Actor Will Smith dead 2014

Information of actor Will Smith’s death spread quickly earlier this week causing concern among fans across the world. However the February 2014 report has now been confirmed as a complete hoax and now the newest in a string of fake celebrity death reports.

Thankfully, the actor best known for his roles in The Pursuit of Happyness, Men in Black or The Fresh Prince of Bel-Air is alive and well.

Hundreds of fans directly started writing their messages of condolence on the Facebook page, expressing their sorrow that the talented 45-year-old actor and rapper was dead. And as normal, Twittersphere was frenzied over the death hoax.

Where as some trusting fans believed the post, others were immediately skeptical of the statement, perhaps learning their lesson from the large amount of fake death reports emerging about celebrities over recent months.

Some pointed out that the information had not been carried on any main American system, indicating that it was a fake information, as the death of an actor of Will Smith’s stature would be major news across networks.

A fresh poll conducted for the Celebrity Post shows that a large majority (80%) of respondents think those Will Smith death rumors are not funny any longer.

On Thursday (February 13) the actor’s reps officially confirmed that Will Smith is not dead. “He joins the long list of celebrities who have been victimized by this hoax. He’s still alive and well, stop believing what you see on the Internet,” they said.

A few fans have expressed anger at the fake information saying it was reckless, distressing and hurtful to fans of the much loved actor. Others say this shows his extreme popularity across the world.

Mark Zuckerberg’s own Facebook schedule hacked by Palestinian researcher

Like many organizations nowadays Facebook or myspace provides a bug resources system for protection scientists to reveal weaknesses in come back for a money transaction.

As lengthy as the insects are eligible under Facebook’s whitehat circumstances, scientists can anticipate a compensate of $500 or more.

Khalil Shreateh, an IT graduate student from Palestine, lately found a weeknesses that permitted an enemy to publish on somebody’s schedule, even if they were not Facebook or myspace ‘friends’ with that individual.

So Shreateh created the decision to show the bug on the schedule of Debbie Goodin, a buddy of Facebook or myspace CEO Indicate Zuckerberg. He then revealed the bug to Facebook or myspace via the whitehat system. According to Shreateh, as Goodin only stocks her content with her buddies, the Facebook or myspace group were incapable to accessibility his publish and responded to tell him they could only see a mistake (sic):

Facebook protection replay was that the weblink gives mistake starting , if course they did not use their power to perspective sarah’s comfort content as sarah discuss her schedule content with her buddies only , i was able to perspective that publish cause i’am the one who did publish it even i’am not in her buddy record. that what i informed them in a replay and i also informed them i may publish to Indicate Zuckerberg timelime

So he revealed it again. Facebook or myspace replied:

I am sorry this is not a bug.

The identified Shreateh then created the decision to increase his business presentation by publishing to Zuckerberg’s own schedule.

Dear Mark Zuckerberg,

First sorry for breaking your privacy and post to your wall , i has no other choice to make after all the reports i sent to Facebook team.

My name is KHALIL, from Palestine .

couple days ago i discovered a serious Facebook exploit that allow users to post to other Facebook users timeline while they are not in friend list .

i report that exploit twice , first time i got a replay that my link has an error while opening , other replay i got was ” sorry this is not a bug ” . both reports i sent from , and as you see iam not in your friend list and yet i can post to your timeline .
“Minutes” after publishing, he was approached by a Facebook or myspace protection professional, Ola Okelola, who requested for more details about the manipulate. According to Shreateh he then had his consideration revoked (it has since been reinstated).

He also published this movie, displaying his exploit:

An professional on Facebook’s protection group, He Jackson, said Facebook or myspace set the bug on Friday but confessed that it should, perhaps, have requested Shreateh for more details.

He managed, however, that Shreateh is not eligible to a bug resources because he breached Facebook’s whitehat circumstances and circumstances and accountable disclosure plan.

OK – so I perform on a protection group at Facebook or myspace and sometimes help with examining Whitehat reviews. To be obvious, we set this bug on Friday. The OP is appropriate that we should have requested for extra repro guidelines after his preliminary review. Unfortunately, all he presented was a weblink to the publish he would already created (on a actual consideration whose approval he did not have – breaking our ToS and accountable disclosure policy), saying that “the bug allow facebook customers to discuss hyperlinks to other facebook users”. Had he involved it clip [he created to show the exploit] originally, we would have captured this much more easily …… However, the more essential problem here is with how the bug was confirmed using the records of actual individuals without their authorization. Taking advantage of insects to effect actual customers is not appropriate actions for a white-colored hat. We allow scientists to create analyze records here: to help accomplish accountable analysis and examining. In this situation, the specialist used the bug he found to publish on the timeframes of several customers without their approval.

Even if Shreateh considered he was exposing the weeknesses in a accountable way, Facebook’s bug resources circumstances are obvious

Let’s wish that he won’t have been put off looking for other weaknesses later on, but that when he will create sure he sensibly reveals the bug and can then appreciate enjoying the bug resources benefits.

Liss Teen USA 2013 – sextortionist compromised web camera to click bedroom photos

Recently crowned Skip Teenager USA Cassidy Hair is supposedly the newest sufferer of sextortion.According to the LA Periods, the Government Institution of Research (FBI) verified on Wed that it’s analyzing statements by Hair and other women who say that their webcams were affected, images or movie were taken surreptitiously, and that the cyberpunk or online hackers then required money in return for maintaining the images out of community disclosure.

Wolf, of Lemon Nation, Florida, was Skip Florida Teenager USA before successful the Skip Teenager USA contest over the few days at the Atlantis Resort in the Bahamas.19-year-old Ms. Hair has informed journalists that prior to being crowned, she obtained an confidential e-mail from someone who stated to have naked images of her, taken via the web photographic camera on her computer.

