debut of Firefox, which has been gaining share in its second-place position almost continuously, and even the release last March of IE 8 has not staunched the blood.

"Firefox is still holding really well, and Chrome has been doing amazingly well," Enderle said.

Read More ..

Toshiba U505-S2980 Gets in Touch With Multitouch

The Toshiba U505-S2980's main gimmick is a multitouch touchscreen. Outside of that, it is, for the most part, a decent laptop, even above average in many ways. But that one gimmick is the root of my issues with this 13-inch notebook--and helps raise its cost to a somewhat pricey $1050 (as of 11/24/09).

Because the panel is a touchscreen, the U505-S2980 suffers from grainy picture quality. This exacerbates a more basic problem of the screen just being dim. Viewing angles and backlighting are all right--the hinge actually sets the screen to the perfect angle when the unit is fully open--but the screen is really not bright enough. What you wind up with is a display that's made too many compromises for an idea that just doesn't work in practice. (In all fairness the touchscreen variant of the Lenovo ThinkPad T400s and the Dell Latitude TX2 were also a little dim--it's not something unique to Toshiba).

I suspect Toshiba wants you to use the touchscreen more than anything else, but I'm just not sold. The 13-inch screen runs at a resolution of 1280 by 800 pixels, far too fine for a proper touch interface without a stylus. Sure, you can up the font size, but it grossly reduces usable space on an already cramped resolution. Multitouch also seems silly, given how awkward it is to reach forward and manipulate the bundled multitouch application when the notebook is upright. That bundled app--software for posting notes and images like a blackboard--is in itself quite cute, but hardly practical. That said, with the touchscreen, it's a breeze to zoom in and out of images or Websites. And if you want to do some on-screen doodling in something like Photoshop, you can.

If the screen is problematic, the good news is that the mousing touchpad is pretty stellar (though a bit small), offering up multitouch capability, too. So if the using the display via touch turns you off, at least you have a reliable alternative.

Now if Toshiba could just get the keyboard part down. The glossy, flat-surfaced, backlit keyboard is a pain. The cheap plastic used for it squeaks and squeals when you slide your fingertips across it, and it's just not comfortable to use. But the touch-sensitive buttons above the keyboard are nice, and the visual styling with the white LED backlighting is really beautiful and a welcome change from the world of blue LEDs elsewhere in the market. Another user might find the keyboard style to their liking, but to me it remains a gaudy reminder of Toshiba's over-glossed yesteryear.

The performance of the U505 is pretty reasonable--though it's hardly a speed demon--but the now-standard 4GB of DDR2 comes coupled with a meaty 500GB hard drive, which is virtually top of the line for capacity in modern notebook drives. The 2.2GHz Intel Core 2 Duo T6600 processor isn't going to win any awards, but backed with 4GB of DDR2 RAM and that big hard drive, it scores an 87 in WorldBench 6. That's more than adequate for general use. The Intel integrated graphics preclude any real gaming performance, but high-definition media playback worked very well, with no stutters or hiccups.

The trade-off for that performance is reduced battery life--you get 3.5 hours if you're lucky. The average for an all-purpose machine is about 4 hours, 14 minutes.

The speakers on the body below the screen fare at least a little better. Though still tinny as notebook speakers are wont to be, they at least make some effort made to produce at the low end, and you get plenty of volume. At 60 percent volume the speakers are plenty loud enough for either video or music.

I find myself quite liking the overall look of the unit, even though it is a little bulbous for a 13-inch laptop (it measures 12.5- by 9.1- by 1.5-inches and weighs 4.7 pounds). A pleasing texture to the lid and the inside (similar to what we saw on the NB205 line) give a modern, toughened style and a comfortable texture for the palm rest.

