Jump to content

Search the Community

Showing results for tags 'card'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Occupation


Interests


Biography


Location

Found 19 results

  1. RoTunneling VPN va oferta servicii VPN rapide, la viteze intre 16Mb/s si 500Mb/s la preturi exceptionale. Plan VPN "Big" BEST PRICE Viteza (maxima): 16 Mb/s Trafic: Nelimitat Dispozitive simultane: 1 Conexiune criptata: DA Mai putine detalii P2P: DA ** Conectivitate Cloud: DA Conectare prin IPv6: DA * SMS cadou (Romania): DA Trafic compresat: DA Uptime: 99% Activare instant: DA Alerte SMS: DA 3 €+TVA (pe luna) 16.1 lei TVA inclus (pe luna)TVA folosit: Romania - 20% CONT NOU "BIG" Plan VPN "Omega" MOST CHOSEN Viteza (maxima): 50 Mb/s Trafic: Nelimitat Dispozitive simultane: 1 Conexiune criptata: DA Mai putine detalii P2P: DA ** Conectivitate Cloud: DA Conectare IPv6: DA * SMS cadou (Romania): DA Trafic compresat: DA Uptime: 99% Activare instant: DA Alerte SMS: DA 5 €+TVA (pe luna) 26.83 lei TVA inclus (pe luna)TVA folosit: Romania - 20% CONT NOU "OMEGA" Plan VPN "Gyga" Viteza (maxima): 250 Mb/s Trafic: Nelimitat Dispozitive simultane: 1 Conexiune criptata: DA Mai putine detalii P2P: DA ** Conectivitate Cloud: DA Conectare IPv6: DA * SMS cadou (Romania): DA Trafic compresat: DA Uptime: 99% Activare instant: DA Alerte SMS: DA 6 €+TVA (pe luna) 32.19 lei TVA inclus (pe luna)TVA folosit: Romania - 20% CONT NOU "GYGA" Plan VPN "Terra" BEST VALUE Viteza (maxima): 500 Mb/s Trafic: Nelimitat Dispozitive simultane: 3 Conexiune criptata: DA Mai putine detalii P2P: DA ** Conectivitate Cloud: DA Conectare IPv6: DA * SMS cadou (Romania): DA Trafic compresat: DA Uptime: 99% Activare instant: DA Alerte SMS: DA 16 €+TVA (pe luna) 85.85 lei TVA inclus (pe luna)TVA folosit: Romania - 20% CONT NOU "TERRA" Detalii: Modalitati de plata: Puteti plati prin: sms, online cu cardul, cash la automatele Zebra Pay /QIWI si transfer bancar. TRIAL: fiecare abonat are 1 zi trial. Facturare: dupa efectuarea platii veti gasi in contul dvs. factura fiscala in format PDF. Utilitate: Scopul serviciului RoTunneling VPN este de a ajuta utilizatorii cenzurati sa acceseze internetul cat si de a asigura securitatea navigarii pe internet. Este strict interzisa folosirea acestuia in activitati ilegale. Redshift IT SRL este procesator de date cu caracter personal NR: 27772, conform legii 677/2001. RoTunneling VPN este un serviciu de VPN, ce foloseste tehnologii noi, inovatoare, atingand astfel performante cu pana la 980% mai mari decat prin protocoalele clasice! Tot traficul este criptat in DHE-RSA-AES128-SHA (pf enabled), si encapsulat in trafic specific https. http, icmp si dns, tehnologia folosita deschide pana la 32 conexiuni simultane pe porturi tcp/udp pentru a accelera banda! Reducere pentru membrii RST: Folositi cuponul (de mai jos) in contul dvs. si beneficiati de 10% reducere: RST Facilitati: -trimiti si primesti sms nelimitat in toate retelele de telefonie mobila din Romania. -tehnologie UT-VPN cu pana la 980% mai rapida. -trafic criptat in DHE-RSA-AES128-SHA (pf enabled). -trafic compresat si encapsulat in https:http, icmp si dns. -32 conexiuni simultane pt accelerarea conexiunii. -pachetele sunt distribuite pe cele 32 conexiuni simultate altfel este aproape imposibil de recompus traficul pentru decriptare, fara algoritmul si criterile negociate intre server si client. -posibilitatea de a seta timpul de viata a unei conexiuni intre 1 secunda si infinit. -viteze pana la 500Mb/s. -alterte cu statusul contului prin sms. -conectare si prin IPV6. -cele mai mici preturi. -bonusuri lunare pentru fiecare recomandare. -disponibil si prin cloud. Metode de plata: sms, card online, cash la automatele Zebra pay si Qiwi, transfer bancar. (prin parteneriat cu MobipPay, astfel plata si informatiile privind plata sunt introduse si administrate in mod exclusiv de catre MobilPay) Tehnologii de conectare suportate pana in prezent: UT-VPN (tehnologia nativa prin aplicatia RoTunneling VPN) Ipsec/L2TP si SSTP OpenVPN Detalii suplimentare: https://www.rotunneling.net/
  2. Today anywhere you go, you will come across Free or Public WiFi hotspots -- it makes our travel easier when we stuck without a data connection. Isn’t it? But, I think you’ll agree with me when I say: This Free WiFi hotspot service could bring you in trouble, as it could be a bait set up by hackers or cyber criminals to get access to devices that connects to the free network. This is why mobile device manufacturers provide an option in their phone settings so that the device do not automatically connects to any unknown hotspot and asks the owner for approval every time it comes across a compatible WiFi. Hackers can grab your Credit Card Data. Here’s How? Recently, security researchers from mobile security company 'Wandera' have alerted Apple users about a potential security flaw in iOS mobile operating system that could be exploited by hackers to set up a rogue WiFi spot and then fool users into giving up their personal information, including credit card details. The loophole leverages the weakness in the default behaviour of iOS devices, including iPhones, iPads and iPods, with WiFi turned on, Ars reported. This could let attackers create their malicious wireless hotspots and inject a fake "captive portal" page mimicking the genuine Apple Pay interface asking users to enter their credit card details. A hacker nearby a customer connecting an Apple Pay transaction could launch an attack in an attempt to force the victim’s mobile to connect to evil hotspot and then display a popup portal page which is designed in such a way that users could be fooled into believing Apple Pay itself is requesting to re-enter their Credit Card details. According to the researchers, spoofers can loaf around a point-of-sale (POS) machine with an Apple Pay terminal and could continuously launch the attack in order to victimize more people. However, the attack may not trick a large number of people because the fake captive portal page imitating Apple Pay interface is displayed under a fairly prominent "Log In" title bar, the report says. The simple and easiest workaround to prevent such attacks is to turn your device's Wi-Fi simply OFF if you are not intentionally connecting to a known Wireless network. Security researchers have warned Apple about the loophole and meanwhile recommended that Apple and Google should "consider adopting a secure warning when displaying captive portal pages to users so that users exercise caution." Source
