
<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>Haaze.com / bucdok / Published News</title>
<link>http://www.haaze.com</link>
<description>Test Web 2.0 Content Management System</description>
<pubDate>Tue, 31 May 2011 07:10:14 +0000</pubDate>
<language>en</language>
<item>
<title><![CDATA[Apple security update targets MacDefender malware]]></title>
<link>http://www.haaze.com/story.php?title=apple-security-update-targets-macdefender-malware</link>
<comments>http://www.haaze.com/story.php?title=apple-security-update-targets-macdefender-malware</comments>
<pubDate>Tue, 31 May 2011 07:10:14 +0000</pubDate>
<dc:creator>bucdok</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=apple-security-update-targets-macdefender-malware</guid>
<description><![CDATA[The message users will now see if they accidentally try to install MacDefender, or one of its variants. (Credit:Apple)As promised, Apple's released a security update to address the MacDefender malware, as well as its known variants.Security Update 2011-003, which went out to Mac OS10.6 Snow Leopard users this afternoon, adds file quarantine and built-in removal of the MacDefender malware. &quot;The installation process for this update will search for and remove known variants of the MacDefender malware,&quot; Apple's support document reads. &quot;If a known variant was detected and removed, the user will be notified via an alert after the update is installed.&quot;The MacDefender malware, which also goes by the name of MacProtector, MacSecurity, and Mac Guard, appeared on the scene earlier this month. It pretends to be legitimate antivirus software, while posting fake alerts, and opening up pornographic Web pages in an attempt to get users to enter in their credit card information to clean up their computer.Last week Apple posted details on how to identify and remove the software, while promising that a future Mac OS X update would protect users from the malware.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Hackers claim to have stolen PSN credit card info]]></title>
<link>http://www.haaze.com/story.php?title=hackers-claim-to-have-stolen-psn-credit-card-info</link>
<comments>http://www.haaze.com/story.php?title=hackers-claim-to-have-stolen-psn-credit-card-info</comments>
<pubDate>Thu, 28 Apr 2011 07:10:32 +0000</pubDate>
<dc:creator>bucdok</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=hackers-claim-to-have-stolen-psn-credit-card-info</guid>
<description><![CDATA[Security researchers say hackers claiming to have credit card information stolen from Sony'sPlayStation Network last week are trying to sell them on underground Internet forums, but the veracity of the claims could not be confirmed. Sony warned its more than 70 million customers on Tuesday that their personal information, including customer names, addresses, e-mail addresses, birthdays, network passwords, and user names, as well as online user handles, was obtained illegally by an &quot;unauthorized person.&quot; Sony responded to the intrusion, which occurred between April 17 and 19, by temporarily disabling PSN and Qriocity, its subscription music service, and contracting with an outside security firm to investigate the intrusion on its network.&quot;While there is no evidence at this time that credit card data was taken, we cannot rule out the possibility,&quot; a company spokesman wrote Tuesday. Sony said in an FAQ posted today that the credit card data was encrypted and reiterated that it had no evidence the data was stolen. However, Kevin Stevens, a security expert with TrendMicro, said in a tweet today he had seen discussions on online forums in which the purported hackers were offering to sell a database of 2.2 million Sony customer credit card numbers stolen during the PSN attack. &quot;Sony was supposedly offered a chance to buy the DB [database] back but didn't,&quot; Stevens said, adding that, &quot;No, I have not seen the DB so I can not verify that it is true.&quot;&quot;Supposedly the hackers selling the DB says it has: fname, lnam, address, zip, country, phone, email, password, dob, ccnum, CVV2, exp date,&quot; he said, referring. The less obvious acronyms refer to credit card holders' first name, last name, credit card number, and credit card security code.Internet security blogger Brian Krebs, who noted witnessing similar activity, posted screenshots of the discussion on his Krebs on Security blog.  Neither Stevens nor Krebs said they had seen the actual database, but the information may already be circulating among cybercriminals. Reports began trickling out yesterday from PSN users about recent fraudulent charges on the credit cards they used for the PlayStation service.An employee of GameFly Media tweeted that a colleague's card was used to buy $1,500 worth of goods at a grocery store in Germany. Meanwhile, a reader of gaming site VGN365 said his bank had informed him of a fraudulent $300 debit card withdrawal this weekend. And another person reported on video game forum site Neogaf.com $600 in fraudulent withdrawals. The breach has already prompted a lawsuit and a letter to Sony from Connecticut Sen. Richard Blumenthal saying he was troubled the company took a week to notify customers of the breach and urging Sony to provide free credit protection services to prevent identity fraud and theft. <br/><br/>0 Vote(s) ]]></description>
</item>

</channel>
</rss>