The U505-S2980 is very firm, with no creaks or flexing in the chassis. Port selection is excellent, with three USB ports (one of which is a combo e-SATA port), along with VGA- and HDMI-video outputs, speaker and mic jacks, gigabit ethernet, and even an olde-tyme modem port. You'll also find an ExpressCard slot, plus an SD/MMC card reader on the front. These connections are very nicely placed, too, with two of the USB ports near the front. And finally, hats off to employing a slot-loading DVD drive instead of the flimsy tray-loading ones more commonly found in laptops.

Though I find a lot to like about the U505, it's ironic that the main selling point is also what's holding this laptop back--the touchscreen. A user's experience with a notebook is often going to depend chiefly on the keyboard and the screen--the two most direct ways of interacting with it. You can fit all the hardware you want under the hood, but if these two don't hold up their end of the bargain, people aren't going to want to use it. The touchscreen is a cute gimmick whose poor visual quality unfortunately brings the whole thing down a peg.

Read More ..

Restore Data After Motherboard Death

Peter's motherboard died. How can he retrieve the data on his hard drive?

I'm amazed that in this world of cheap external hard drives and near-universal broadband, people are still not backing up their data. It's real simple, folks: You should never have only one copy of anything.

If you want some advice about getting into the backup habit, see 7 Backup Strategies for Your Data, Multimedia, and System Files.

Be glad it was the motherboard that died and not the hard drive. If that were the case, you'd have to send the drive to a data recovery service that would charge you hundreds or even thousands of dollars to recover your data...if your data was recoverable.

But with a dead motherboard, you got off easy. All you need is an adapter that turns an internal IDE or SATA drive into an external USB drive. The Bytecc USB 2.0 Drive Mate is pretty good.

Remove the drive from the PC, plug it into the Bytecc, plug the Bytecc into a PC's USB port, and you have access to your old hard drive.

Add your comments to this article below. If you have other tech questions, email them to me at answer@pcworld.com, or post them to a community of helpful folks on the PCW Answer Line forum.

Read More ..

Google Chrome OS may be security hotspot in 2010

Google's Chrome OS will be "poked" by hackers in 2010, in large part because it will be the "new kid on the block," a security researcher predicted today.

Chrome OS will be targeted by attackers, probably even before it's officially released, said Sam Masiello, the director of threat management at antivirus vendor McAfee.

"It'll be the new kid on the block, that's one of the primary drivers why we think cybercriminals will target Chrome OS," said Masiello. "The same thing happened to Windows Vista and Windows 7, even before they were finished. Since Chrome OS is new, it's going to be of interest to security researchers, and it's going to be poked by cybercriminals as well."

Google's operating system was announced in July and released as open-source in November, but is not slated to be available on netbooks until late in 2010.

Another reason hackers will likely target Chrome OS is its reliance on HTML 5, the still-unfinished revision of HTML (Hypertext Markup Language) that aims to replace the current crop of rich media plug-ins, such as Adobe Flash and Microsoft's Silverlight, with advanced features developers can build right into sites.

HTML 5 also supports offline Web applications, where traditionally online services and software can be accessed when users are not connected to the Internet. "As we move toward the advent of rich Internet applications, the lines are blurring between online and offline," said Masiello. "Cybercriminals will be able to attack users when they're offline, as well as on."

Other Google software will make a name for itself -- and not in a good way -- during the coming year, said Masiello. Google Wave, the search giant's collaboration and communication software, may be the perfect tool for controlling a botnet, or collection of already-compromised computers.

"Google Wave uses XMPP (eXtensible Messaging and Presence Protocol), which provides application-to-application control for Web apps," Masiello said. "It could be used for truly decentralized command-and-control of a botnet, so a take-down of a single ISP or hosting company would have zero impact."

But although McAfee sounded the alarm about Chrome OS, HTML 5 and Google Wave, Masiello acknowledged that 2010 will probably be limited to proof-of-concept exploits or a low level of activity, seeing as how Chrome won't appear until later in the year and HTML 5 is still unfinished. "With HTML5 and Google, we still have some time," he said.

