Mozilla Thunderbird 10.0.1 – Mozilla Thunderbird lets you receive, organize, and secure your email.

Thunderbird allows you to customize your email to suit your specific needs—whether it’s how you search and find messages, or listening to music right out of your inbox. Choose from the many options to help you be more productive, from the three layout views to the advanced mail filter capabilities. You can also choose from the many add-ons, adding tons more features to make Thunderbird even more powerful. Protecting your email is our top priority. Thunderbird keeps your email safely stored, protects you from phishing attacks and junk mail, and provides advanced features for email encryption.

WHAT’S New 10.0.1 :

Features

  • Message Tagging – Thunderbird 2 allows you to “tag” messages with descriptors such as “To Do” or “Done” or even create your own tags that are specific to your needs.
  • Improved Search – Thunderbird 2 features a new find bar that speeds up searches within displayed messages.
  • Advanced Folder Views – Thunderbird 2 offers a variety of ways for you to organize and display your folders, whether by favorites, recently viewed or folders containing unread messages.
  • Easy Access to Popular Web Mail Services – Thunderbird 2 makes it even easier to integrate and use various Web mail accounts from one inbox.
  • Your Mail, Your Way – Thunderbird users can increase Thunderbird’s functionality and appearance using hundreds of add-ons.
  • Cutting Out the Junk – Thunderbird’s popular junk mail tools have been updated to stay ahead of spam. Each email you receive passes through Thunderbird’s leading-edge junk mail filters.
  • Robust Privacy – Thunderbird 2 offers improved support for user privacy and remote image protection.
  • Phishing Protection – Thunderbird protects you from email scams which try to trick users into handing over personal and confidential information by indicating when a message is a potential phishing attempt.
  • Automated Update – Thunderbird’s update system checks to see if you’re running the latest version, and notifies you when a security update is available.

Download version :

Windows : Thunderbird Setup 10.0.1.exe (16.8 MB)
Mac OS : Thunderbird 10.0.1.dmg
Linux : thunderbird-10.0.1.tar.bz2

or read more in here : http://www.mozilla.org/en-US/thunderbird/

Advertisements

The GNU Privacy Guard 1.4.12 released

GnuPG (the GNU Privacy Guard or GPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

What’s New
===========

* GPG now accepts a space separated fingerprint as a user ID.
This allows to copy and paste the fingerprint from the key
listing.

* Removed support for the original HKP keyserver which is not
anymore used by any site.

* Rebuild the trustdb after changing the option –min-cert-level.

* Improved JPEG detection.

* Included more VMS patches

* Made it easier to create an installer for Windows.

* Supports the 32 bit variant of the mingw-w64 toolchain.

* Made file locking more portable.

* Minor bug fixes.

* Ukrainian translation.

Download or read more in here http://www.gnupg.org/

Facebook takes legal action against “clickjacking” before

With the support of Washington state’s first legal action against Facebook, the so-called “clickjacking” before. Targeting the enterprise is adscendens Media , an advertising network that is suspected of transporting illegal advertising methods via an affiliate program in social networks.
Facebook and the Washington Attorney General Rob McKenna have separately charges levied against the company. The plaintiffs rely on violations of U.S. anti-spam law ” CAN-SPAM Act “and the” Commercial Electronic Mail Act “of Washington state.

According to the reasoning adscendens and partners have sent messages to Facebook users, who pretended to be friends. The messages should have included links, for example, with the lyrics “Can not Believe a 2 year old is doing this,” or “{Video} OMG! See what happened to his Girlfriend!” were provided.

The aim was to entice recipients to click on the links. Advertised on the website is then not see the promised content was so, but should have been attempted using tricks to get users to purchase products, or to undetected click on a Like button that was hidden behind other content. According to the indictment behind it a viral system. Assumptions of Facebook According adscendens earn annually with this method, more than 20 million U.S. dollars. In a first opinion, the advertising agency of all allegations themselves. source

Video conferencing systems as a spy tool

Several video conferencing systems are unprotected over the Internet to reach, such as the security expert HD Moore during a three-month investigation has found . Moore has scanned about three percent of all IP addresses and discovered 250,000 systems, which used the video conferencing systems used by H.323 protocol. Of these, nearly 5000 configured to accept incoming calls automatically – especially equipment manufacturer Polycom , which delivers most of the models according to the report remains with activated auto-acceptance.

