MagicJack Reviews – You get what you paid for…

A magicJack is a cheap and small device that allows you to make telephone calls for very, very low costs.

As of June 2011, magicJack costs $39.95 plus shipping and handling. You get a free year of calling to the United States, Canada, Puerto Rico, and the US Virgin Islands. Additional years cost $19.95.

via MagicJack Reviews – You get what you paid for… | voipreview.org.

When you follow the easy-to-use installation steps above, you’ll find that magicJack installs software on your computer.

The magicJack software is almost impossible to remove. magicJack software also will display advertisements on your computer, too.

Half of Fortune 500s, US Govt. Still Infected with DNSChanger Trojan

Rasmussen said there are still millions of PCs infected with DNSChanger. “At this rate, a lot of users are going to see their Internet break on March 8.”

via Half of Fortune 500s, US Govt. Still Infected with DNSChanger Trojan — Krebs on Security.

Given the Conficker Working Group’s experience, shutting down the surrogate DNS network on March 8 may actually be a faster — albeit more painful — way to clean up the problem.

Zeus returns: FBI warns of ‘Gameover’ ID-theft malware

The FBI said the phishing lures typically includes a link in the e-mail that goes to a phony website. ”Once you’re there, you inadvertently download the Gameover malware, which promptly infects your computer and steals your banking information,” it warned.

via Zeus returns: FBI warns of ‘Gameover’ ID-theft malware | ZDNet.

Hmmm.  You must have to do something to “inadvertently” download the malware.  I’d like to see this website and how they do it but no link or no example.  This story sounds fishy.

OLPC Bitfrost – OLPC

There are five broad categories of “bad things” that running software could do, for the purposes of our discussion. In no particular order, software can attempt to damage the machine, compromise the user’s privacy, damage the user’s information, do “bad things” to people other than the machine’s user, and lastly, impersonate the user.

via OLPC Bitfrost – OLPC.