  3. Researchers at Wandera, a mobile security company, have alerted Apple to a potential security vulnerability in iOS that could be used by attackers to fool users into giving up their credit card data and personal information. The vulnerability, based on the default behavior of iOS devices with Wi-Fi turned on, could be used to inject a fake "captive portal" page that imitates the Apple Pay interface. The attack leverages a well-known issue Ars has reported on in the past: iOS devices with Wi-Fi turned on will attempt by default to connect to any access point with a known SSID. Those SSIDs are broadcast by "probe" messages from the device whenever it's not connected to a network. A rogue access point could use a probe request capture to masquerade as a known network, and then throw up a pop-up screen masquerading as any web page or app. The Wandera attack uses this behavior to get a mobile device to connect and then presents a pop-up portal page—the type usually used when connecting to a public WiFi service to present a Web-based login screen—that is designed to resemble an Apple Pay screen for entering credit card data. The attack could be launched by someone nearby a customer who has just completed or is conducting an Apple Pay transaction so that the user is fooled into believing Apple Pay itself is requesting that credit card data is reentered. An attacker could loiter near a point-of-sale system with an Apple Pay terminal and continuously launch the attack. Considering that the fake captive portal page is displayed beneath a "Log In" title bar, this attack may not fool many people. “In high footfall locations, even a very small ratio of success will yield a large number of valuable credit card numbers," said Eldar Tuvey, CEO of Wandera, in a statement e-mailed to Ars. "It’s all so easy for them. Using readily available technology, which they may be discretely carrying about their person, hackers can for the first time focus their efforts where their victims are at their most susceptible—at the checkout.” The real vulnerability exploited here is iOS' automatic WiFi connection and the format in which iOS displays captive portal pages. There are some very simple ways to prevent this sort of attack—such as turning Wi-Fi off when not deliberately connecting to a network. The Wandera researchers reccommended that Apple and Google should "consider adopting a secure warning when displaying captive portal pages to users, so that users exercise caution." Additionally, they suggest that users close and re-open payment applications to enter credit card data and use the camera capture capability of the apps to input credit card data whenever possible. Ars spoke with an Apple spokesperson, and is awaiting an official response. However, as the screenshots show, this spoof looks considerably different from Apple Pay's actual interface, and a card registration screen popping up after a transaction is hardly expected behavior for the service. Apple Pay never asks for credit card data during a transaction. Ars will update this story as more information becomes available. Source
  4. Cum pot sa-mi fac contul de paypal verified daca nu am card de credit? Am incercat sa fac un card pe net pe etrades, bancore si netspend, dar nu au mers.
  5. Muppet

    Email ciudat

    Federal Bureau of Investigation Counter-terrorism Division and Cyber Crime Division J. Edgar. Hoover Building Washington DC JAMES B. COMEY Attention Beneficiary, NOTE: If you received this message in your SPAM / BULK folder, it is because of the restrictions imposed by your Mail/Internet Service Provider, we urge you to treat it genuinely because its a legitimate email. Records show that you are among one of the individuals and organizations who are yet to receive their overdue payment from overseas which includes those of Lottery/Gambling, Contract and Inheritance. Through our Fraud Monitory Unit we have noticed that you have been transacting with some impostors and fraudsters who have been impersonating the likes of Prof. Soludo/Mr.Lamido Sanusi of the Central Bank Of Nigeria, Mr. Patrick Aziza, Bode Williams, Frank, Anderson, none officials of Oceanic Bank, Zenith Banks, Kelvin Young of HSBC, Ben of FedEx, Ibrahim Sule, Dr. Usman Shamsuddeen and some impostors claiming to be The Federal Bureau of Investigation. The National Central Bureau of Interpol enhanced by the United Nations and Federal Bureau of Investigation have successfully passed a mandate to the current president of Nigeria his Excellency President Good luck Jonathan to boost the exercise of clearing all foreign debts owed to you and other individuals and organizations who have been found not to have receive their Contract Sum, Lottery/Gambling, Inheritance and the likes. Now how would you like to receive your payment? Because we have two method of payment which is by Cheque or by ATM card? The Cyber Crime Division of the FBI gathered information from the Internet Fraud Complaint Center (IFCC) on how some people have lost outrageous sums of money to these impostors. As a result of this, we hereby advise you to stop communication with any one not referred to you by us. We have negotiated with the Federal Ministry of Finance that your payment totaling $2,900,000.00(Two Million Nine Hundred Thousand Dollars). will be released to you via a custom pin based ATM card with a maximum withdrawal limit of $10,000 a day which is powered by Visa Card and can be used anywhere in the world where you see a Visa Card Logo on the Automatic Teller Machine (ATM). We know you might have be thinking how this money was given to you, now listen. We the FBI recover some huge amount of money from Fraudsters we arrested last year and early this year so we the FBI and Internet Fraud Complaint Center (IFCC) in conjunction with the International Monitory Funds (IMF) After the several meeting we held last week we came to an conclusion to share the huge amount of money among those that have been scam for the past few years back and your name and address where selected randomly. To redeem your funds, you are hereby advised to contact the ATM Card Center via email for their requirement to proceed and procure your Approval of Payment Warrant and Endorsement of your ATM Release Order on your behalf which will cost you $250 Usd only and nothing more as everything else has been taken care of by the Federal Government including taxes, custom paper and clearance duty so all you will ever need to pay is $250.00 only. Do not think this is a also a scam because you have been ask to pay a little amount of fee to redeem your fund. Dr. Lord Ruben ATM Card Center Director Private Email: lordben@usa.com Text Message Only: +1(315) 889-6367 Do contact Lord Ruben of the ATM Card Center via his contact details above and furnish him with your details as listed below: FULL NAMES: DELIVERY ADDRESS FOR ATM CARD SEX: DATE OF BIRTH: OCCUPATION: TELEPHONE NUMBER: EMAIL ADDRESS: On contacting him with your details your file would be updated and he will be sending you the payment information in which you will use in making payment of $250.00 for the procurement of your Approval of Payment Warrant and Endorsement of your ATM CARD Release Order, after which the delivery of your ATM card will be effected to your designated home address without any further delay or extra fee. JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION UNITED STATES DEPARTMENT OF JUSTICE WASHINGTON, D.C. 20535 Cine o mai primit acest mail ? creca e din cauza ca ma uitasem la mosu al a pe camera video ) ca ala avea acolo la nume ceva cu bureau care-i treaba oare ?