McAfee's 2010 security predictions can be downloaded from the company's site (download PDF).

Read More ..

As 2010 dawns, FCC moves toward Net neutrality rules

The U.S. Federal Communications Commission, in taking the first step toward creating Net neutrality rules in 2009, has reignited a contentious debate about government regulation of the Internet.

Opponents of new Net neutrality rules argue that an FCC proposal released in October would create intrusive new rules for the Internet and would mark a major shift in the U.S. government's generally hands-off approach to Web regulation. The FCC's proposed Net neutrality rules would, among other things, require Internet service providers to "treat lawful content, applications, and services in a nondiscriminatory manner."

New rules aren't needed, because there have been few examples of broadband providers blocking or slowing Web content and applications, critics said. "Where's the beef?" Barbara Esbin, a senior fellow with the free-market think tank Progress and Freedom Foundation (PFF), wrote in a paper published this month. "There is little or no evidence that broadband ISPs are plotting to alter the fundamental attributes of the Internet in such nefarious ways or of actual consumer harms from today's broadband network management practices."

The PFF and other critics say Net neutrality rules will hamper broadband providers' investment in their networks, by creating rules on how they can use those investments. The Net neutrality rules could prohibit innovative, new business models focused on tiered pricing or specialized networks, critics have said.

Backers of Net neutrality rules say the FCC's proposal would simply reinstate old rules, relaxed by the FCC in 2005, that required traditional telecom carriers to share their networks. Rules are needed because there have already been examples of ISPs blocking or slowing Web content, they say, including Comcast's attempts in 2007 and 2008 to slow BitTorrent peer-to-peer traffic in the name of fighting network congestion.

"Please keep the Internet business neutral, I am tired of hearing A&T and other businesses saying they are being hurt by Net neutrality," Internet user Hawk Bailey of New Baltimore, Michigan, wrote in comments filed with the FCC. "Instead, they want to earn extra money and power by allowing companies to pay for priority access and requiring individuals and small businesses to do the same to compete."

The debate over whether the FCC or U.S. Congress should create Net neutrality rules has been simmering in Washington, D.C., for the better part of the decade. In 2005, the FCC ended requirements that traditional telecom carriers share their networks with competitors, and Net neutrality advocates renewed their arguments that Net neutrality rules were needed to protect consumers in a broadband market without many competitors.

But Democrats in Congress were unable to push through a Net neutrality law, and the Republican-controlled FCC was unwilling to act. But President Barack Obama said during 2008's presidential campaign that Net neutrality rules were one of his top tech priorities, and Obama-appointed FCC Chairman Julius Genachowski pushed forward with a Net neutrality rulemaking proceeding this year.

While activists on the far sides of the Net neutrality debate have continued their rhetorical battles in recent weeks, some of the major companies involved in the issue have seemed to soften their stances. In October, the chief executives of Google, a major Net neutrality advocate, and broadband provider Verizon Wireless co-authored a statement on finding common ground in the Net neutrality debate.

"It's essential that the Internet remains an unrestricted and open platform," both companies said.

And AT&T, one of the most vocal opponents of Net neutrality rules, said this month that "preserving the open character of the Internet is critically important to ensuring that all consumers have the opportunity to be creators of content and innovators from their homes or their garages."

Net neutrality supporters, however, suggested AT&T's position hadn't changed that much, with the company still suggested the FCC shouldn't prohibit broadband providers from entering into commercial agreements in which they provide "value-added" broadband services to some Internet companies

Some opponents suggested now isn't the time for the FCC to create Net neutrality rules as the agency is also preparing a national broadband plan focused on getting more U.S. residents access to broadband service. Congress required the FCC to create the national broadband plan in a huge economic stimulus package passed early in 2009.

Net neutrality rules seem at odds with expanding broadband access to more U.S. residents, argued Esbin and other critics.