Security expert got an insight into many boardrooms, law firms and offices of venture capitalists and research institutes. A godsend for industrial spies. He got offered a remarkable sound and picture quality. In many cases he could control the cameras remotely to zoom around a password on a list of six meters away is close enough to read it can. It also managed the experts to reconstruct passwords entered by the films of the keyboard (shoulder surfing).

According to the experts, many firewalls have problems with the H.323 protocol, which is why the admins video conferencing systems simply assign an externally accessible IP. Many of the systems are not adequately prepared for this situation, Web interfaces, telnet access, and secured more bad service.
Through the web interfaces poorly secured conferencing Moore is succeeded by its own account even on the fact sufficiently protected systems from other companies continue to shimmy: According to the report, companies configure their conferencing systems often so that they accept calls from certain remote sites automatically. Moore has a poorly secured system called from more remote sites, from the familiar to the system he used. The IPs of the remote sites he found in the address, which is part of the web interface.

Moore expects that the situation is in the reachable via ISDN systems even more dramatic: “My gut feeling tells me that for any system vulnerable can be accessed via the Internet, are twenty others that are available under an obscure ISDN number which has long since forgotten the IT department, “says the expert. Admins can H.323 systems in their networks around the Metasploit module h323_version track.

Botnet operators to have worked in anti-virus company

After an investigation of Microsoft’s Digital Crime Unit of the alleged operator of the Kelihos botnets in the past from a producer of “firewalls, virus scanners and security software” as a project manager and developer has worked. This comes from an amended complaint (PDF file) shows that Microsoft has presented yesterday, Monday, the U.S. District Court of Eastern Virginia.

To which company this is it exactly, but left open Microsoft. Research by the security expert Brian Krebs, according to this it should be Agnitum act from the St. Petersburg, Russia. Agnitum has made ​​himself especially with the Personal Firewall Outpost name.

Cancer refers to information that has made the alleged botnet on his profile in the business network Xing. Accordingly, the 31-year-old suspect was allegedly worked from 2005 to 2007 for the company. He currently works as a freelancer, Microsoft said in a company for software consulting and development.

The botnet Kelihos had Microsoft in September in cooperation with the security company Kaspersky Labs, Inc. and Cyrus successfully shut down . At this point, the botnet operator had more than 40,000 infected computers under his control. According to Microsoft, you could send with that infrastructure every day up to 3.8 billion spam mails.

How Facebook really worth?

With profit stands at nearly a billion dollars in 2011, where social networking is expected to turn in the next year and whether Zuckerberg will allow the issue?

Reviews and rumors in recent days that run on Facebook’s welfare concerns the first three quarters of 2011 which stands at more than 700 million dollars. This amount is expected to grow following the financial data of the last quarter of 2011.

 

How much you worth to Facebook?

If you ever wondered how much you worth to Facebook, there may be an answer to this question. Probably every user account on Facebook is equal to about one dollar of profit, after deducting the company’s expenses.

Facebook, the world’s largest social network, making giant strides not only become the first social network with a billion users, but also one of the most profitable.

 

Advertising is money

Advertising is money, and hand washes. Advertisers buy advertising rights within Facebook to get to them a billion users, that half of them join the social network every day. Facebook is no problem to allow the various advertisements, and does not bother her to take your picture and use it to advertise various brands. So it makes identification of the various users with advertisers’ brands through, and one part of the equation enters the other side, when the primary winner is the winner of the process, ie – Facebook.

Total control of Facebook in the ring virtual created, where people enjoy sharing with each other information, photos, status updates, locations, videos, games, and more, allows Facebook set the tone, and as we spend more time social networking, and performed more tasks, She likes us more. Therefore, Facebook is worth making an effort to make its social network where you will spend as much screen time your daily browsing.

 

Cash Cache

When armed with a growing cache of cash, Facebook is currently the situation, more than ever, which she could not afford to go shopping and buy competing companies, and companies that complement the services it has to offer. On the face, the purchase of start-ups with dedicated technologies have come up for consideration are important, by default, but, if she will wait a little and earn a larger sum, it can threaten even the companies entirely different magnitude.

Goldman Sachs clients must be happy leaking. If the information prove to be true, it might suggest that the company is in much better shape than it was at the beginning of 2011, and 2012 looks at this as a very positive year for Facebook, financially. In practice, whether the company will soon go IPO? Mark probably would wait with it some more.

 

Video: Ethics Facebook

Requested the information from Facebook, received 1200 PDF files

An interesting issue related to privacy with Facebook is now Europe. The world’s largest social network keeps your information, even after you delete it.

