European hackers are targeting ATM machines that run on Windows XP with a new malware program that provides full access to a user’s pin codes and other personal data.
Trustwave’s SpiderLabs analyzed the unique malware program discovered in nearly 20 ATM machines in Eastern Europe and have never seen anything like it. All of the infected machines were found to run on Windows XP.
The hackers used a simple dropper file to install and activate the malware virus. A dropper file is a tiny infected, standalone program that drops a virus into a system. One the dropper installs and activates the malware program; the hackers obtain full access to the private memory space of all of the transaction-processing applications on ATMs.
The malware program works by capturing the magnetic strip data and PIN codes. The cyber crooks then access the personal data by inserting a specially designed card into the ATM, where they can pull up their own customized user interface.
Once this occurs, the hackers have effectively hijacked the ATM and you can say goodbye to your money.
Cyber security experts have issued previous warnings to banking institutions regarding the risk of using a Windows based system to run ATM machines. Some have even called the practice stupid.
Many ATMs now run Windows operating systems connected to a large group of servers over an IP network, exposing personal data to theft, and denial of service attacks.
Many systems don’t even encrypt data as it travels through the network, exposing card numbers, card expiration dates, transaction amounts, and account balances in plain text, making it easy for determined cyber crooks to harvest customer’s data.
The virus experts of SpiderLabs believes the cyber crooks are using Eastern Europe as a testing ground for their malware program, before they launch the virus to infect ATMs in the United States and other countries.

















In the above picture you can see is a cardboard plate. Actually when you crack it from the dotted lines the USB sticks get detached, this is an excellent way to package them as its very portable. It would be interesting to see other more useful and innovative recycle ideas.
Features:


















Complex ear reshaping surgeries take more time for completion and involve a bit of risk too. The surgery can be performed in two ways, one way is to make an incision and the other way is to perform the operation without any incision. One sided incision can be applied on the flatter side of the cartilaginous part of the ear and then the entire cartilage can reshape along the incision. The incision less ear surgery is done by a needle which marks the areas along which the cartilage will re grow.



