You go through TSA security checkpoints and leave without the carry-on items you sent through the conveyor belt to be scanned.That happens a lot; things go missing in ways other than TSA confiscating items. Just ask Eric Cheng, a photographer, technologist, drone expert and author, who said the TSA handed his $2,800 MacBook Pro to some random stranger.“After following TSA security protocols, TSA gave my $2,800 computer away to another passenger whom they were unable or unwilling to identify and track down,” he wrote.To read this article in full or to leave a comment, please click here
How real are virtual reality gaming experiences? If a video of a first-person shooter horror game on the HTC Vive are any indication, fairly real – at least real enough to totally freak out this chick.
I own neither Vive nor Oculus at this point; yet I built a beast of a box and am interested in HTC Vive due to SteamVR Desktop Theater Mode which would allow a person to play every game in their Steam library in virtual reality. I can’t wait to slay VR room-sized Bitterblack Isle monsters and the continual flood of new foes on Dragon’s Dogma: Dark Arisen.To read this article in full or to leave a comment, please click here
Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital president Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant; he said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files – at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here
Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital president Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant; he said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files – at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here
Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday, and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital President Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant. He said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files—at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here
Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday, and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital President Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant. He said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files—at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here
Tech support scammers have been inspired by ransomware authors and have come up with lock screen claiming a user’s Windows license has expired. A tech support number is provided and a fake Microsoft technician is happy to help, so long as the victim pays to have their computer unlocked.After installing whatever rogue program has been tainted with the screen locker, Malwarebytes reported that users will see what “truly resembles a genuine Microsoft program.” It installs and waits for the victim to restart their computer. Upon restart, “the program activates to take over the desktop and display what looks like Windows updates.To read this article in full or to leave a comment, please click here
Tech support scammers have been inspired by ransomware authors and have come up with lock screen claiming a user’s Windows license has expired. A tech support number is provided, and a fake Microsoft technician is happy to help so long as the victim pays to have their computer unlocked.After installing whatever rogue program has been tainted with the screen locker, Malwarebytes reported that users will see what “truly resembles a genuine Microsoft program.” It installs and waits for the victim to restart their computer. Upon restart, “the program activates to take over the desktop and display what looks like Windows updates.”To read this article in full or to leave a comment, please click here
A gray hat replacing the Locky ransomware payload with a PSA, Windows 10 to double the number of ads after the Anniversary Update, and Quaker Oats threatening to sue actual Quakers for trademark infringement are some of the varied bits and bytes which caught my attention today.New Locky ransomware PSAThe command and control servers for Locky ransomware were previously hacked to show a “Stupid Locky” message instead of locking a victim’s machine, but F-Secure researcher Sean Sullivan discovered “a similar grey hat hack” that delivers a PSA to would-be Locky victims.To read this article in full or to leave a comment, please click here
A gray hat replacing the Locky ransomware payload with a PSA, Windows 10 to double the number of ads after the Anniversary Update, and Quaker Oats threatening to sue actual Quakers for trademark infringement are some of the varied bits and bytes which caught my attention today.New Locky ransomware PSAThe command and control servers for Locky ransomware were previously hacked to show a “Stupid Locky” message instead of locking a victim’s machine, but F-Secure researcher Sean Sullivan discovered “a similar grey hat hack” that delivers a PSA to would-be Locky victims.To read this article in full or to leave a comment, please click here
Cyber insurance doesn’t come cheap and it doesn’t always pay out after a company is hacked. But today the Scottsdale-based company Trusona announced that it has become the world’s first insured authentication platform. Trusona, using its own cyber insurance, will insure the identity and thereby the transactions of Trutoken users up to $1 million.Tim Greene previously wrote about Trusona’s “100% accurate authentication scheme” which uses the company’s Trutoken dongle. The product is primarily aimed at users such as bank customers moving thousands of dollars or corporate executives with access to critical data.To read this article in full or to leave a comment, please click here
