2014/02/28

CIA chief says internet-connected appliances are ‘worrisome’ new threat | foodonia

CIA Director John Brennan says that connected appliances and networked vehicles will make the agency’s job harder – with more systems to protect, and more platforms which could be used to launch attacks.


Network World reports that Brennan, speaking at President Barack Obama’s Associates Dinner at the University of Oklahoma said that cyber issues were becoming increasingly central to the CIA’s mission, and that Brennan said, “We also are concerned that new vulnerabilities will develop as cars, home appliances, and other physical objects become more integrated into information networks.”


“As we move closer to what some are calling an “Internet of Things,” there will be more devices and systems to protect—and, equally worrisome, more that can be used to launch attacks.”


As part of a wide-ranging speech, Brennan said that the rapid pace of change in technology made the job of the CIA “challenging”. The CIA’s official transcript of the speech can be read here.


“Cyber security was part of my portfolio when I served at the White House, and I must admit that after a while, just hearing the word “cyber” was enough to make my head hurt,” Brennan said.


“Part of what makes cyber so challenging is that technology is changing so rapidly—and society along with it,” Brennan said,. “In many respects, the world is transforming itself before our eyes, as more and more human activity migrates to the Internet.”


“This has profound implications not only for how each of us conducts our daily lives, but also for the way CIA carries out its mission. Terrorists, criminal networks, weapons proliferators, state actors—all of them are entrenched in the digital domain.”


Various cases have shown that devices belonging to the so-called ‘internet of things’ are vulnerable – this month, it was revealed that Belkin’s WeMo home automation systems contained multiple vulnerabilities which could allow attackers to remotely control devices attached to a WeMo system – for instance, blacking out lighting in a home, or remotely monitor devices such as security cameras, as reported by WeLiveSecurity here.


Several security researchers have shown off ‘hacks’ which can remotely take over the software in vehicles – and CNBC described such attacks as potentially forming a new “global cybercrime wave.”


At this year’s Consumer Electronics Show (CES) in Las Vegas, ‘smart homes’ were clearly a big trend on the show floor – and much debate was ignited about their security.


The normally sober BBC warned, “In the future, it might not just be your smartphone that leaks personal and private data, it might be your smart fridge too.”


But ESET Senior Research Fellow David Harley said in a commentary post at the time, “It may be a little early to worry too much about what your fridge or your medicine cupboard is able to reveal to a hacker about your eating habits and the state of your health,” Harley says.


“After all, there are all too many more direct ways for retailers, insurance companies, and pharmaceutical companies to get that sort of information. (And those are issues more people should be worried about.)”



The post CIA chief says internet-connected appliances are ‘worrisome’ new threat appeared first on We Live Security.






Brought by: http://foodonia.com

Smells phishy? New email scams – and why smartphone users need to stay alert | foodonia

Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility.


This means that devices users often think of as ‘immune’ to cyber attacks – such as smartphones – are in fact the perfect vehicle for phishing attacks.


Phishing attackers will select the easiest, cheapest method to steal the information they need. This could be using a malware-laced attachment to steal a password using a keylogger – or enticing the victim to hand it over willingly, by entering details on a bogus site.


Attacks such as the defacement of the New York Times’ website, where the entire site vanished to be replaced by the name of a hacker group, began with one person opening an email they should not have. The Target breach, where 40 million credit cards leaked, began with a phishing email targeted at an air-conditioning contractor who worked with the retail chain.


Consumers are affected as much as large organizations – in this year’s Microsoft Computer Safety Index Survey, polling 10,000 consumers, 15% said they had been victims of phishing, losing on average $158 each.


Some phishing emails are still comical – ESET’s David Harley reports a “419 scam” email with the message, “I have a project. If interested. Reply”, and no text in the body. Many, though, are highly professional and may seem to come from friends. Our tips should help you avoid taking the bait.


Phishing emails can affect you on any device


Phishing attacks don’t always depend on the victim clicking on a malware-infected link – often they’ll be directed to a bogus page which will ask for passwords and user details. This means that no system is immune – whether you’re accessing the web from a PC, a Mac, or a mobile device – whether it’s an Android device or an iOS one. If you type in your details, the cybercriminals can access your account – whether it’s a bank account or an iTunes one (with credit card attached). Describing one recent reported scam targeting Apple users, ESET Senior Research Fellow David Harley writes, “Victims are directed, via spam messages apparently from Apple, to sites that are crafted to resemble real Apple sites, festooned with links to real apple.com pages and objects. The criminals who set them up are clearly interested in iCloud and iTunes contents and credentials, and of course the credit card details associated with those services.” Harley adds, “However effective an operating system’s technical defences are, there are always ways of bypassing them by hacking the victim rather than the device.”


Some phishing emails are cleverer than others


Emails purporting to come from your bank are often crude, asking you to confirm a password (something your bank will NEVER do) – but some use clever tricks to look believable. For instance, some scam emails forwarded to ESET’s Threat Radar offer the customer a ‘Yes’ or ‘No’ choice relating to recent transactions or a change in contact details – with links offering the choice, ‘Yes, I made this request,’ or ‘No I did not,’ as reported by ESET Senior Research Fellow David Harley in a series of posts on new phishing techniques. This echoes the language used in security phone calls – but of course, both links are bogus. And sometimes they don’t even bother to make the links different!


It’s easy to hand phishers the bait they need to make you a victim


If you work within a company that’s a high-value target, you should ensure that your details remain private – otherwise phishers can craft targeted attacks which sound legitimate. Last year, an electricity company was targeted with a polished spear-phishing attack, as reported by We Live Security here. The attack used a published list of attendees at a committee meeting to target employees with a malware-infected phishing email. The company site had listed the email addresses and work titles of everyone at a meeting – which was enough information for cyber-criminals to craft a convincing-looking tailored attack directed at the company, via the Inboxes of everyone attending the meeting.