"The primary question that one should ask before embarking on a new regulatory regime is, 'will this help achieve the consensus goal of bringing affordable broadband service to all the people of America?'" she wrote. "Surely the goal will be made harder by imposing new regulatory constraints on the ability of broadband ISPs to provide service, manage their networks, and develop new business models as the needs of end users and Internet content, applications, and service providers change over time."

Many older U.S. residents are concerned about Net neutrality rules, added Bruce Yampolsky, president of the Missouri Silver Haired Legislature, a seniors advocacy group. "The FCC's actions relating to Net neutrality could have a profound impact on our constituency's ability to access and adopt broadband Internet, creating yet another barrier for us to overcome," he wrote in a filing with the FCC. "We feel that your actions regarding Net neutrality are misplaced given the state of broadband access and affordability in the United States."

Net neutrality rules could create "onerous burdens" on ISPs even as the elderly and other groups of U.S. residents have low broadband adoption rates, Yampolsky wrote.

Others argue that new Net neutrality rules will give consumers control of their own broadband experiences and allow freedom of speech.

"Net neutrality is what our country needs," Sheldon Peck, an Internet user from Newton, Massachusetts, wrote in a filing to the FCC. "Please DO NOT listen to special interest groups ... who are paid off by industry. Let's finally take back the airwaves for the citizens. It will re-empower this great, free country."

Read More ..

Adobe warns of Reader, Acrobat attack in the wild

Adobe is investigating new reports that hackers are attacking a previously unknown bug in the latest version of the company's Reader and Acrobat software.

"This afternoon, Adobe received reports of a vulnerability in Adobe Reader and Acrobat 9.2 and earlier versions being exploited in the wild," Adobe wrote in a post to its Product Security Incident Response Team (PSIRT) blog Monday afternoon. "We are currently investigating this issue and assessing the risk to our customers."

Adobe had few details on the reported problem. "As soon as we have additional details, we will update the PSIRT blog," a spokeswoman said in an e-mail message.

Adobe learned of the attack on Monday, said Brad Arkin, Adobe's director of product security and privacy. "Three different partners in the security community shared samples of the same attack with us within a few minutes of each other this afternoon," he said via instant message.

The criminals are exploiting this flaw by sending malicious PDF files to victims, according to the volunteer-run malware tracking group Shadowserver.

"This is legit and is very bad," Shadowserver said in a post to its Web site late Monday. Shadowserver could not be reached immediately for comment.

Shadowserver said that several "tests have confirmed this is a 0-day vulnerability affecting several versions of Adobe Acrobat [Reader] to include the most recent versions of 8.x and 9.x. We have not tested on 7.x, but it may also be vulnerable."

The vulnerability is due to a bug in the way Reader processes JavaScript code, according to Shadowserver. The group recommends that concerned users disable JavaScript within Adobe's software as a work-around for this problem. (This can be done by un-checking the "Enable Acrobat JavaScript" in the Edit -> Preferences -> JavaScript window)

Security experts say that running malicious JavaScript code within Reader has become a favorite hacking technique this year.

The attack has been used by cybercriminals since at least Friday, but has not seen any widespread use, Shadowserver said. "Expect the exploit to become more wide spread in the next few weeks and unfortunately potentially become fully public within the same timeframe."

Most antivirus products do not yet detect the attack, Shadowserver noted.

With Reader and Acrobat installed on most of the world's PCs, the products have become an increasingly attractive target for computer hackers who take advantage of flaws in the system to run unauthorized programs on victims' PCs.

Read More ..

Five jobs other browsers do better

In case you haven't heard, the browser war is over. It's not that there aren't still competitors -- in fact, there's a bountiful landscape of Web browsers for OS X. Rather, the war is over because almost all modern browsers are stable, compliant and free.