  6. Introduction to POS malware In September 2014, experts at Trustwave firm published an interesting report on the evolution of the point-of-sale (PoS) malware in recent months. The attention of the media on PoS malware was raised after the numerous data breaches suffered by retail giants Target, Home Depot and Neiman Marcus. Experts at Trustwave investigated a number of incidents involving payment card data, and researchers examined a large amount of malicious code used by criminal crews to target point-of-sale devices. PoS malware is specifically designed to steal sensitive information stored in the magnetic stripe of a payment card, yet techniques implemented by the malware authors are different and are becoming even more sophisticated. Point-of-sale malware are able to steal data by scraping the memory of the machine or accessing its disk. Since 2013, POS malware is rapidly evolving, and numerous actors in the underground have offered customization for malicious codes widely used worldwide. The most interesting evolutions for PoS malware are related to evasion techniques and exfiltration methods. Cyber criminals are exploiting new solutions to avoid detection of defensive software. Malware authors are also looking with great interest to PoS malware botnets that rely on command and control (C&C) servers hidden in the TOR networks. “We also saw evidence of more authors automating the installation and control of their malware in 2013. While Trustwave discovered a number of new POS malware families exhibiting botnet-like tendencies, a number of well-known, older families also made an appearance,” states the post published by Trustwave. Which are the most popular PoS malware? Experts at Trustwave revealed that the Alina (19,1) malware family was the most prevalent malware used by threat actors behind the cases investigated by Trustwave. Other malware detected by the investigators were Baggage (16,5%) and Triforce (11,2%), meanwhile the popular BlackPos malware, Dexter and ChewBacca were used in a limited number of attacks, despite that they are considered very sophisticated. A detailed look to several PoS malware revealed that the Dexter malware is appreciated for the memory dumping ability it implements. Dexter implements process-injection mechanisms and logs keystrokes. Chewbacca is another powerful malware characterized by a sophisticated exfiltration mechanism that relays over the TOR network to host C&C servers. Debuting in late 2012, Alina surprised many, because it was one of a small number of POS malware families that included a C&C structure, encrypted the data it exfiltrated, blacklisted common Windows processes and installed itself to a randomly chosen name.” In many cases, criminal crews also used commercial keyloggers to infect the POS systems. A common characteristic for all the malware detected since 2014 is the lack of encryption for exfiltrated data. The “exclusive OR” (XOR) operation is the encryption technique most used by the malware authors (32%), followed by Blowfish (3.7%). Analyzing the exfiltration methods used by point-of-sale malware, the experts discovered that in the majority of cases (41%) the attackers don’t adopt a botnet infrastructure with a classic C&C infrastructure, instead they prefer to leave the stolen data on disk to be extracted manually later. HTTP is the second exfiltration technique (29%), followed by SMTP (22%). By analyzing the POS malware persistence mechanisms, the experts noticed that they did not change significantly from the past years. The point-of-sale malware use maintained persistence in one of the following ways: Run Registry Modification (53.2%) Installed as a Service (30.9%) AppInitDLLs Registry Modification (0.5%) None (14.9%) The evolution of point-of sale malware – what’s new? The authors of point-of-sale malware are improving their code. Let’s analyze together the most interesting code discovered since the report published by Trustwave in 2014. Name Abilities PoSeidon malware Sophisticated method to find card data. Self-update ability to execute new code. Effective measures to protect its code from analysis. The malware belongs to the “scrapers” family. Implementation of the Luhn formula to verify card validity. Uses a keylogger module. NewPosThings malware Efficient memory scraping process. Custom packer and new anti-debugging mechanisms. Implements ability to harvest user input. To obtain persistence it uses registry entry with the name “Java. Update Manager”. Disables the warning messages used by the OS. Implementation of the Luhn formula to verify card validity. d4re|dev1| malware Infects Mass Transit Systems. Allows remote control of victims. Implements functionalities of RAM scrapping and keylogging features. Allows loading of additional payloads through “File Upload” option for lateral movement inside the local network. The PoSeidon malware Recently, experts at Cisco have discovered a new strain of PoS malware dubbed PoSeidon. The new variant of malware presents many similarities with the popular Zeus trojan and implements sophisticated methods to find card data on the infected machine with respect to other PoS malicious code like BlackPoS, which is the malware that was used to steal data from the US giant retailers Target and Home Depot. “PoSeidon was professionally written to be quick and evasive with new capabilities not seen in other PoS malware,” states the blog post from Cisco’s Security Solutions team. “It can communicate directly with C&C servers, self-update to execute new code and has self-protection mechanisms guarding against reverse engineering.” The following image shows the architecture of the PoSeidon malware used by criminal crews to steal credit/debit card data from PoS systems. The malicious code belongs to the family of malicious code dubbed “scrapers”, which are malware that “scrape” the memory of point-of-sale systems searching for card numbers of principal card issuers (i.e. Visa, MasterCard, AMEX and Discover). PoSeidon has the ability to verify the validity of card numbers by using the Luhn formula. Once in execution, PoSeidon starts with a loader binary that operates to ensure