Don’t click links in bank emails – even if the email looks real


Your bank will almost certainly not email you a link to their web address in any communication – so the appearance of such links is a ‘red flag’ indicating that an email’s a fake. ESET’s David Harley says, “We’d always advise that even if a login link looks OK, it’s safer to go through a URL known to be legitimate, not the one that’s given in an email. Unless, at any rate, you have no doubt at all that the email is genuine (like one you’ve verified with the sender by other means). And in general, any email apparently requiring you to click on a link in the message in order to log in to your account is either fake or sent by a bank that knows so little about phishing that you probably ought to consider banking elsewhere.”


If you are not addressed by name, it’s probably a fake


Cybercriminals have got much better at using convincing logos – and even mimicking the language of banks and other institutions. One recent example, supposedly from Barclays, sounds highly convincing to begin with, “We need your help resolving an issue with your account. To give us time to work together on this, we’ve temporarily limited what you can do with your account until the issue is resolved. We understand it may be frustrating not to have full access to your Barclays account. We want to work with you to get your account back to normal as quickly as possible.” All very persuasive. But if the email has been sent out as part of a mass spam campaign, it won’t be addressed to you – instead, it will begin, ‘Dear Customer’ or something similar. This is a near-certain sign that you’re dealing with a phisher – or a company too ignorant of security to be worth having anything to do with…


Telephone numbers aren’t a guarantee an email is real


Do not trust professional-looking emails where there is a phone contact number – this can be another cybercriminal trick. The number may well work, but you will be connected to a scammer instead of the company you’re hoping to speak to – and they will attempt to fool you into handing over further details.


If your IT department emails, they won’t need you to ‘confirm’ your password


Targeted “spear phishing” attacks can appear to come from your own IT department – or from business contacts, or senior managers within your organisation. Be wary. If a web link from your IT department suddenly asks for your login details or password, don’t enter them – it’s a common scam used by cybercriminals to penetrate business systems. Phone your IT department and ask if it’s real – they will thank you for it.


Be wary of unexpected good news


Cybercriminals disguise their attacks as everything from wedding invitations to tax rebates – with rebate emails timed to coincide with local tax deadlines. This tactic appears to be growing in popularity, with a wave of highly convincing emails sent out in Britain this year – 50% more than the previous year’s total, as reported by We Live Security here. Tax authorities tend to communicate via post to prevent fraud. Gareth Lloyd, HMRC’s head of digital security, said: “HMRC never contacts customers who are due a tax refund via email – we always send a letter through the post.” For a more in-depth article on tax scams, read the January Threat Report.


The post Smells phishy? New email scams – and why smartphone users need to stay alert appeared first on We Live Security.






Brought by: http://foodonia.com

2014/02/26

الدوناتس الروسي | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

الدوناتس الروسي | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 35 دقائق | وقت الطهي: 20 دقائق كوبان ونصف الكوب من الدقيق (الطحين) بيضة واحدة ملعقة صغيرة من الخميرة ربع كوب من الزيت ملعقة صغيرة من السكر ربع ملعقة صغيرة من الملح كمية …

اقرأ المزيد: الدوناتس الروسي



المصدر: http://foodonia.com

كريب بالموز والقشدة | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

كريب بالموز والقشدة | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 20 دقائق كوب ونصف الكوب من الدقيق ملعقة طعام من السكر نصف ملعقة صغيرة من الباكينغ باودر ربع ملعقة صغيرة من الملح كوبان من الحليب ملعقتا طعام من …

اقرأ المزيد: كريب بالموز والقشدة



المصدر: http://foodonia.com

U.S. businesses boost cyber defenses as they brace for more Target-style attacks | foodonia

Businesses in America have increased security spending in the wake of the spate of high-profile cyber attacks against businesses in the U.S. late last year, including the Target breach, which leaked 40 million credit card details. Most U.S. businesses (82%) now expect this sort of highly targeted attack to increase over the next two years, according to a new survey.


The survey, involving interviews with IT decision-makers in industries ranging from mining to law, found that companies already spent an average of 15% of their IT budget on improving security – and that figure looks set to rise, according to a report by news agency Reuters.


Defense Talk said that the survey, conducted by BAE Systems Applied Intelligence, showed that companies had changed policy in the wake of the attacks. Nearly two thirds (60%) said that they had increased spending on cyber security – and others planned to increase their budget within the next 12 months, citing the recent attacks as having influenced their decisions.


ESET researcher Lysa Myers says, “It is entirely possible for businesses to better protect their customers against this sort of breach. The protective technology and techniques exist already, and some organizations are already putting them to good use. But a surprising number are not, yet.” Myers offers a myth-busting guide to the Target breach - including tips for businesses on how to prepare for such attacks.


Companies rated loss of customer data as their greatest concern, followed by loss of trade secrets and damage to reputation, according to the survey, carried out by British defense firm BAE Applied Intelligence. The survey polled 300 firms in the U.S., and others in Canada, Australia and the UK. Nearly a third of IT staff in America estimated a successful attack could cost their company up to $75 million.


More than two-thirds (71%) of those surveyed said that new technologies such as mobile devices posed threats to their businesses’ security – but only 61% said they understood those risks. More worryingly, 31% of respondents in the U.S. believed that their company’s Board of Directors still failed to grasp the extent of cyber risks, according to Business Insurance.


The report said, “There is still a potential danger of lack of real action at board level. This suggests that the challenge may still often be seen as a technology problem alone, rather than something that must be tackled at CEO and board level.”


Businesses are also keenly aware that the main threat comes from “organized groups of fraudsters” rather than rogue individuals, hacktivists, or other groups, especially among American companies, with 52% of U.S businesses naming such groups as the most likely to mount attacks, according to MarketWatch.


“What this research clearly shows is that U.S. businesses are increasingly aware of the cyber threat and have a range of counter measures in place,” said Martin Sutherland, managing director, BAE Systems. “However, digital crime as a whole a dangerous combination of organized groups of criminals using cyber techniques to carry out financial crime is also a major concern, particularly since the most recent wave of high-profile attacks.”



The post U.S. businesses boost cyber defenses as they brace for more Target-style attacks appeared first on We Live Security.