While there are good reasons to use either Apple's Safari or Mozilla Firefox as your default browser, sometimes you need specialty browsers to help with specific tasks. But how do you know which browser to use when? Here are some of the best uses of the lesser-known browsers such as the free Flock ( Macworld rated 4.5 out of 5 mice ), Devon Technologies' $50 DevonAgent ( Macworld rated 3.5 out of 5 mice ), The Omni Group's free OmniWeb ( Macworld rated 4.5 out of 5 mice ), Alexander Clauss' free iCab ( Macworld rated 3.5 out of 5 mice ), and more.

Thumbnails

For people who regularly keep dozens of tabs open at once, thumbnail images of each one can make it easier and quicker to find the one you're looking for. OmniWeb popularized the display of tabs as thumbnails in a drawer on the side of the window; Opera 10 ( Macworld rated 4 out of 5 mice ) can do something similar and lets you control the size and placement for the tab area. The Shiira Project's Shiira ( Macworld rated 3.5 out of 5 mice ) also displays thumbnails of open tabs in the PageDock at the bottom of the window. (To get similar behavior in Safari, you'll need the free SafariStand add-on. For Firefox, try the free Tab Sidebar extension.)

Social networking

Any browser can give you access to Facebook, Twitter, Flickr, and any other social networking site. Several also offer built-in RSS readers. But only Flock is designed around the fundamental task of collecting and disseminating information on social networks. For example, Flock can display live content from your accounts on various social networks in its sidebar and streams of photos, videos, news stories, and other media at the top of the window (regardless of what page you're viewing). Because information and controls for working with social networking sites is built into the browser itself, you save clicks and can more easily connect resources to each other.

Power searching

In any browser, you can make use of conventional search engines such as Google and Yahoo. But if you want to perform highly complex research--such as integrating results from dozens of engines, employing complex Boolean logic, and mapping the relationships among matching sites--Devon Technologies' $50 DevonAgent ( Macworld rated 3.5 out of 5 mice ) has a set of tools that far outdoes ordinary browsers. Apart from its outstanding search features, it's not a very exciting program, but for that one task it can't be beat.

A minimalistic experience

If you want to focus entirely on Web pages themselves, with a minimum of distracting buttons, icons, and other doohickeys, Camino ( Macworld rated 4 out of 5 mice ) and DevonAgent are notable for their sparse, uncluttered designs. (Another interesting option is Google Chrome, now in beta, which offers a remarkably simple, clean browsing experience without sacrificing power or speed.)

Everything but the kitchen sink

If you like more instead of less, at the opposite end of the spectrum there's Opera. It integrates an RSS reader, e-mail client, IRC client, and newsgroup reader, to say nothing of Web development tools, all in a single application. If you want the broadest set of capabilities from the fewest applications, this heavy-duty multitasker can almost certainly get the job done.

Read More ..

Toshiba develops translation system for cell phones

Travellers in or from East Asia may soon be able to turn to their cell phones for quick, easy and cheap translation help thanks to a new application from Toshiba.

The company has developed a trilingual translation system with voice recognition and synthesis that's compact and light enough to be installed in a cell phone. Unlike existing applications the software doesn't offload processing to a more powerful server on the network but performs the task inside the phone. That makes it quicker and avoids potentially costly data roaming charges when used overseas.

The software is a cut-down version of a PC application already sold by Toshiba in Japan and can translate freely between Japanese, English and Chinese.

In use the software first employs speech recognition to determine the language and what has been said. It then uses one of two translation methods -- statistical machine translation or rule-based machine translation -- to parse the sentence and break it down into its components. The translation is then performed and a speech synthesis engine outputs the result.

Statistical machine translation works on probability and word order to determine the construction of a sentence while the rule-based method utilizes a database of hundreds of sentences and phrases to extract the meaning.

The PC software uses both methods simultaneously but a cell phone lacks enough processing power to run both so statistical machine translation is used for English to Chinese and Chinese to English and Japanese while rule-based machine translation is used for the others.