the persistence on the infected PoS machine, then it receives other components from the C&C servers. Among the binaries downloaded by the loader, there is also a keylogger component used to steal passwords and could have been the initial infection vector, Cisco said. “The Loader then contacts a command and control server, retrieving a URL which contains another binary to download and execute. The downloaded binary, FindStr, installs a keylogger and scans the memory of the PoS device for number sequences that could be credit card numbers. Upon verifying that the numbers are in fact credit card numbers, keystrokes and credit card numbers are encoded and sent to an exfiltration server,” continues Cisco. The loader contacts one of the hardcoded servers in the following list provided by CISCO experts, the majority of them belonging to Russian domains: linturefa.com xablopefgr.com tabidzuwek.com lacdileftre.ru tabidzuwek.com xablopefgr.com lacdileftre.ru weksrubaz.ru linturefa.ru mifastubiv.ru xablopefgr.ru tabidzuwek.ru PoSeidon protects exfiltrated data with encryption. The data stolen from the memory of the machine and collected by the keylogger are sent to the C&C in XOR and base64 encoding. The majority of command and control servers identified by the experts are currently hosted on “.ru” domains. PoSeidon demonstrates the great interest in the criminal underground in PoS systems. Criminal crews are developing sophisticated techniques to compromise these systems. “Attackers will continue to target PoS systems and employ various obfuscation techniques in an attempt to avoid detection. As long as PoS attacks continue to provide returns, attackers will continue to invest in innovation and development of new malware families. Network administrators will need to remain vigilant and adhere to industry best practices to ensure coverage and protection against advancing malware threats,” explained Cisco’s Security Solutions team. NewPosThings malware Another insidious point-of-sale malware recently improved is NewPosThings. Researchers at Trend Micro in fact have detected a new strain of the malicious code. The new variant of NewPosThings, also known as NewPosThings 3.0, is a 64-bit version of the known agent discovered in 2014 by the experts at Arbor Networks. The researchers at Trend Micro confirmed that the malware had been in development since October 2013, and since then many variants were detected in the wild, including the last version that was specifically designed to compromise 64-bit architectures. The NewPosThings PoS malware implements an efficient memory scraping process to steal payment card data directly from the memory of the PoS machine. Malware authors implemented a custom packer and new anti-debugging mechanisms and a module to harvest user input. The NewPosThings variant, coded as TSPY_POSNEWT. SM, installs itself on the victim’s machine using different names that appear familiar to the users, including javaj.exe, vchost.exe, dwm.exe, ism.exe and isasss.exe. As explained by malware experts from Trend Micro, the choice of the name is not casual, but it is the result of an algorithm that calculates based on information related to the infected machine like its name and the volume serial number. NewPosThings uses a registry entry with the name “Java Update Manager” to obtain persistence on the PoS machine. Figure 3 -NewPosThings uses a registry entry with the name “Java Update Manager” to obtain persistence on the PoS machine. Once it has infected the target, NewPosThings starts gathering sensitive data, including passwords for virtual network computing (VNC) software such as UltraVNC, RealVNC, WinVNC, and TightVNC. Then the malware disables the warning messages used by the OS for certain file extensions, including .exe,.bat,.reg and .vbs. .exe,.bat,.reg and .vbs. “Disabling the Open File Security Warning of Microsoft Windows reduces the overall security posture of the Microsoft Windows host operating system. This is because the system no longer prompts the user for validation when opening up files that could have been downloaded from malicious sources,” states the blog post published by Trend Micro. NewPosThings checks the presence of financial software on the target machine, and when it recognizes the associated process it searches for patterns that could be associated with credit/debit card numbers, and like other malware, uses the Luhn algorithm to validate the data. The same algorithm was used for card number validation by recently discovered PoSeidon and Soraya malicious codes. NewPosThings transfers data to the command and control (C&C) server every 10 minutes. The collected data is sent to the server via HTTP. Among the C&C servers used by the malware authors there are also IP addresses associated with two US airports. “While analyzing the C&C servers used by the PoS Trojan, experts identified IP addresses associated with two airports in the United States. Trend Micro PoS Trojan, experts identified IP addresses associated with two airports in the United States. Trend Micro warned that travelers will be increasingly targeted and that airports are a target-rich environment.” Security Experts at Voidsec security firm published an interesting analysis of the malware and its command and control infrastructure. The experts used data provided by Arbor Networks to locate the Command & Control servers that are still up and running. The experts exploited some vulnerabilities in the C&C servers to analyze their contents. By analyzing the server, experts from Voidsec discovered the following vulnerabilities: Ability to run bruteforce attacks on administrative credentials. Presence of the phpMyAdmin application implementing web login. Authentication bypass, which gives the attacker the ability to view a protected page on the C2 server without being logged. By accessing data hosted on the compromised Command & Control servers, the researcher profiled the botnet used by the criminal crews: The two servers C&C servers analyzed managed a total of 80 bots. At the moment the experts logged C2 servers, there were 50 bots active, 10 did not have a status, and 20 bots were “dead.” The total number of archived log is 5240, an average of 65.5 log / bot. 79% of the bots were based on 32-bit architecture, the remaining on 64-bit architecture. The majority of compromised bots (57%) were XP machines, followed by Windows 7 (34%). The greatest number of infections was observed in Canada (29%), Australia (21%) and UK (13%). Figure 5 – PoS machine OS (Analysis Voidsec) The “d4re|dev1|” PoS malware The last case I want to discuss is a PoS malware that was detected by security experts at the IntelCrawler cyber threat intelligence firm at the end of 2014. Researchers detected a new point-of-Sale malware called “d4re|dev1|” (read dareldevil), which was used by criminal crews to infect ticket vending machines and electronic kiosks. In this case, the malware was used to infect Mass Transit Systems. The malicious code appeared as a sophisticated backdoor, which allows remote control of victims. d4re|dev1| implements RAM scraping and keylogging features exactly like any other PoS malware. The experts at IntelCrawler explained that d4re|dev1| is able to steal data from several PoS systems, including QuickBooks Point of Sale Multi-Store, OSIPOS Retail Management System, Harmony WinPOS and Figure Gemini POS. IntelCrawler discovered that cyber criminals managing the d4re|dev1| botnet also compromised ticket vending machines used by mass transportation systems and electronic kiosks installed in public areas. One of the infected ticket vending machines was identified in August 2014 in Sardinia, Italy, and attackers obtained the access exploiting credentials for a VNC (Virtual Network Computing). “These kiosks and ticket machines don’t usually house large daily lots of money like ATMs, but many have insecure methods of remote administration allowing for infectious payloads and the exfiltration of payment data in an ongoing and undetected scheme,” states IntelCrawler. igure 7 – d4re|dev1| Control panel In a classic attack scenario, threat actors used to compromise the targeted PoS by discovering the remote administrative credentials, for example through a brute force attack. Researchers at IntelCrawler believe that attackers use this tactic to compromise the POS systems. Anyway, the d4re|dev1| malware also allows operators to remotely upload files to the victim’s machine, and in this way the attacker can provide updates to code or to serve additional payloads for lateral movement inside the local network. “The malware has a “File Upload” option, which can be used for remote payload updating. The process of malware was masked under “PGTerm.exe” or “hkcmd.exe”, as well as legitimate names of software such as Google Chrome. Adversaries use this option for the installation of additional backdoors and tools, which allows them to avoid infrastructure limitations and security policies designed for detection,” said InterCrawler. The “upload feature” is particularly important for cyber criminals. Experts speculate that attackers are interested to compromise systems inside enterprise wide networks to capitalize their efforts with multiple activities inside the targeted infrastructure (i.e. data stealing, botnet recruiting). “Serious cybercriminals are not interested in just one particular Point-of-Sale terminal—they are looking for enterprise wide network environments, having tens of connected devices accepting payments and returning larger sets of spoils to their C2 [command-and-control] servers,” states the blog post published by IntelCrawler. Conclusions The number of data breaches is growing at a fast pace, and the retail industry is among the most affected sectors. Security experts sustain that measures to prevent cyber attacks against systems in the retail industry are not adequate, and PoS systems are a privileged target of cyber criminals that are developing new malicious code that presents sophisticated techniques. In this post, we have analyzed three of the most effective samples of PoS malware recently detected by security firms. They implement a similar feature that makes these malicious codes perfect hacking weapons that in some cases are used to breach the overall infrastructure of the victims. The experts highlight that the employees of breached companies commonly violated security policies, for example, it is very common that they used the terminals to navigate on the web, check their email, to access social network accounts and play online games. This dangerous behavior must be banned, and it is necessary to instruct personnel on the principal threats and the techniques, tactics, and procedures of the attackers. It is recommended to use a secure connection for administrative activities and limit the software environment for operators “by using proper access control lists and updated security polices”. References http://securityaffairs.co/wordpress/28160/malware/point-of-sale-malware.html https://gsr.trustwave.com/topics/placeholder-topic/point-of-sale-malware/ http://securityaffairs.co/wordpress/35181/cyber-crime/poseidon-pos-malware.html http://www.arbornetworks.com/asert/2014/09/lets-talk-about-newposthings/ http://securityaffairs.co/wordpress/30570/cyber-crime/pos-malware-dareldevil.html http://blog.trendmicro.com/trendlabs-security-intelligence/newposthings-has-new-pos-things/ http://voidsec.com/newposthings-hacked-exposed/#server http://securityaffairs.co/wordpress/30570/cyber-crime/pos-malware-dareldevil.html https://www.intelcrawler.com/news-24 http://securityaffairs.co/wordpress/30570/cyber-crime/pos-malware-dareldevil.html Source
  7. Folosing linkul, primiti 25$ gratis cand primiti o plata de peste 100$ puteti face si card fizic si banii sunt instant pe card Get 25$ free payoneer referrer
  8. Tenorshare Any Data Recovery Pro is the most powerful data rescue software that enables you to recover lost, deleted, or formatted photos, videos, documents, emails, and other files from your computer… or any other internal / external / portable media like hard drive, SD card, microSD card, memory card, USB devices, etc. Get it now. Read more at Free Tenorshare Any Data Recovery Pro (100% discount) - SharewareOnSale
  9. Nytro

    Card PIN. Wtf?

    Aveti grija.
