Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
New Malware Campaign Spreads Fake Twitter and Facebook Messages about Obama and Racism, According to PandaLabs
- Fake direct messages on Twitter include a Facebook link to a supposed video of President Obama punching a man; scam causes users to download Koobface.LP worm

ORLANDO, Fla., Nov. 13, 2012 /PRNewswire/ -- PandaLabs, Panda Security's anti-malware laboratory, has detected a new Twitter spam campaign that may compromise user security. Users receive a direct message on Twitter, which contains the text "Check out Obama punch a guy in the face for calling him a n*****," and a malicious link to a fake Facebook page. Click here for a screenshot of this message: http://press.pandasecurity.com/wp-content/uploads/2012/11/DM-Twitter-Modificado.jpg.

If the user clicks the link, they are taken to a bogus Facebook page where they are prompted to submit their Twitter log-in details. However, if the user enters their credentials, the malware will hijack their account in order to send the same malicious message to all of their contacts: http://press.pandasecurity.com/wp-content/uploads/2012/11/Face1.jpg.

The user is then taken to a website that displays a fake YouTube video set against a fake Facebook background. This time, the victim is asked to update a 'YouTube player' to watch the video: http://press.pandasecurity.com/wp-content/uploads/2012/11/Face2.jpg. As typical with this type of scam, if the user clicks on the 'Install' button, the Koobface.LP worm is downloaded, infecting their computers and attempting to steal all their personal data.

"This attack exploits the two most popular social networking sites, Facebook and Twitter, to trick users into believing they are viewing a trusted site," said Luis Corrons, technical director of PandaLabs. "It also relies on its victims' curiosity by using a scandalous story involving U.S. President Obama and racism. Cyber-criminals know people are curious by nature and take advantage of this to trick users and infect them with their creations."

Twitter Direct Messages, Yet Another Technique to Spread Malware Infections

This is just the latest example of a cyber-scam that uses Twitter direct messages to spread. Users' accounts receive dozens of them every day with malicious links and enticing messages such as, "What exactly do you think you're doing on this video clip", "Hello this guy is saying bad rumors about u...," and "Did you see this pic of you?", etc.

"Never, ever, click the links within the text of those messages as they could infect your computer," explained Corrons. "Every time you receive a direct message you should check with the sender that they have knowingly sent it to you. Make sure it has not been automatically forwarded to you from a hacked account. As a general rule, always keep your antivirus software up to date and be wary of messages offering sensational videos or unusual stories as, in 99 percent of cases they are designed to compromise user security."

About PandaLabs

Since 1990, PandaLabs, Panda Security's malware research laboratory, has been working to detect and classify malware in order to protect consumers and companies against new Internet threats. To do so, PandaLabs uses Collective Intelligence, a cloud-based proprietary system that leverages the knowledge gathered from Panda's user community to automatically detect, analyze and classify the more than 73,000 new malware strains that appear every day. This automated malware classification is complemented through the work of an international team with researchers specialized each in a specific type of malware (viruses, worms, Trojans, spyware and other attacks) to provide global coverage. Get more information about PandaLabs and subscribe to its blog news feed at http://www.pandalabs.com. Follow Panda on Twitter at http://twitter.com/Panda_Security and Facebook at http://www.facebook/PandaUSA.

SOURCE Panda Security

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the con...
The social media expansion has shown just how people are eager to share their experiences with the rest of the world. Cloud technology is the perfect platform to satisfy this need given its great flexibility and readiness. At Cynny, we aim to revolutionize how people share and or...
Cloud backup and recovery services are critical to safeguarding an organization’s data and ensuring business continuity when technical failures and outages occur. With so many choices, how do you find the right provider for your specific needs? In his session at 14th Cloud Expo...
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. Experts Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest collaborate to explore...
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE

Breaking Cloud Computing News
Parsons is pleased to announce that it has acquired Secure Mission Solutions, a premier provider of ...