In tests the software worked well although like all speech recognition systems was prone to misidentifying certain words. This caused problems with the translation and the only solution was to try again -- sometimes with the result that the same error would be made. However on some occasions it got things right and not only recognized the question but successfully translated it.

"If I pay cash can you give me a discount?" was one of the sentences that it took in its stride.

Toshiba faced several challenges when developing the software. The demonstration was running on its TG01 smartphone that includes a relatively powerful 1GHz Qualcomm processor. The phone runs the Windows Mobile operating system and that imposes a 32MB limit on the size of each process running on the phone. However working within those restrictions the software was successfully pared down.

Work on the application at Toshiba's research department is almost complete after which it will be turned over to business units for commercialization. The Windows Mobile application could be modified to run on other operating systems, such as Android or Apple's iPhone OS, but future plans are yet to be decided.

Read More ..

Adobe will be top target for hackers in 2010, report says

Adobe Systems' Flash and Acrobat Reader products will become the preferred targets for criminal hackers in 2010, surpassing Microsoft Office applications, a security vendor predicted this week.

"Cybercriminals have long picked on Microsoft products due to their popularity. In 2010, we anticipate Adobe software, especially Acrobat Reader and Flash, will take the top spot," security vendor McAfee said in its "2010 Threat Predictions" report (PDF).

Hackers usually target the most widely used products in order to achieve the maximum impact. For a long time that has made Microsoft their primary target. But the software giant has tightened security in its recent OS releases, leading hackers to look for additional targets.

Adobe's CTO acknowledged recently that his company's software is being attacked more frequently, and said the company has stepped up its efforts to respond.

"We have absolutely seen an increase in the number of attacks, around Reader in particular and also Flash Player to some extent," CTO Kevin Lynch told reporters at the Adobe Max conference in October. "We're working to decrease the amount of time between when we know about a problem and when we release a fix. That used to be a couple of months; now it's within two weeks for critical issues."

Mozilla's Firefox browser and Apple's QuickTime software have also faced new attacks.

Among its other predictions, McAfee expects more sophisticated attacks next year against social networking sites such as Twitter and Facebook. "The explosion of applications on Facebook and other services will be an ideal vector for cybercriminals, who will take advantage of friends trusting friends to click links they might otherwise treat cautiously," the company said.

It also sees the emergence of a new vehicle for attacks in the form of HTML 5, an update to the Web markup language that will support delivery of online video and allow Web applications to run offline.

"HTML 5 will blur the line between desktop and online applications. This, along with the release of Google Chrome OS, will create another opportunity for malware writers to prey on users," McAfee said.

There was some good news, however. The security firm sees law enforcement having more successes next year in its pursuit of cybercriminals, thanks to closer cooperation and improved skills at international crime-fighting agencies.

Read More ..

Firefox: Fix Print Size, Add Personality, Refresh Tabs

PC World - It's been far too long since I've put together browsing tips, and the last collection I did focused on Microsoft Internet Explorer. So today I thought I'd serve up some tips for Mozilla Firefox and also share something I learned about Google's newsreader.

Make Web Pages Print Properly

A few days ago, the missus shoved some sheets of paper in my face and demanded, "Why are Web pages printing big all of a sudden?"

Sure enough, all the print on all the pages was comically oversize--and largely useless, as much of the actual Web page was cut off on the right side. This was not good: My wife frequently prints recipes, and all this enlarged output was threatening our culinary happiness.

So I fired up Firefox (her browser of choice), loaded up a recipe page, and clicked File, Print Preview. Basically, I wanted to see if the preview matched the actual output. Sure enough, it did, and here's why: The Scale setting had somehow gotten bumped to 150%.

I changed it back to the almost-always-preferable setting Shrink to Fit, and presto: Normal print size restored.

There's a very similar setting in Microsoft Internet Explorer, so if you're encountering weirdly sized text on your printed Web pages, make sure your "scales" are set properly.