Commissioner of the EU’s privacy will be forced soon to check out Facebook’s conduct practices with your personal information. The information you share social network, whether you erase it or not, there is still Facebook’s archives, and does not need backup. Affair, began with requesting information under the European law of 24 year student, who wanted a copy of the information that up for him.

Legal arena

Legal arena, those of you who have read recently released the Facebook’s terms and conditions must be noted that the company divides its global operations into two parts: the United States and Ireland. All social network users in the United States who are communicating, contractual, with the American Facebook. Residents of the rest of the world interact with Facebook Ireland, there is Facebook’s European center and also in other European bodies.

One reason might be made up for open its main European branch specifically in Ireland, over tax breaks, is the existence of some EU institutions there, next to European centers of many international companies and others.

The information belongs to the social network

Up for information on each of its users. It starts with the information you enter to open your account continues to personal information, dates of birth and on to any piece of information network ever you raise. Some things are obvious, like photos and status updates. Facebook also stores the information on those things done ‘Lake’, those things officially shared with other people, and of course your interaction within the network, whether it directly with advertisers or other users.

In fact, several years ago revealed a problematic practice of Facebook employees, who used to get statistics of people they know, or a celebrity. Facebook has learned that even after following your browsing in Facebook, and some profile and who you went, what day and time it was, and how many times did you do that.

This information is only a tip of the iceberg in terms of information that Facebook collects about you. In fact, very possible that Facebook collects information about you even if you do not have Facebook yet. The information you need is to get your friends, acquaintances and relatives, who leaves, with or without realizing it, your personal information when they raise their information. How often did you discover that someone else put your picture on Facebook? Even if he did not tag you, it is still more common than you think.

Indirect information (EXIF, META)

Facebook also collects information indirectly, the common user of the social network did not aware that he provides her. For example, all pictures taken with digital camera, including that from your total and specific information, stored in the EXIF ​​tags. This information includes the name of the camera, when the video camera data, and will also include your coordinates if you have not canceled this possibility.

Incidentally, it may also state your attach your camera serial number when she shoots a picture. Thus, every image you upload to Facebook, you provide not only a picture of how you look, and how people close to you look, but you give her a lot more information. With a collection of points geotagged, for example, pinpointing network can be made relating to entertainment and living habits of the user, and find information related to lifestyle.

 

Advertisers compare information

All this information is a goldmine for Facebook. Why? Because it has a monopoly on advertising within Facebook. Is a control unit, because that created a private space run – her hand, and she determines to whom it allows to publish, and who does not. In addition, the company can offer advertisers additional service fee, which she will show advertisers just for people interested in the product or service.

For example, we know that products are often the man did not interest women, and vice versa. But, Facebook can offer advertisers far beyond identifying the sex of the user. She knows what his age, what his habits, since it connects to Facebook and have the buttons of Facebook, the collections of most information about the largest sites online today. She also knows where he works, and what are his interests. She knows that to compare them to those areas of his friends, and then offer him a product of his friends loved, or even just click the link to be interested and find out information.

This information is worth a lot of money to advertisers, because they can concentrate and display targeted advertisements to Facebook users, and – thereby significantly increasing the chances you click a link and maybe move on to purchase a product or service they are trying to advertise.

 

Europe sober up

Europe has recently awakened from a nightmare, when a law student from Vienna, decided he wanted to run right by Hdrktiva European, and require Facebook to send him all the information that has it. Hdrktiva European Continental allows every citizen to demand it from Facebook, to check the integrity of that information and whether it is true or accurate.

That student, Max flattening (Max Schrems) from Vienna, asked Facebook in a copy of all information to be up for it. After a while, he received a CD with a PDF file from 1200 that include all the information that up for him (see also the attached video).

One of the main problems arise from the Max, is that Facebook continued to keep her a copy of the information that is already deleted in the past. Strange thing, because apparently, after the user removes the information from the site, the only reason that Facebook should keep this information, if any, is to backup, or in accordance with national law. Since local law relevant here is the European Court, it is unclear what led to the Facebook to keep the personal information of Max, who had already been deleted, with her, and her use.

As happened in similar cases, here too hard to tell in advance which way it goes. Commissioner of the EU’s privacy may receive the request, and to investigate the issue with Facebook. Facebook may voluntarily consider changing the policy manual, or she’ll try to eliminate this issue under the surface.

Meanwhile, the world, specifically Europe, waiting to see how to develop the case, and how you choose to Facebook respond to revelations that she stores the information of users, it clearly states that the terms of use continues to be one of them or her own needs, and whether users have any way of getting her to delete their information from Facebook permanently. More information you can read here