Brought by: http://foodonia.com

سلة الكريب بالفاكهة الحمراء. | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

سلة الكريب بالفاكهة الحمراء. | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 25 دقائق | وقت الطهي: 15 دقائق الكريب كوب وربع الكوب من الدقيق (الطحين) العادي رشة ملح بياض بيضتين كوب من الحليب المقشود ثلثا الكوب من عصير البرتقال رذاذ زيت لدهن الصينيةللحشوة 4 …

اقرأ المزيد: سلة الكريب بالفاكهة الحمراء.



المصدر: http://foodonia.com

فطائر الفاكهة سهلة التحضي | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

فطائر الفاكهة سهلة التحضي | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 0 دقائق 5 قطع توست متوسطة الحجم450 جرام خوخ محلى450 جرام فراولة مجمدة غير محلاة (مصفاة)كوب ونصف عصير فراولة طازجة300 جرام برتقال ويوسفي، (مقطع)حبتا تفاح مفريحبتا موز(مقطعة شرائح) …

اقرأ المزيد: فطائر الفاكهة سهلة التحضي



المصدر: http://foodonia.com

BlackBerry security revisited: How do the BB10’s stack up? | foodonia

Following the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now, and more specifically how they compare to last generation BlackBerry offerings which you may have found functional, if slightly dated and clunky.


Long lauded among stiff government security office types for being less security-breakable, the last generation of BlackBerry doo-dads garnered top marks from even some of the topmost brass in the U.S., favoring them over (almost) all else.


But that was several years back (practically decades in tech-years), and now even if you HAVE to have the app du jour with the dancing bunnies, will the new BlackBerry Z10/Q10 platforms fulfill your tech lust and yet securely watch your back?


BlackBerry hoped so, in fact they bet the company that a ground up rethink would tantalize the marketplace to jump back on the BlackBerry (er, Crackberry as addicts admit) bandwagon and have the masses singing their praises in short order.


But in the past years, the other folks in the marketplace have gotten little sleep, swarming to close the gap on security, trying to chip away at the perceived BlackBerry lead. So here’s what BlackBerry really did with this forklift overhaul of the stack, and what it means to you.


Ground up Redux


Betting that a ground up rework should start with a ground up OS rethink, the BlackBerry Limited folks (a rebirthed Research In Motion, or RIM) went to bare metal. Reinvisioning the new BlackBerry 10 operating system from experience gained from the older BlackBerry OS versions 1.0 through 7.1 and the acquisition of QNX, a real-time microkernel based Unix-like construct, they set to work.


Reimagining major chunks of the whole stack is not for the faint-at-heart, and certainly not for those who value sleep anytime soon. Still, aiming the company’s future at a newer, more robust (and arguably more secure) OS seemed a necessary, if difficult, way forward for the company attempting to swashbuckle its way back to center stage of the smartphone vanguard, albeit it with a security leaning in hopes of staying true to its core fan base.


Starting with a microkernel, aside from igniting techno-lust from fellow bare metal kernel freaks, is a nice way to isolate processes into tidy containers that can become pseudo-suspicious of each other, and therefore form the foundation for a stack of compartmentalized processes that follow the same model.


And QNX is no slouch here, a long tested real-time OS platform that has performed well for longer than some of BlackBerry’s engineers have probably been alive. And when an OS has had more than a couple decades to sort itself out and still trudges forward, it’s easy to have faith in the tiny, tested platform.


Shiny buttons = market share


In the North American market at least (and probably much of the rest of the markets BB is interested in re-courting), perception is reality. The average visitor to the mobile phone vendor in the mall doesn’t have the slightest idea if their phone has a kernel at all, let alone a micro one. So then BlackBerry would have to apply shiny blinky lights and buttons that felt amazing to even have a chance of getting this pile of technology in your shirt pocket. So while they redesigned the guts, a parallel group of people sat in other buildings working out how a button should “feel” if it is to become considered “elegant” and “pop”, whatever those terms mean to people who understand what “pop” is. But those people are the ones who buy smartphones and to them, texting and tweeting are as important as isolating mutually suspicious system processes is for us security types.


Somewhere there has to be an intersection of tech whiz-bang and shiny buttons if the platform is to succeed, and so BB attempted to join the two. How did they do? The verdict is still out, though slow sales are certainly the bane of corporate bean-counters and harbingers of the long slog that may be involved. Still, when’s the last headline you’ve seen of the BlackBerry 10 (or other BlackBerry platforms) being hacked? Me neither.


Containerizing your life, BlackBerry style


Admitting that many users lead parallel lives, BB containerized a work and non-work walled garden through “BlackBerry Balance”. Here, BlackBerry built it into the OS, so you don’t have to “bolt something on” to make it work. This feels like a more secure construct than an app-based afterthought.


They did this by separating the presentation and data layers, so while you can view both your work and personal emails on the BlackBerry Hub, you can’t cut-and-paste (for example) between your corporate account and personal email, a handy way to narrow down the leak potential between the two. There’s also a remote wipe feature, so if your employees use their own devices and this feature, you can retain control over sensitive corporate data if needed. And if they leave the company, you can wipe company data only, and leave their other “stuff” in place like friends’ endless LOL chatter. Oh, and there’s a pretty button to help end-users understand the boundary between business/personal data.


App Permissions


While most of the friends and family I know simply click on security warnings on their smartphones until they go away, the BB 10 has a fairly granular system of permissions which you can set, revoke, and tune at will. You also can control what information gets transferred across the Internet, or through Bluetooth communication, which could be very helpful.


Security in General


We talk a lot these days about securing the person, not the device. This is because a well-implemented secure-ish device typically has a wide open front door if there’s no password, weak password, or a host of other user-induced security holes. To that end, BB has a quick summary on their website for how to secure the human, which is nicely de-geekified for the average non-geek human. So make sure you set the correct permissions on yourself before setting to work on your BB 10 device.


Will bad guys attack you still?