Cyber insurance doesn’t come cheap and it doesn’t always pay out after a company is hacked. But today the Scottsdale-based company Trusona announced that it has become the world’s first insured authentication platform. Trusona, using its own cyber insurance, will insure the identity and thereby the transactions of Trutoken users up to $1 million.Tim Greene previously wrote about Trusona’s “100% accurate authentication scheme” which uses the company’s Trutoken dongle. The product is primarily aimed at users such as bank customers moving thousands of dollars or corporate executives with access to critical data.To read this article in full or to leave a comment, please click here
What the – ! Well the FBI is back to the same old shady surveillance tricks, shady if you believe the Fourth Amendment still means something. The next time you are near a courthouse, heck even out on a sidewalk or waiting at a bus stop, you might want to pay a little more attention to any trees or rocks that are nearby. Look closely; see any microphones or cameras? Why stop there? The FBI certainly didn’t when it secretly planted microphones in public near courthouses to record conversations and cameras to conduct clandestine video surveillance. And apparently the FBI decided it didn’t need no stickin’ warrant.But hey, the FBI didn’t just bug bus stops, light boxes, hedges, backpacks and vehicles near Alameda County’s Rene C. Davidson Courthouse for 10 months between March 2010 and January 2011. According to Jeff Harp, a former FBI special agent and a security analyst for KPIX 5, a CBS affiliate for the San Francisco Bay Area:To read this article in full or to leave a comment, please click here
What the – ! Well the FBI is back to the same old shady surveillance tricks, shady if you believe the Fourth Amendment still means something. The next time you are near a courthouse, heck even out on a sidewalk or waiting at a bus stop, you might want to pay a little more attention to any trees or rocks that are nearby. Look closely; see any microphones or cameras? Why stop there? The FBI certainly didn’t when it secretly planted microphones in public near courthouses to record conversations and cameras to conduct clandestine video surveillance. And apparently the FBI decided it didn’t need no stickin’ warrant.But hey, the FBI didn’t just bug bus stops, light boxes, hedges, backpacks and vehicles near Alameda County’s Rene C. Davidson Courthouse for 10 months between March 2010 and January 2011. According to Jeff Harp, a former FBI special agent and a security analyst for KPIX 5, a CBS affiliate for the San Francisco Bay Area:To read this article in full or to leave a comment, please click here
Cisco’s Talos researchers discovered two vulnerabilities in 7-Zip, the popular open-source file archiver known for having a high compression ratio and option to password protect compressed files.Even if users hurry to download the newest 16.0 version of 7-Zip, in which the vulnerabilities are reportedly fixed, that doesn’t take care of many products that have used the old 7-Zip libraries and are still vulnerable. Unless vendors do some work, they are vulnerable and users of their products are as well.To read this article in full or to leave a comment, please click here
Cisco’s Talos researchers discovered two vulnerabilities in 7-Zip, the popular open-source file archiver known for having a high compression ratio and option to password protect compressed files.Even if users hurry to download the newest 16.0 version of 7-Zip, in which the vulnerabilities are reportedly fixed, that doesn’t take care of many products that have used the old 7-Zip libraries and are still vulnerable. Unless vendors do some work, they are vulnerable and users of their products are as well.To read this article in full or to leave a comment, please click here
Hello, zero-days. And yes, you should be busy patching them, but Adobe isn’t releasing one of the zero-day fixes for Flash Player until tomorrow (May 12)—even though it is currently being used in real-world attacks.Microsoft released 16 security bulletins, eight of which are rated critical for remote code execution (RCE) and includes a fix for zero-day.Put another way by Bobby Kuzma, CISSP, systems engineer at Core Security: “Another fun and delightful Patch Tuesday, with a number of vulnerabilities with exploits in the wild!”To read this article in full or to leave a comment, please click here
Hello, zero-days. And yes, you should be busy patching them, but Adobe isn’t releasing one of the zero-day fixes for Flash Player until tomorrow (May 12)—even though it is currently being used in real-world attacks.Microsoft released 16 security bulletins, eight of which are rated critical for remote code execution (RCE) and includes a fix for zero-day.Put another way by Bobby Kuzma, CISSP, systems engineer at Core Security: “Another fun and delightful Patch Tuesday, with a number of vulnerabilities with exploits in the wild!”To read this article in full or to leave a comment, please click here
First Amazon took on Netflix, but now the company is taking aim at YouTube by launching Amazon Video Direct (AVD); it’s a self-service program for video creators to make their content available to Amazon customers, including those with Prime memberships – which is nothing to scoff at since Prime was estimated to be in about half of all U.S. households ... and that was before Prime started offering $9 monthly subscriptions.To read this article in full or to leave a comment, please click here
After announcing that 300 million devices are running Windows 10, Microsoft said its free upgrade offer ends on July 29. If you want Windows 10 after that date, then Microsoft said you can purchase the $119 Windows 10 Home version or buy a new device running Windows 10.The free upgrade offer will not end for Windows customers with accessibility issues. The Microsoft Accessibility Blog wrote:To read this article in full or to leave a comment, please click here