  10. Despite anti-skimmer ATM Lobby access control system available in the market, we have seen a number of incidents in recent years where criminals used card skimmers at ATM doors. Few years back, cyber criminals started using card skimmers on the door of the ATM vestibule, where customers have to slide their credit or debit cards to gain access to the ATM. The typical ATM Skimming devices are used by fraudsters capture both magnetic stripe data contained on the back of a debit or credit card as well as the PIN number that is entered by the customer when using the ATM. In recent case discussed by Brian, cyber criminal installed the card skimming device on the ATM Lobby Card Access Control and a pinhole hidden camera pointed at the ATM's keyboard. Basically, it's an ATM skimmer that requires no modification to the ATM. The card skimmer hidden on the ATM door records the debit and credit card information, and the pinhole camera records the PIN number the victim enters. Using this information, a thief can easily run you out of cash in a matter of minutes. PROTECT YOURSELF FROM CARD SKIMMERS The easiest way to protect yourself is simply to cover the keypad with your other hand when you enter your PIN or simply use a different card (any gift card or store card with a magnetic stripe) to open the lobby doors. Also, if keyboard of the ATM looks different, do not use that ATM. If you think your password or PIN has been compromised, change it immediately. Make sure to check your financial reports regularly and for any strange activity and in case of unusual patterns of transactions, inform your bank immediately. NEXT GENERATION CARDLESS ATMs To ensure users secure transaction over ATM, a Canadian bank have come forward to adopt and launch the U.S.'s biggest cardless ATM network that allows its customers to withdraw cash within seconds without the need of any debit or credit cards, but only their smartphones. BMO Harris Bank says there is no need to enter PIN and instead of swiping the card, customers have to sign into mobile banking app "Mobile Cash", hold their smartphones over the QR code on the ATM screen and the cash gets delivered. Source
  11. Cisco on Friday shared details on what the company says is new breed of Point-of-Sale (PoS) malware that is more sophisticated and much better designed than previously seen PoS threats. Dubbed “PoSeidon” by Cisco, the malware has some resemblance to ZeuS and uses better methods to find card data than BlackPoS, the malware family reportedly used in the 2013 attack against Target and against Home Depot in 2014. According to Cisco, the malware scrapes memory to search out number sequences that specifically match up with formats used by Visa, MasterCard, AMEX and Discover, and goes as far as using the Luhn algorithm to verify that credit or debit card numbers are valid. “PoSeidon was professionally written to be quick and evasive with new capabilities not seen in other PoS malware,” members of Cisco’s Security Solutions team wrote in a blog post. “PoSeidon can communicate directly with C&C servers, self-update to execute new code and has self-protection mechanisms guarding against reverse engineering.” Some components of PoSeidon are illustrated in the following diagram created by Cisco: PoSeidon PoS Malware Features “At a high level, it starts with a Loader binary that upon being executed will first try to maintain persistence on the target machine in order to survive a possible system reboot,” Cisco’s team explained. “The Loader then contacts a command and control server, retrieving a URL which contains another binary to download and execute. The downloaded binary, FindStr, installs a keylogger and scans the memory of the PoS device for number sequences that could be credit card numbers. Upon verifying that the numbers are in fact credit card numbers, keystrokes and credit card numbers are encoded and sent to an exfiltration server.” The Keylogger component was potentially used to steal passwords and could have been the initial infection vector, Cisco said. Upon being run, the Loader checks to see if it’s being executed with one of these two file names: WinHost.exe or WinHost32.exe. If it is not, the malware will make sure that no Windows service is running with the name WinHost. Loader will copy itself to %SystemRoot%\System32\WinHost.exe, overwriting any file in that location that would happen to have the same name. Next, Loader will start a service named WinHost. According to Cisco, this method allows the threat to remain running in memory even if the current user logs off. If the Loader is not able to install itself as a service, it will try to find other instances of itself running in memory and terminate them. Once installed, the Loader attempts to communicate with one of the hardcoded C&C server and Associated IP Addresses: Domains Name Associated IP Addresses linturefa.com xablopefgr.com tabidzuwek.com lacdileftre.ru tabidzuwek.com xablopefgr.com lacdileftre.ru weksrubaz.ru linturefa.ru mifastubiv.ru xablopefgr.ru tabidzuwek.ru 151.236.11.167 185.13.32.132 185.13.32.48 REDACTED at request of Federal Law Enforcement 31.184.192.196 91.220.131.116 91.220.131.87 Once captured, PoSeidon exfiltrates the payment card numbers and keylogger data to servers, after being XORed and base64 encoded. Most of the command and control servers are currently hosted on .ru domains, Cisco said. Some of the known domains used for data exfiltration servers include: • quartlet.com • horticartf.com • kilaxuntf.ru • dreplicag.ru • fimzusoln.ru • wetguqan.ru Other domains and IPs that could indicate a compromise include: • linturefa.com • xablopefgr.com • tabidzuwek.com • linturefa.ru • xablopefgr.ru • tabidzuwek.ru • weksrubaz.ru • mifastubiv.ru • lacdileftre.ru • quartlet.com • horticartf.com • kilaxuntf.ru • dreplicag.ru • fimzusoln.ru • wetguqan.ru IP Addresses: • 151.236.11.167 • 185.13.32.132 • 185.13.32.48 • 31.184.192.196 • 91.220.131.116 • 91.220.131.87 “PoSeidon is another in the growing number of Point-of-Sale malware targeting PoS systems that demonstrate the sophisticated techniques and approaches of malware authors,” Cisco’s Security Solutions team noted. “Attackers will continue to target PoS systems and employ various obfuscation techniques in an attempt to avoid detection. As long as PoS attacks continue to provide returns, attackers will continue to invest in innovation and development of new malware families. Network administrators will need to remain vigilant and adhere to industry best practices to ensure coverage and protection against advancing malware threats.” In its annual Global Threat Intel Report, security firm CrowdStrike noted that criminals have been increasingly turning to ready-to-use PoS malware kits in the cyber-underground. According to Adam Meyers, vice president of intelligence at CrowdStrike, the price of these kits varied depending on their complexity, with some going for tens of dollars and others costing in the hundreds or thousands. In its report, CrowdStrike explained that the explosion of PoS malware may be mitigated by the adoption of EMV standards (Europay, MasterCard and Visa) as well as the growth of payment options such as Google Wallet and Apple Pay. Other point of sale malware used in recent attacks include vSkimmer, Dexter, Backoff, LusyPOS and Dump Memory Grabber, among others. In December 2014, researchers at Trend Micro came across a sample of a new PoS malware called “Poslogr” which appeared to be under development. Source
  12. https://cloud.google.com/ E nevoie de card bancar valid insa costul e 0. 300 usd de cheltuit in 60 zile Cu cat consumati mai mult cu atat se duce mai repede creditul si va trage de pe card. Morala: tineti geana pe cat consumati zilnic si dati cancel inainte sa va traga bani.