Maybe, but scammers typically attack the most high value targets with the least amount of effort required on their part. This value proposition skews scammers heavily in favor of other platforms in today’s market. For instance, the adage that thieves want to “steal A car, not YOUR car” certainly applies here. Scammers can buy attack software suites for other platforms, I don’t know of any specifically targeted at BB 10, do you? If so, there are numerically far more for other target platforms.


Will some shady state-sponsored group this new mobile platform? That’s difficult to say, but again, the mobile ecosystem is much more widely studied for other platforms than the BB 10, so it seems likely you’d be at least slightly safer.


Conclusion


While there are a myriad of external (and internal factors) that may control the trajectory of the BB 10 operating system and its handsets’ future adoption, the security stance seems like a good start. While the winds of the market forces will blow where they may, it’s good to know a company like this had the foresight to revamp the whole stack in a thoughtful, security-focused way, and the guts to go for it. Now it’s your turn to decide. Leave us a comment with your thoughts.


The post BlackBerry security revisited: How do the BB10’s stack up? appeared first on We Live Security.






Brought by: http://foodonia.com

فطيرة التوت والليمون | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

فطيرة التوت والليمون | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 0 دقائق كوب وربع عسلربع كوب من مربى التوت250 جم جبن كريمية فيلادلفياملعقة كبيرة من الليمونكوب لبن باردملعقتان كبيرتان من عصير الليمونكوب توتكوبان من الكريمة المخفوقةربع كوب زبدنصف …

اقرأ المزيد: فطيرة التوت والليمون



المصدر: http://foodonia.com

Mac malware spread disguised as cracked versions of Angry Birds, Pixelmator and other top apps | foodonia

Mac users are warned not to download pirated software from file-sharing peer-to-peer networks, as ESET researchers have discovered Bitcoin-mining malware being spread via cracked apps.


The malware, OSX/CoinThief, was first discovered earlier this month by researchers at SecureMac, and was found to steal login credentials related to various Bitcoin-related exchanges and wallet sites via malicious browser add-ons.


Their researchers found that the malware had been disguised as trojanised versions of Bitcoin Ticker TTM (To The Moon), BitVanity, StealthBit and Litecoin Ticker, and distributed through popular download sites including Download.com and MacUpdate.com.


However, the malware experts at ESET labs have also seen OSX/CoinThief spread through torrents as cracked versions of the following popular Mac OS X applications:



  • BBEdit – an OS X text editor

  • Pixelmator – a graphics editor

  • Angry Birds – a game of trebuchet-powered temperamental avian bombardment

  • Delicious Library – a media cataloguing application


Angry Bird, upset that people are pirating his softwareThere is clearly strong evidence that the trojan was specifically designed to profit from the current Bitcoin craze and fluctuating exchange rates.


According to detection statistics gathered by the ESET LiveGrid, the threat is mostly active amongst Mac users based in the United States.


Whether you’re a Bitcoin-enthusiast or not, it’s essential that you protect your Mac with an up-to-date anti-virus product, and resist the temptation to download cracked and pirated software.


Instead, go to a legitimate source – such as the developer’s own website or the Mac App store.


If you are unlucky enough to have been hit by the OSX/CoinThief malware on your Mac, there are some good instructions from SecureMac about how to conduct a manual removal. For more technical users, there is also a detailed analysis of the malware.


ESET researchers continue to analyse the malware, and will publish an update on We Live Security with any further developments.


Take care out there folks.


Hat tip: Special thanks to ESET researcher Róbert Lipovský for his assistance with this article.


The post Mac malware spread disguised as cracked versions of Angry Birds, Pixelmator and other top apps appeared first on We Live Security.






Brought by: http://foodonia.com

2014/02/25

فطيرة التوت بالجبن والكريم | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

فطيرة التوت بالجبن والكريم | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 40 دقائق جبنة كريم مخفوقةنصف كوب سكر بودرةنصف كوب كريمة مخفوقةفطيرةثلثا كوب سكرربع كوب نشا الذرةنصف كوب ماءربع كوب عصير ليمونثلاثة أكواب من التوت الطازجة طريقة التحضير 1- …

اقرأ المزيد: فطيرة التوت بالجبن والكريم



المصدر: http://foodonia.com

فطيرة التوت بالكسترد | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

فطيرة التوت بالكسترد | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 25 دقائق | وقت الطهي: 45 دقائق كوب من البيكينج بودرملعقة كبيرة ونصف من السكرثلث كوب لبننصف ملعقة صغيرة من الليمونكوب ونصف من التوت الطازجكوب من العنب الطازجنصف كوب من الكريمة البيضاء خالية …

اقرأ المزيد: فطيرة التوت بالكسترد



المصدر: http://foodonia.com

British Airways e-ticket malware attack launched via email | foodonia

If you have received an unexpected email, claiming to come from British Airways, about an upcoming flight that you haven’t booked – please be on your guard.


Online criminals are attempting to infect innocent users’ computers with a variant of the malicious Win32/Spy.Zbot.AAU trojan, by disguising their attack as an e-ticket from the airline.


To maximise the potential number of victims, the attackers have spammed out messages widely from compromised computers.


Malware spread via bogus British Airways email


Here’s an example of what part of a typical malicious email spread in this spammed-out campaign looks like:



From: British Airways [mailto:BA.CustSrvcs@email.ba.com]

Subject: Your Order #70391830 / 25 feb 2014


Dear Customer,


This is a confirmation that your order has been successfully processed.


Booking reference: 9C1PWF

DEPARTURE DATE & TIME / FEB 28, 2014, 11:30 AM

DEPARTING / LONDON

TOTAL PRICE / 650 GBP


The flight number and the seat number can be located in the lower part of the ticket.


An electronic copy of the ticket can be downloaded from our website :

[LINK]


For more information regarding your order, contact us by visiting :

[LINK]



Of course, although the email claims to come from British Airways – it is nothing of the sort.


In a classic example of social engineering, criminals are hoping that email recipients will worry that their credit card has been fraudulently used to purchase an air ticket, and click on links inside the email to find out more.