Wolf informed These days Information that about four months ago, Facebook or myspace informed her about somebody trying to log into her account from another state.She then obtained an e-mail saying that the individual had images of her taken in her bed room via her pc’s affected web photographic camera. The individual, who hasn’t been known as in the continuous federal investigation, tried to extort her in return for maintaining the images from being published.

As if daily web photographic camera coughing weren’t surprising enough, this case obviously includes a web photographic camera that was affected without the identifying photographic camera mild arriving on to indicate that it was documenting.

This is how Ms Hair informs it:

“I wasn’t aware that somebody was viewing me [on my webcam]. The [camera] mild didn’t even go on, so I had no concept.”

Is that possible? Can webcams be rigged so as to record without the mild arriving on?Sophos Mature Protection Consultant Chester Wisniewski has considered the issue, and he says it depends:

“Some notebooks allow you to convert the mild on and off in application, others only perform actually. I think it is certainly possible, if unlikely.”

But if it’s unlikely to experience a web photographic camera coughing that controls to convert off the digital camera’s “on” mild, simply old vanilla flavor web photographic camera coughing that results in the mild on isn’t very unlikely at all.In fact, as the BBC revealed in July, there’s a successful underground for access to computer systems whose webcams have been affected.

Stolen web photographic camera movie of women cost $1 per “slave,” as they’re known as. Thieved movie of men slaves goes for $1/100 slaves.As for Ms. Hair, she has converted her stated victimization into a campaign. These days Information reviews that after she was known as Skip Florida, she visited to educational institutions to increase attention about cybercrime among teenagers.

Her advice to teenagers is to regularly clear their surfing around record and modify their security password into something difficult to think.She’s estimated by Worldwide Business Periods on security password hygiene:

“I had the same security password for years. But now seeing that someone can break into my things just by installing an wrong link, it’s very important to modify your security passwords, remove your biscuits.”

Having a safe security password is absolutely the right way to go. Here’s one way to create one.I would also recommend to Ms. Hair that if she is not informing teenagers this already, to please desire them against using the same security password on several sites.And since several hard-to-crack security passwords can be challenging to disagree, Ms. Hair also might want to recommend the use of an internet security password administrator, such as KeePass, 1Password or LastPass.

Webcam. Picture complimentary of Shutterstock When we review on web photographic camera neighbor’s at Undressed Protection, we generally tell customers to keep an eye on the mild. That, surprisingly, won’t stop distant online hackers of webcams who handle to convert off the photographic camera mild via obtaining its application.

But given that, as Chet notices, such a break is unlikely, it’s still a wise decision to keep an eye on the mild. Better still, cover it with a spot – a small piece of dark record, say, or a tag or bandage – when you’re not using the photographic camera.Ms. Hair, for her part, has said that she is ready for another strike by placing a tag over her web photographic camera when it’s not in use.

Nice going on your cybercrime protection knowledge perform, Ms. Hair, and best of fortune with your continuous research, be it with your dearest jazz music dance or the hair-raising world of cybercrime.

Bill Gates’s ssn, address, credit file and more… released by hackers

Bill Gates is the latest superstar to have had his individual details released on a web page that has revealed the social security numbers, details and individual financial details of lots of people in the community eye. Malware practice are carried out by any sites and people should be aware of  spammers.These type of spammers details can be seen in various spam alert sites.

As with the flow earlier this week of individual details that belong to – amongst others – companies Kim Kardashian, Mrs. Obama, and Beyoncé, it appears that the individual details has been procured from a group of 3 of credit score rating companies – Experian, Equifax and TransUnion.

Although the FBI are said to be analyzing who is behind the “Secret Files” web page, it is currently still accessible.

And whoever is behind the secret web page has been busy continuing to upgrade it – with individual details of more politicians such as Glove Mitt romney, Competition Timber, and R Kelly felix as well as the creator of Ms.

Once again, we repeat that we do not suggest that users visit this web page – as you could be putting your computer at risk of viruses disease, as well as motivating the unlawful details disclosure.

Meanwhile, what still isn’t clear is just how unexpected parties handled to fraudulently accessibility the records of well-known numbers without authorisation.

One concept is that those behind the web page were able to collect details on the internet about the superstars, and then use that information to efficiently impersonate their objectives and accessibility the money score ratings.

Misuse of Name “Pravin Gordhan”- 419 Scam Email

Pravin Gordhan

The hottest 419 scam was used in the name of the finance minister Pravin Gordhan’s and scammers try to cheat some of the recipients and tried to get their personal details.

The scammers sent mail for some of the recipients like office of the committee on foreign payments from the house of assembly. This mail was forwarded to many of them and in that mail they mention that they won the inherited amount of money.

The mail consist of so many grammatical errors and it describes as the recipient of this mail involve in any other illegal activities to steal the prize money of the person the sender can have the solution to tackle the situation.

The mail was sent by under the instruction of finance Minister Pravin Gordhan the prize money can be given fully when the person gives their own information like full name, phone, address and the copy of the particular email then only they can fully claim their money.

This mail is not the first time it’s the kind of another mail with his name the finance minister Pravin Gordhan condemns because of using his name and other famous personalities and famous institutions.

Pravin Gordhan advised to all South Africans to report that those scammer mails to the nearest police station.

This fraudulent act was comes under the 419 scams. 419 are done by different ways they are website warning and fraudulent schemes to claim the money Financial Intelligence Center (FIC) and finance minister and other famous personalities.

Most of the scams are happened only in South Africa because in that place some of the people are greedy to get the money and they can do anything for money.

All human beings should have responsibilities to keep our country without any selfishness and some of the terms and conditions.

The finance minister told that hereafter the people should complaint in police station if this kind of mail came for their mailbox.