Dress Up Firefox With Personas

I'm not saying Firefox is ugly, but when it plays in the sandbox, the cat covers it up. Thank you, thank you, I'm here all week.

Actually, I didn't realize just how gray and drab-looking Firefox was until I started fiddling with Personas 2.0.

This new feature from Mozilla Labs lets you choose from thousands of themes with which to spruce up Firefox.

Granted, the browser has supported themes for years, but those require downloading, installing, etc.--and in my experience, many of those themes are just overkill.

Personas are more like window dressing: They add a splash of color and design to the menu/tab/toolbar area, but that's it.

Even better, you get to see a live preview of any theme before installing it. Just mouse over any theme in the Personas gallery, wait a second or two, and presto: It appears. You can do likewise in the Personas menu that gets added to Firefox under Tools, Personas.

Refresh Firefox Tabs Automatically

Reader Kevin has this question: "Is there a way to have Firefox refresh automatically, without hitting the refresh button? It would be very nice when Woot.com is having a 'Woot off' or when watching an item on eBay."

You know what, Kevin? That would be nice! All you need is a handy Firefox extension called ReloadEvery, which can automatically reload a browser tab at designated intervals.

Read More ..

Computer Virus Alert

PAT BUCHANAN VIRUS: Your system works fine, but complains loudly about foreign software.

COLIN POWELL VIRUS: Makes its presence known but doesn't do anything. Secretly, you wish it would.

HILLARY CLINTON VIRUS: Files disappear, only to reappear mysteriously a year later; in another directory.

O.J. SIMPSON VIRUS: You know it's guilty of trashing your system, but you just can't prove it.

BOB DOLE VIRUS: Could be virulent, but it's been around too long to be much of a threat.

STEVE FORBES VIRUS: All files reported as the same size.

PAUL REVERE VIRUS: The virus doesn't horse around, warns you of impending attack. Once if by LAN, twice if by C.

POLITICALLY CORRECT VIRUS: Never identifies itself as a "virus", but instead refers to itself as an "electronic micro-organism".

ROSS PEROT VIRUS: Activates every component in your system, just before the whole thing quits.

TED TURNER VIRUS: Colorizes your monochrome monitor.

DAN QUAYLE VIRUS: Thier is sumthing rong with yur komputer, but ewe cant figyur outt watt!

GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.

NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.

FEDERAL BUREAUCRAT VIRUS: Divides your hard drive into hundreds of little units, each of which does practically nothing; but all of which claim to be the most important part of your computer.

GALLUP VIRUS: 60% of the PC's infected will lose 30% of their data 14% of the time (plus or minus a 3.5% margin of error)..

TEXAS VIRUS: Makes sure it's bigger than any other file.

ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.

CONGRESSIONAL VIRUS: The computer locks up and the screen splits in half with the same message appearing on each side. The message says that the blame for the gridlock is caused by the other side.

AIRLINE LUGGAGE VIRUS: Your in Dallas, but your data is in Singapore.

FREUDIAN VIRUS: Your computer becomes obsedded with marrying it's own motherboard.

PPS VIRUS: Your program stops running every few minutes to ask for money.

ELVIS VIRUS: Your computer gets fat, slow and lazy; then self destructs only to surface at shopping malls and service stations across rural America.

OLLIE NORTH VIRUS: Causes your printer to become a paper shreader.

NIKE VIRUS: Just does it.

SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and shocks.

JIMMY HOFFA VIRUS: Your program can never be found again.

KEVORKIAN VIRUS: Helps your computer die, calling it an act of mercy.

STAR TREK VIRUS: Invades your system in places where no virus has gone before.

HEALTH CARE VIRUS: Tests your system for a day, finds nothig wrong and sends you a bill for $4,500.00.

GEORGE BUSH VIRUS: It starts by boldly stating; "Read my docs...No New Files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.

GUINESS WORLD RECORD VIRUS: Your system performs absolutely ludicrous functions at random.

Read More ..

    My Blog Rank