However, if user download the supposed e-ticket, and launch its contents they will be infecting themselves with a trojan horse that can spy on their computer activity and give malicious hackers third-party access to their data.


ESET antivirus products detect the malware as a variant of Win32/Spy.Zbot.AAU.


ESET intercepting malware spread via bogus British Airways email


Users of other anti-virus products would be wise to check that their systems are updated, and protected against the threat.


In this case, the malware has been spread via malicious links after cybercriminals forged email headers to make their messages look like they really came from British Airways’s customer service department. But it’s equally possible for attackers to spread their malware via email attachments, or for other disguises to be deployed if those behind the spam blitz believe that they have a greater chance of success.


Remember to always be suspicious of clicking on links in unsolicited emails, and the social engineering tricks that are frequently used to lure computer users into making unwise decisions.


The post British Airways e-ticket malware attack launched via email appeared first on We Live Security.






Brought by: http://foodonia.com

فطيرة التوت والخوخ | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

فطيرة التوت والخوخ | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 25 دقائق | وقت الطهي: 45 دقائق أربعة أكواب خوخ طازج مقشر ومقطع إلى شرائحكوب توت طازجثلاثة أرباع كوب سكر أبيضثلاث ملاعق كبيرة من الدقيقملعقة صغيرة من القرفة المطحونةفطيرتانملعقتان كبيرتان من الزبدملعقة كبيرة …

اقرأ المزيد: فطيرة التوت والخوخ



المصدر: http://foodonia.com

فطائر العسل والكرز | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

فطائر العسل والكرز | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 25 دقائق | وقت الطهي: 20 دقائق - دقيق‏ ‏ - ‏4 ‏ملاعق‏ ‏كبيرة‏ ‏سكر‏ ‏‏ - ‏ملعقة‏ ‏صغيرة‏ ‏بيكينج‏ ‏باودر - ربع‏ ‏ملعقة‏ ‏صغيرة‏ ‏ملح‏ ‏ - نصف‏ ‏لتر‏ ‏لبن‏ ‏رايب - …

اقرأ المزيد: فطائر العسل والكرز



المصدر: http://foodonia.com

Samsung Galaxy S5 offers fingerprint security for safe shopping with PayPal | foodonia

Samsung has introduced fingerprint-scanning security as standard into its new flagship Galaxy S5 handset – with Finger Scanner offering secure shopping via Paypal direct from the handset in stores and websites, with a finger-swipe replacing passwords. It also offers a biometric screen lock similar to that found in Apple’s iPhone 5S.


Samsung says, “Finger Scanner provides a seamless and safe mobile payment experience.” Paypal has announced that it is partnering with Samsung to use the biometric system for secure payments. The phone will not store passwords or login details, only a unique encrypted key, which is less vulnerable to theft, according to CNET’s report.


“By working with Samsung to leverage fingerprint authentication technology on their new Galaxy S5, we are able to demonstrate that consumers don’t need to face a tradeoff between security and convenience,” PayPal’s chief product officer Hill Ferguson said. “With a simple swipe of a finger, consumers can still securely log into their PayPal account to shop and pay with the convenience that mobile devices afford.”


In a hands-on test, gadget site Pocket-Lint said that the process is extremely seamless, “Once PayPal is selected as the payment method, and it recognises a user with a registered print, all it takes is a digit swipe and you’ve paid. During our hands-on with the Galaxy S5, we described the process as “scarily easy, but effective”.


The smartphone also offers an NFC chip (Near Field Communications), a technology already used in some countries for point-of-sale terminals, and Samsung promises that more payment apps are coming, using the fingerprint scanner as security, according to The Guardian’s


Samsung’s scanner is positioned under the phone’s home button, and requires users to ‘swipe’ a fingerprint across it, in the manner of a traditional fingerprint scanner, rather than Apple’s which relies on users placing a finger on it.


Analysts saw the addition of fingerprint security as a ‘premium’ addition liable to lure in customers. Ernest Doku, telecoms analyst at uSwitch, said, “”Samsung appears to have cherry picked the most crowd-pleasing features available from other manufacturers – a fingerprint ID sensor and an attractive gold model like Apple’s iPhone 5S, a water and dust-resistant body like Sony’s Xperia Z2, and photography credentials to challenge the best from


The device will be available globally in April.


A poll conducted by networks company Ericsson late last year found that consumer enthusiasm for new forms of biometric ID may well be high in 2014, as reported by We Live Security here.

Based on data from 100,000 smartphone users, nearly three-quarters of those polled (74%) believe biometric smartphones will become mainstream in 2014 – and more than half of those polled were interested in the idea of fingerprint ID replacing passwords for card purchases online (50%), and in fingerprints being used in place of all internet passwords (52%).


Demand for secure payment systems in the US may also drive sales of such devices. Breaches such as Target’s leak of 40 million credit card details have led card issuers and banks to call for a replacement for the “hugely insecure” magnetic-stripe systems used by many U.S. banks, as reported by We Live Security here.


The post Samsung Galaxy S5 offers fingerprint security for safe shopping with PayPal appeared first on We Live Security.






Brought by: http://foodonia.com

راس الحانوت المغربي | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

راس الحانوت المغربي | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 0 دقائق ملعقتين صغيرتين مسحوق الجنزبيل ملعقة و نصف صغيرة من القرفة ملعقتين صغيرتين من الكزبرة الجافة ملعقة ونصف صغيرة من الكركم ملعقة ونصف صغيرة من الفلفل الأسود …

اقرأ المزيد: راس الحانوت المغربي



المصدر: http://foodonia.com

الدجاج المقلي برقائق الذرة | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

الدجاج المقلي برقائق الذرة | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 15 دقائق ست قطع دجاج مخلي ومنزوع الجلدبياض بيضةكوب دقيقنصف كوب ماءملحفلفل أسودكوب من الكورن فليكس (رقائق الذرة ) طريقة التحضير سخني الفرن إلى درجة حرارة 400 درجة …

اقرأ المزيد: الدجاج المقلي برقائق الذرة



المصدر: http://foodonia.com

2014/02/24

The perils of passwords – and how to avoid them | foodonia

Sometimes it feels monumentally difficult to convince internet users to get smarter about their passwords.