  13. Product Description Losing important photos only happens when you don’t prepare well. It is really frustrating. Fortunately, we have Tenorshare Photo Recovery. It provides you a quick and efficient file recovery solution to recover photos, videos, audios and other files from computer and other storages devices, including SD card, digital camera, mobile phone, USB flash drive and more. Recover photos, as well as other files like videos, songs, emails, ZIP files, etc. Recover from hard drive and all portable devices Recover files lost due to any loss situation Preview before recovery and keep only the ones you need Recover Photos in Variety of Types Recover pictures in all popular formats, like JPG, PNG, PSD, GIF, RAW and etc. Get back lost photos shots by any camera brand, such as Cannon, Nikon, Sony, JVC, FujiFilm, and so on. Retrieve deleted photos on your Samsung, HTC, LG, Motorola, and other Android phone or Windows phone. Supports all memory cards, including SD card, CF card, XD card, and etc. All-inclusive File Recovery Besides photo recovery, this photo recovery software is capable of recovering videos, music, and other files like emails, archives, and much more. Recover files that you accidently deleted. Recover files from formatted, corrupted, or damaged partition or device. Preview before You Recover Preview photos in advance to confirm whether they are indeed your need. Pre-listen your lost music with a built-in audio player. Recover More Easily To filter file types for scanning help you restrict the scan to just the ones you need. It saves you a lot of time. It is flexible to pause or continue photo recovery during scanning. Support Wide File Systems It supports all file systems including HFS, HFS+, FAT, NTFS, EXT2, EXT3. Scan Faster Its unique algorithm eases the photo recovery scan and shortens scan time. Work on all Windows OS It supports the latest Windows 8.1, as well as Windows 8/7/XP/Vista. 100% Success Rate You can recover every file that was lost from your computer, or other medium. File Types Supported: Image JPG, BMP, TIFF (TIF), GIF, PNG, PSD CRW,CR2, NEF, ORF, RAF, SR2, MRW, DCR Video AVI, MP4, MOV, M4V, 3G2, 3GP, WMV, ASF, FLV Audio AIF ( AIFF), WAV, MP3, M4A, WMA, MID (MIDI) Document DOC/DOCX, XLS/XLSX, PPT/PPTX, PDF, CWK, HTML/HTM, INDD, EPS, etc. Email PST, DBX, EMLX, etc. Achieve IP, RAR, SIT, etc. File System Supported: HFS, HFS+, FAT, NTFS, EXT2, EXT3 Devices Supported: Memory card SD, CF, MMC(MultiMedia Card), XD Picture Card, SDHC, MicroSD, MiniSD, etc. External hard drive WD, Seagate, Maxtor, Hitachi, Samsung, etc Digital camera/camcorder Nikon, Canon, Kodak, Samsung, Sony, Panasonic, JVC, FujiFilm, etc. Cell Phones Samsung, HTC, Motorola, LG, BlackBerry, Sony Ericsson, Nokia, etc. Others Pen Drive, Floppy Disk, Zip Disk , USB Drive, Music Player, memory stick, etc. -> Download <-Deal Expire in: EXPIRED!
  14. Salut vreau sa trimit si eu o plata si nu imi mai da voie. Cand dau continue pentru a trimite plata imi spune: "To pay, add a debit or credit card to your PayPal account.". Eu nu am momentan nici un card si trebuie sa ii dau neaparat cuiva niste bani pe paypal. Am incercat si sa platesc pentru servicii si pentru familie/prieteni dar tot lafel imi zice. I-am contactat astazi pe cei de la paypal dar ei spun ca in maxim 24h o sa ma contacteze si nu pot sa astept atata timp. Va rog frumos daca aveti o idee cum pot rezolva asta mai rapid. Multumesc!
  15. Am un gift card de 10$ si as vrea sa fac un schimb , fie 10$ Steam fie un purchase pe g2a care e aprox 7.20$ gen , Nu am console si nici nu ma gandesc sa-mi iau una prea curand , Daca e interesat cineva PM Dat fiind faptul ca incerc sa fac un trade intre romani , Nu dau primu.
  16. Breach Notification refers to the notification that businesses, government agencies and other entities are required by law in most states to do when certain personally identifiable information is obtained or believed to have been obtained by an unauthorized party. The breach can occur when a system is hacked or when a device containing sensitive information is lost, stolen or inadvertently sold. Personally identifiable information, also known as PII, is information that on its own or in conjunction with other information can be used to identify a person—the latter can include, for example, a name combined with a Social Security number, driver’s license number, bank account or credit card number. The first state breach notification law was passed in California in 2002 and went into effect the following year. Among the first breaches reported under the new law occurred in 2004 when a bank card processing company CardSystems Solutions was hacked. CardSystems Solutions processed purchasing transactions for its retailer customers by sending the card account data to the correct bank or issuer for authorization. Some 263,000 card numbers were verified stolen in the hack, but nearly 40 million card numbers were exposed to the hackers. The data involved card transactions that CardSystems had retained on its system long after the transactions were completed and that had been stored in an unencrypted format. The breach began in September 2004 but wasn’t discovered until May 2005. It was the first major breach disclosed under the new California law. Also among the first companies disclosing a breach under the new law was Choicepoint. The data broker sent letters to 145,000 people in February 2005 notifying them that it had mistakenly sold personal data about them to identity thieves. ChoicePoint was in the business of collection financial, medical and other information on billions of people in order to sell it to other marketers, other businesses and government agencies. The thieves had posed as legitimate businesses to open customer accounts with the massive data broker, then subsequently succeeded to purchase Social Security numbers, credit histories and other information that ChoicePoint had collected on them. Since the California law was passed, another forty-six states and the District of Columbia have passed similar legislation. Alabama, New Mexico and South Dakota do not have breach laws. This patchwork of laws has resulted in uneven and confusing requirements for businesses with customers in multiple states. The laws vary on a number of things, including when notification needs to occur, how notification should occur and exemptions from notification. Federal lawmakers have been trying for years to remedy this confusing patchwork of laws by passing a federal law that would take precedent over all of them. But the proposed bills have failed to take hold on Capitol Hill. President Obama and the White House began pushing another bill in January 2015 that would require breached entities to notify affected victims within 30 days of discovering the breach, though critics say this renewed push for a mandatory notification period will likely suffer the same problems previous bills had. Source
