Internet Doomsday simple fix rundown

Believe it or not, this so-called “Internet Doomsday” you’ve heard about over the past week or so is a real situation – but taking care of it on your own computer is not as terrifying as the name of the day suggests. The so-called virus is called DNSChanger, and thought the fear-mongering amongst us would have all collecting water and dry food for the oncoming electrical winter, there’s not actually that much to worry about. In fact, according to several internet service providers across the country, nothing significant has even appeared on their grid as the day has progressed.

What you’re going to want to do is two things if you’re fearful that your computer may have been affected by this web devil. First, if you’re reading this article from your computer, you have not been affected at all: the virus shuts your web off. If you still have internet, you’re fine. Second, you’ll want to check out the following video to get a grip on what this situation is all about – it’s all very simple, really:

That video comes from the post entitled DNSChanger malware for dummies. There you’ll find a bit more of an explanation, but for those of you really looking to read rather than watch, head to our DNSChanger guide to learn how to find it and how to fix it. For those of you reading this outside the country on your smartphone: remind yourself again that it’s much more likely that your computer back home (wherever that may be) is not infected rather than infected.

“Since midnight last night, when the FBI (via the Internet Services Coalition) disconnected the servers associated with this botnet, we’ve only received a miniscule number of calls, but our customer care and security assurance teams are standing by and are ready to help,” – Douglas

Charlie Douglas is the Comcast senior director of corporate communications and has assured MSNBC that there’s nothing to worry about. The same is true of Verizon, AT&T, and COX, also speaking today saying that the effect of this situation is minimal and tiny, having little impact overall.

Check out the timeline below to learn more about DNSChanger and what it’s done so far!


Internet Doomsday simple fix rundown is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Verizon support blames Samsung for locked bootloader in Galaxy S III (updated)

Verizon blames Samsung for locked bootloader in Galaxy S III

Verizon cleared up its stance on locking the bootloaders in phones using its network earlier this year. In short: it encourages OEMs to do so, to keep its network humming along as Big Red feels it should. Well, it seems that VZW Support is telling a different story, as it’s laid blame for the Galaxy S III’s closed bootloader squarely at Samsung’s feet, claiming that it’s locked “per the Manufacturer.” Now, that doesn’t explicitly state that VZW had no part to play in denying users access, but it surely seems like this is a game of PR pass the buck to us. Of course, as we reported earlier, there’s a workaround to be had by rooting the GSIII, which revealed a vulnerability allowing non-stock ROMs to be flashed to the device. But it’s only a partial workaround, as the kernel’s signed and implementing a full custom ROM experience is neither for the unskilled nor the faint of heart. We reached out to both Verizon and Samsung for comment on the matter, but have yet to hear back. While you wait for official word, feel free to check out the ongoing conversation at the source link below.

[Thanks, @supercurio]

Update: Seems that Verizon’s still singing the same tune it was back in February, claiming that unauthorized software brought by open bootloaders could harm the overall network user experience:

Verizon Wireless has established a standard of excellence in customer experience with our branded devices and customer service. There is an expectation that if a customer has a question, they can call Verizon Wireless for answers that help them maximize their enjoyment and use of their wireless phone. Depending on the device, an open bootloader could prevent Verizon Wireless from providing the same level of customer experience and support because it would allow users to change the phone or otherwise modify the software and, potentially, negatively impact how the phone connects with the network. The addition of unapproved software could also negatively impact the wireless experience for other customers. It is always a delicate balance for any company to manage the technology choices we make for our branded devices and the requests of a few who may want a different device experience. We always review our technology choices to ensure that we provide the best solution for as many customers as possible.

Filed under: ,

Verizon support blames Samsung for locked bootloader in Galaxy S III (updated) originally appeared on Engadget on Mon, 09 Jul 2012 13:48:00 EDT. Please see our terms for use of feeds.

Permalink   |  source@VZWSupport (Twitter)  | Email this | Comments

DNSChanger malware for dummies: Sophos video explains it all

Today the folks at the security group Sophos have released a simple “how to” video on the DNSChanger (or DNS Changer, if you prefer) Malware, showing how you can avoid losing your internet connection on July 9th. This information has been published by us before in the post DNSChanger: How to find it and how to fix it earlier this week, but for those of you that prefer a simple explanatory video instead, today we’ve got that for you as well.

The video starts back in 2007 when the DNSChanger Malware first started, it then being a bit more simple than it is today, looking for your internet settings, guessing your password, and doing general mayhem. They also started a company called Rove Digital, got a whole bunch of DNS servers to process their code magic. The FBI got involved in the situation several years ago and they did bust in on the devils and take control of their servers, but not before the bad guys got millions of dollars from their deeds.

Then is when the good stuff starts.

Intelligently quoting the undeniably great Marcus Antonius from all the way back in 44BC, the folks at Sophos explain how you could still be affected by the DNSChanger Malware from back then even if you are no longer infected.

“The evil that men do lives after them. The good is oft interred with their bones.” – Marcus Antonius, 44BC

Hundreds of thousands of computers could very well still be affected – and at risk of certain doom – if figures shown by the DNSChanger Working Group are true, of course. The part where this gets REALLY good is here: the FBI’s authority to run the interim servers taken from the crooks that were caught sever years ago ends on Monday the 9th of July, 2012. If you have not fixed your computer (assuming it was infected in the first place) by then, you will get knocked off the web.

The video above goes through several ways that you might protect yourself against the evil that could very well be running through your computer right this minute, and again you can also check our DNSChanger: How to find it and how to fix it guide if you get lost. Both work!


DNSChanger malware for dummies: Sophos video explains it all is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


With $1000 and a Team of Geniuses, You Too Can Hack a Government Drone [Drones]

With the drone era upon us—drones flying through US airspace, no less—securing these pilotless aircraft is of the utmost importance because of the threat an errant vehicle could pose to civilians. But in answering a dare from the Department of Homeland Security, a team of researchers from the University of Texas proved that a government drone could be hijacked with a GPS spoofing device made for less than $1000. More »

Two LulzSec members plead guilty to hacking charges

Back in March, notorious hacking group LulzSec was brought down by the FBI following cooperation from the group’s leader, Hector Xavier Monsegur aka “Sabu”. Four members of the group that were arrested appeared today at Southwark Crown Court to plead against the charges brought against them, with two admitting that they hacked high profile websites and the other two denying all the charges.

Jake David, aka Topiary, and Ryan Cleary both admitted that they were part of the LulzSec group, but overall only pleaded guilty to two out of the four charges brought against them. Ryan Ackroyd, aka Kayla, pleaded not guilty to all four charges, while an unnamed 17 year old also pleaded not guilty to all charges.

The group performed numerous hacks on high profile targets such as the CIA and the Pentagon, and leaked the names of 73,000 X-Factor contestants. Other targets included the NHS, Sony, Nintendo, 20th Century Fox, and News International. The trial for the case will be held in April 2013.

[via BBC]


Two LulzSec members plead guilty to hacking charges is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.