One of the biggest problems is password reuse.


Most people use the same password for multiple websites. In some cases, users will use the same password for *every* website they access.


This leads to big problems. Because if you use the same password at website X, Y and Z… it only requires hackers to break into website X and steal its passwords for your accounts on website Y and website Z to also be put at risk.


Maybe X, Y and Z have done their homework, realised that it’s important to build a secure, hardened website, and kept up to date with their software patches. Maybe they have great security in place and hackers’ attempts to break in end in failure.


Well, there’s still a problem. And that’s the user’s computer.


Surveillance cameraIf your computer has been infected by keylogging malware then a criminal hacker can easily hoover up your password, and try it out on the sites. Indeed, many banking Trojans do precisely this – effectively looking over your shoulder everytime you enter a password into an online form and grabbing it for later exploitation.


Maybe you are running a top anti-virus product on your computer, and are diligent about keeping your security in place, are careful about what programs you install, and your software updates are always nice ‘n’ fresh.


Good for you. But there are still problems.


Because what’s to stop you being phished? Are you smart enough to tell the genuine emails from the bogus ones? Are you sure?


Because the staff at Forbes, CNN, Washington Post, and countless others certainly weren’t.


They all got tricked by the Syrian Electronic Army, who forged emails to *look* like they were genuine, but where the links took staff to phoney phishing websites designed to steal login details and allow the hackers to deface websites and publish pro-Assad messages on Twitter.


CNN tweets apology


However, it’s possible that you are on the look out for phishing emails, and have learnt to be dubious of unsolicited messages or websites that ask unexpectedly for your login credentials to be re-entered.


But, as the last few days have proven, there’s still a problem.


What if your computer *isn’t* compromised by malware, and you *aren’t* visiting a phishing website, and the website *is* set up properly using SSL to protect your communications, and yet you can *still* have your private information intercepted by hackers because your operating system has a bug in it.


MavericksRight now that’s the case with iPhones and iPads (if you haven’t installed the iOS 7.0.6 update yet), and users running Mac OS X Mavericks (which doesn’t yet have any official patch from Apple).


A critical security flaw in iOS and Mac OS X allows hackers to intercept what should have been secure communications between your Apple computing devices and the outside world.


When serious bugs like this existing in the operating system, it makes life too easy for online criminals to act as the man-in-the-middle, stealing what should have been secret information in transit.


While the world is waiting for an OS X fix from Apple (and updating its iPhones and iPads) what lessons can we learn from all of these problems?


Well, one message you should be hearing loud and clear by now is that passwords come with problems. Passwords can be stolen – by phishing, by malware, by hacking, via vulnerabilities.


For those online accounts which you really want to keep secured, a stronger form of protection is required.


One obvious solution is two-factor authentication (2FA), which generates a unique one-time-password every umpteen seconds.


How authentication works


Everytime you login, a new one-time-password is required.


Even if your regular password is guessed, cracked or stolen by hackers, it won’t be any use to the bad guys because they won’t know what your one-time-password is.


Indeed, if you use something like a mobile phone app to automatically generate your one-time-password then it’s always likely to be within easy reach, but a long way away from the clutches of the hackers.


When a website or service offers you the option of two-factor authentication please consider enabling the feature.


And, if you run an online service or provide systems so your staff can access company information remotely, why not consider offering two-factor authentication to reduce the risks?


Sites like Facebook, Google, Twitter, Dropbox and others do provide two-factor authentication to better secure accounts, but far too many still offer nothing for those who want a higher level of protection.


2FA may not be the magic bullet which kills all online criminal activity dead in its tracks, but it certainly makes life an awful lot harder for the hackers who want to break into your accounts.


The post The perils of passwords – and how to avoid them appeared first on We Live Security.






Brought by: http://foodonia.com

الدجاج المقلي بجبن البارميزان | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

الدجاج المقلي بجبن البارميزان | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 30 دقائق ست قطع صدور دجاج منزوعة الجلدنصف ملعقة عصير تفاح غير محلىربع كوب جبن بارميزان مبشورملعقة صغيرة من التوابلملعقة صغيرة ريحانربع ملعقة روز مارينصف ملعقة بقدونس مقطعملح …

اقرأ المزيد: الدجاج المقلي بجبن البارميزان



المصدر: http://foodonia.com

صدور دجاج برست | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

صدور دجاج برست | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 15 دقائق كيلو صدور دجاج1/2 كوب سبانخ مفروم كوب لحمة مفروم متعصج فنجان أو نصف كوب جبنة بارميزان 1/4 كيلو جبنة مودزريلا فنجان زيت زيتون أو زبد بصله …

اقرأ المزيد: صدور دجاج برست



المصدر: http://foodonia.com

أكواب كيك الشوكولاته والليمون | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

أكواب كيك الشوكولاته والليمون | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 20 دقائق قطع كيك شوكولاته مجهز مسبقا مفرومة بالخلاط ملعقتين كبيرتين من صلصلة الشوكولاتة الجاهزة أو شوكولاتة ذائبة ثلاث بيضات، نصف كوب عصير ليمون كوبان كريمة سائلة بشر …

اقرأ المزيد: أكواب كيك الشوكولاته والليمون



المصدر: http://foodonia.com

كيك الماج | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

كيك الماج | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 25 دقائق كافية لماج واحد 4 ملاعق كبيرة دقيق 4 ملاعق كبيرة سكر ملعقة كبيرة كاكاو بيضة 3 ملاعق كبيرة من الزيت 3ملاعق كبيرة من الحليب نصف …

اقرأ المزيد: كيك الماج



المصدر: http://foodonia.com

ماربل كيك | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

ماربل كيك | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 35 دقائق بيضات.5كوب زيت.كوب سكر.2 كوب دقيق.½ كوب لبن.2 معلقة كبيرة نشا.3 ملعقة كبيرة كاكاو.¼ ملعقة صغيرة ملح.2 معلقة صغيرة فانيليا.2 معلقة كبيرة دقيق ذرة.ملعقة كبيرة مربى مشمش.3 …

اقرأ المزيد: ماربل كيك



المصدر: http://foodonia.com

2014/02/23

Neiman Marcus attackers set off 60,000 alerts – but went unnoticed | foodonia

Hackers who stole hundreds of thousands of card details from upscale retailer Neiman Marcus set off more than 60,000 security alerts – but these were all missed by security staff at the company, according to a report by Bloomberg Businessweek.