  17. Hallmark Card Studio Deluxe (2013) DVD Hallmark Card Studio Deluxe (2013) DVD Hallmark Card Studio Deluxe (2013) DVD -SoSISO | 7.24 GB After Extract The 1 Greeting Card Software for Over 10 Years For more than 100 years, Hallmark has designed greeting cards for lifes special moments. Hallmark Card Studio 2013 Deluxe extends this tradition, making it easy to create one-of-a-kind Hallmark cards as unique as the people you care for. From birthdays and holidays to special occasions and every day greetings, youll find the perfect card for virtually any occasion. But cards are just the beginning. Bridge the miles between family and friends with photo cards in a variety of new sizes, postcards, stationery sets and party invitations - all customized with your heart-felt message. Its easy with exclusive Hallmark writing tips and ideas included right in the software! Plus, using the built-in Digital Photo Editor, you can easily crop, fix, and apply special effects to photos before adding them to calendars, scrapbook pages and award certificates. Then simply print, email or share on Facebook and other popular social media websites! With 13,000+ designs, 18,000+ premium graphics, 10,000+ sentiments, exclusive fonts, an Event Planner and much more, the creative possibilities are endless. Its amazing what you and Hallmark can do together! PRODUCT HIGHLIGHTS More! 13,000+ Hallmark Greeting Cards and customizable projects for all occasions More! 10,000+ Spectacular Graphics to complement your designs More! Hallmark sentiment library with 10,000+ sentiments New! User Interface - find the right card faster and easier than ever before Enhanced! Matching Envelope Library automatically displays more coordinating card envelopes Built-in Digital Photo Editor helps you fix photo flaws and apply special effects New! Gift Bags, Collages and Holiday Newsletters design projects Search projects easily by design theme or occasion Milestone Birthday and Holiday Photo Card collections Easy integration with Facebook and other social networks Enhanced! Hallmark Graphics Collection with even more images Designs for Photo Cards, Calendars, 3D Cards & 3D Projects and more Writing Etiquette Guide with writing tips and ideas from Hallmark A video tutorial gets you started fast SYSTEM REQUIREMENTS Windows XP, Vista, 7 or 8 Intel Pentium 4 or faster 512 MB RAM DVD Drive Color Printer Internet Connection Required to Use Download Version DOWNLOAD LINKS: http://u19822771.letitbit.net/download/11843.163649c7ccd56e7ec1d25b9d9645/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part1.rar.html http://u19822771.letitbit.net/download/47762.467fa1dae1ea0f14246b21e86b9d/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part2.rar.html http://u19822771.letitbit.net/download/91595.93cdca113d0f5663d5b01c74ce72/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part3.rar.html http://u19822771.letitbit.net/download/29501.232931c36db50ea1c69ca99e2960/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part4.rar.html http://u19822771.letitbit.net/download/65041.608948cfde1223b57c38d5d87c48/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part5.rar.html http://u19822771.letitbit.net/download/23947.22dce223783233151eac5aacb13f/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part6.rar.html http://u19822771.letitbit.net/download/35464.3fab8629ab7304d4e2e2a54ee015/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part7.rar.html http://uploaded.net/file/h8bd7nut/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part1.rar http://uploaded.net/file/5mlfb3ts/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part2.rar http://uploaded.net/file/5dsm2d3d/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part3.rar http://uploaded.net/file/huhxnaup/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part4.rar http://uploaded.net/file/2uumng0g/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part5.rar http://uploaded.net/file/debynfpj/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part6.rar http://uploaded.net/file/4z2l7chr/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part7.rar http://rapidgator.net/file/a11d7b5a2b1ff9f9ce1c846ed8d80932/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part1.rar.html http://rapidgator.net/file/7b8ecb492a57c0f6b092066baf0b32e6/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part2.rar.html http://rapidgator.net/file/255417c52056f91d750a1d391f4563e5/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part3.rar.html http://rapidgator.net/file/509268f23dcfd3308b91778a16c991ae/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part4.rar.html http://rapidgator.net/file/23796bda753a9414639fca4e3935fee4/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part5.rar.html http://rapidgator.net/file/fd41ab5fede007163e01ed458b2adea2/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part6.rar.html http://rapidgator.net/file/9ca0342e0f679cdd9be272726e86dc12/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part7.rar.html http://www.uploadable.ch/file/6QdRYzpPddcQ/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part1.rar http://www.uploadable.ch/file/QAZfAzWPW7c2/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part2.rar http://www.uploadable.ch/file/vFH58YFPBbFV/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part3.rar http://www.uploadable.ch/file/tv9BbMZbRvxx/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part4.rar http://www.uploadable.ch/file/m8P85aaC4R9Q/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part5.rar http://www.uploadable.ch/file/ZdUfGQ4nsPWr/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part6.rar http://www.uploadable.ch/file/mfXvceanBuPF/26.Hallmark_Card_Studio_Deluxe_2013_DVD.part7.rar
  18. Salut tuturor . Va intreb pe voi poate stiti mai bine, daca detin numarul de card, Cvv, data exipare , nume prenume de la un card Bancomat, pot cumpara online? Sau cel putin cum pot transfera banii? Va multumesc anticipat><
  19. sau mai bine zis cu un telefon. inca nu stiu sigur. pana acum cateva zile, daca puneam phoneul la comp si puteam sa citesc datele de pe card. ACUM nu mai pot. rulez windows xp pro sp1. am incercat chiar si cu un update la driver`urile de la usb ... un reset la telefon, un add hardware wizard.. cam de toate. are cineva idee cam ce anume ar putea fi ? maine o sa incerc sa schimb si cablul de date. poate e de la el, desi telefonul mi se incarca. nu. nu am un card reader si nici nu vreau sa formatez cardul. later edit : poate fi softul, intrucat am dat peste o problema asemanatoare ridicata de un alt utilizator . multumesc.
×
×
  • Create New...