The report, citing an 157-page analysis by the firm’s security team, also quoted security experts who said that the attack was most likely not the work of the same attackers who stole 40 million credit card numbers from Target. Bloomberg’s report says that the Neiman Marcus attackers wrote code to target that specific network, and their methods were not related to those used in the Target Breach.


The malware used in the attack was “self-concealing”, according to PC Mag’s report, but the attackers had to reinstall it in registers every day, which set off hundreds of alarms. But while Neiman Marcus’s systems flagged the behavior, it did not recognize the software itself as malicious.


Hackers penetrated company systems on March 5 2013, according to the report, and four months later began stealing from stores around the country, according to the Atlanta Journal Constitution.


Speaking to Bloomberg Businessweek, Ginger Reeder, a spokeswoman for the company, said that the hackers gave their software a name near-identical to the company’s payment software, so that alerts went unnoticed among the thousands the security team faced daily, “These 60,000 entries, which occurred over a three-and-a-half month period, would have been on average around 1% or less of the daily entries on these endpoint protection logs, which have tens of thousands of entries every day.”


Reeder said that while initial estimates suggested 1.1 million cards might have been exposed in the breach, the real number was likely lower than 350,000, of which 9,200 have since been used fraudulently.


The chain is offering all customers who shopped during the period a year of free credit monitoring and identity theft protection.


Expert advice from ESET security researcher Lysa Myers on how to defend against card fraud if you fear you may have used your card in stores affected by breaches can be found here.


The breaches have led card issuers and banks to call for a replacement for the “hugely insecure” magnetic-stripe systems used by many U.S. banks, as reported by We Live Security here.


The post Neiman Marcus attackers set off 60,000 alerts – but went unnoticed appeared first on We Live Security.






Brought by: http://foodonia.com

الكالمارى المشوى مع الأعشاب | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

الكالمارى المشوى مع الأعشاب | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 20 دقائق 4قطع كالمارى، 100 جرام زبد. عود روزمارى، جزرة وكوسة مقطعة. شرائح فلفل رومى، ملح وفلفل وكمون. زيت زيتون، ثوم مفروم،عصير ليمون. طريقة التحضير تقطع كل قطعة …

اقرأ المزيد: الكالمارى المشوى مع الأعشاب



المصدر: http://foodonia.com

دجاج ديجون | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

دجاج ديجون | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 25 دقائق شرائح من صدور الدجاج6 ثلاثة أرباع الكوب من المايونيز ربع كوب من خردل ديجون ربع كوب من صلصة الصويا طريقة التحضير يحمى الفرن لغاية 180 درجة …

اقرأ المزيد: دجاج ديجون



المصدر: http://foodonia.com

الدجاج على الطريقة التركية | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

الدجاج على الطريقة التركية | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 30 دقائق | وقت الطهي: 45 دقائق دجاجة مقطعة أربع أجزاء خالية من العظام 50 جرام صنوبر 100 جرام لحم مفروم 200 جرام أرز مصرى 50جرام بسلة بصلة مفرومة ثوم مفروم ملح وفلفل …

اقرأ المزيد: الدجاج على الطريقة التركية



المصدر: http://foodonia.com

قلوب من الخبز | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

قلوب من الخبز | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 25 دقائق | وقت الطهي: 25 دقائق كوبين من الدقيق ملعقة صغيرة من السكر ملعقة صغيرة من الملح ملعقة كبيرة من الزعتر ملعقتين كبيرتين من زيت الزيتون نصف كوب من الزيتون الأسود المقطع …

اقرأ المزيد: قلوب من الخبز



المصدر: http://foodonia.com

كيك الفواكه الحمراء و الرائب | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

كيك الفواكه الحمراء و الرائب | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 50 دقائق 3 أكواب دقيق كوب ونصف من السكر 3 بيضات 150 ج من الزبدة الطرية نصف كوب من الحليب الرائب نصف كوب من عصير البرتقال بشر برتقالتين …

اقرأ المزيد: كيك الفواكه الحمراء و الرائب



المصدر: http://foodonia.com

Urgent iPhone and iPad security update, Mac OS X pending | foodonia

If you use an iPhone or an iPad, right now would be a good time to install iOS 7.0.6. You can do this via the Settings icon, under General, where you will see something like the screen below. (I will get to the situation facing Mac OS X users in a moment.)


iOS 7.0.6 Update Now I’m guessing that a lot of people who use iPhones and iPads won’t be entirely clear about what “a fix for SSL connection verification” implies. After all, this is fairly technical language, as is the explanation that Apple provides here.


But the practical implication is clear, as our good friend Graham Cluley puts it, until you upgrade, your i-device has “a critical vulnerability that could allow hackers to intercept what should have been secure communications between your iPhone and SSL-protected websites.”


SSL is what online banks and stores use to protect your electronic interaction with them. It is signified by the little padlock icon that shows up in the browser address bar, next to “https://address” and so on. As Graham notes, the problem Apple is fixing with this update potentially means that “online attackers could grab your userid or passwords as you attempted to log into popular websites.”


Since SSL is also used to verify software updates, sometimes called patches, those present another possible avenue of attack for the bad guys looking to take over these devices. What does that mean? You should do your iOS 7.0.6 update over a trusted network, not the open Wi-Fi at your local coffee shop (unless you know the owner is also security geek or you’re a security pro yourself and installed the system for her).


At this point my main concern is that the bad guys have reverse engineered the fix and now know how to target the vulnerability on unpatched systems. A serious secondary concern is that not everyone with an i-device is seeing a message from Apple urging them to upgrade. In the past, I know the Settings icon on my iPhone has sported a numeric badge telling me that I need to upgrade, but I have not yet seen one for iOS 7.0.6. (and a non-scientific survey of friends tells me I am not alone).


Another potential obstacle to rapid and universal plugging of this attack vector is that “a fix for SSL connection verification” does not read like an appealing reason to upgrade, particularly for the millions of users who have no idea what SSL is, despite using it every day. So let me just repeat that this is an important update. Encouraging friends and family who have iOS devices to go ahead with the update is the right thing to do.


As for Apple Mac laptops and desktops, the situation is that they too have this SSL vulnerability and the update is not yet released. If you, like me, are using a Mac, you need to stay alert for the release of the fix and install it right away, over a known good network.


One precaution you can take is to use Firefox or Chrome as your browser as these will abort vulnerable connections. You can check this using a web page at gotofail.com. The results from Safari on my Macbook Air right now says this:


Checking SSL on Mac OS X

We will update We Live Security as we learn more about the Mac OS X update. For now, let me leave you with one more tip, this from our good friends at CrowdStrike:



  • On unpatched mobile and laptop devices, set “Ask to Join Networks” setting to OFF, which will prevent them from showing prompts to connect to untrusted networks.


Have any questions on this issue? Leave us a comment and one of our researchers will respond as soon as they can.


The post Urgent iPhone and iPad security update, Mac OS X pending appeared first on We Live Security.






Brought by: http://foodonia.com

كؤوس الفراولة و الصنوبر | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

كؤوس الفراولة و الصنوبر | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 0 دقائق 250ج من الفراولة المقطعة إلى قطع صغيرة ملعقة كبيرة من عصير البرتقال ملعقتين كبيرتين من السكر البودرة ملعقة صغيرة من الفانيلا .. ربع كوب من الصنوبر …

اقرأ المزيد: كؤوس الفراولة و الصنوبر



المصدر: http://foodonia.com

2014/02/22

كرات الجبن | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

كرات الجبن | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 0 دقائق 200ج من الجبن الكريمي .. يستحسن فيلاديلفيا كوب من الجبن الشيدر المبشور نصف كوب من جبن الموزاريلا المبشور ملعقة صغيرة من صلصة التاباسكو الحارة رشة من …

اقرأ المزيد: كرات الجبن



المصدر: http://foodonia.com

ريزوتو فواكه البحر | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

ريزوتو فواكه البحر | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 15 دقائق | وقت الطهي: 20 دقائق كوبين من رز الريزوتو المستدير الحبة كوب من حلقات الكلماري كوب من الروبيان نصف كوب من ثمار البحر أو القواقع ملعقتين كبيرتين من صلصة الطماطم فصين …

اقرأ المزيد: ريزوتو فواكه البحر



المصدر: http://foodonia.com

مربى الحمضيات 1 | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

مربى الحمضيات 1 | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 30 دقائق قشر كيلو برتقال مع مراعاة تجنب الجزء الأبيض من القشر عصير كيلو برتقال قشر نصف كيلو يوسفي كليو يوسفي معصورين باليد لإستخراج العصير واللب 600 ج …

اقرأ المزيد: مربى الحمضيات 1



المصدر: http://foodonia.com

مربى الطماطم و اللوز | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

مربى الطماطم و اللوز | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 40 دقائق كيلوغرام من الطماطم حمراء اللون , مقشرة و منزوعة البذر … كوب من السكر 100ج من اللوز المقلي و المجروش ( يمكن استبداله بالصنوبر ) 3 …

اقرأ المزيد: مربى الطماطم و اللوز



المصدر: http://foodonia.com

سلطة الكسكي و الرمان | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

سلطة الكسكي و الرمان | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 0 دقائق كوب من الكسكسي الجاهز المعلب ( أنا استخدمت العضوي من القمح الكامل ) نصف علبة من الفاصولياء الحمراء المعلبة كوب من الرمان حبة فلفل أحمر متوسطة …

اقرأ المزيد: سلطة الكسكي و الرمان



المصدر: http://foodonia.com

2014/02/21

المارون جلاسي | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

المارون جلاسي | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 30 دقائق | وقت الطهي: 25 دقائق كيلو من الكستناء (ابو فروة) . 600ج من السكر البني ملعقة كبيرة من الفانيلا . 600 مل من الماء ملعقتين كبيرتين من السكر الناعم طريقة التحضير …

اقرأ المزيد: المارون جلاسي



المصدر: http://foodonia.com

السلطة الروسية | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

السلطة الروسية | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 20 دقائق حبتين بطاطس مقشرة و مقطعة مكعبات حبتين جزر مقطعة حلقات كوب من البازلاء المجمدة نصف كوب من الكابري بصلة صغيرة مفرومة ناعما ملعقة كبيرة من البقدونس …

اقرأ المزيد: السلطة الروسية



المصدر: http://foodonia.com

كعك البريتزل | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

كعك البريتزل | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 30 دقائق | وقت الطهي: 15 دقائق كوب و نصف من الماء الدافئ كيس من الخميرة الجافة ملعقة كبيرة من السكر ملعقتين كبيرتين من الزبدة المذابة نصف ملعقة من الملح 4 أكواب و …

اقرأ المزيد: كعك البريتزل



المصدر: http://foodonia.com

كيكة الفستق بالدقيق الأسمر | فودنيا | http://foodonia.com

اقرأ الوصفة كاملة من الرابط التالي:

كيكة الفستق بالدقيق الأسمر | فودنيا

foodonia

#Foodonia #دنيا_الطعام #اكلات وقت الإعداد: 20 دقائق | وقت الطهي: 40 دقائق كوبين من الدقيق الأسمر الكامل 3 بيضات كوب من الكريمة ربع كوب من الزيت النباتي كوب من الفستق المجروش كيس من الخميرة الكيماوية ( الباكينغ باودر …

اقرأ المزيد: كيكة الفستق بالدقيق الأسمر



المصدر: http://foodonia.com