KillDisk cyber sabotage tool evolves into ransomware

A malicious program called KillDisk that has been used in the past to wipe data from computers during cyberespionage attacks is now encrypting files and asking for an unusually large ransom.KillDisk was one of the components associated with the Black Energy malware that a group of attackers used in December 2015 to hit several Ukrainian power stations, cutting power for thousands of people. A month before that, it was used against a major news agency in Ukraine.Since then, KillDisk has been used in other attacks, most recently against several targets from the shipping sector, according to security researchers from antivirus vendor ESET.However, the latest versions have evolved and now act like ransomware. Instead of wiping the data from the disk, the malware encrypts it and displays a message asking for 222 bitcoins to restore them. That's the equivalent of $216,000, an unusually large sum of money for a ransomware attack.To read this article in full or to leave a comment, please click here

KillDisk cyber sabotage tool evolves into ransomware

A malicious program called KillDisk that has been used in the past to wipe data from computers during cyberespionage attacks is now encrypting files and asking for an unusually large ransom.KillDisk was one of the components associated with the Black Energy malware that a group of attackers used in December 2015 to hit several Ukrainian power stations, cutting power for thousands of people. A month before that, it was used against a major news agency in Ukraine.Since then, KillDisk has been used in other attacks, most recently against several targets from the shipping sector, according to security researchers from antivirus vendor ESET.However, the latest versions have evolved and now act like ransomware. Instead of wiping the data from the disk, the malware encrypts it and displays a message asking for 222 bitcoins to restore them. That's the equivalent of $216,000, an unusually large sum of money for a ransomware attack.To read this article in full or to leave a comment, please click here

Microsoft is bundling cloud services to make cars smarter

CES has turned into the first car show of the year, with major automakers choosing to show off upcoming features in Las Vegas. Microsoft wants to help make cars more intelligent, and it unveiled a new suite of services Thursday to do so.The Connected Vehicle Platform brings together a smorgasbord of services from Microsoft, including Azure IoT Hub, Cortana Intelligence Suite, Microsoft Dynamics and many others. In addition, Office 365, Skype for Business and Cortana can be integrated with the platform.It’s not a surprising move. Microsoft frequently packages cloud services as suites, then markets them for kick-starting particular applications. Furthermore, the company has been saying for some time that its goal in car tech is to support carmakers rather than build its own connected cars.To read this article in full or to leave a comment, please click here

Why We Wear Seat Belts On Airplanes

This post is inspired by Matt Simmons‘ fantastic post on why we still have ashtrays on airplanes, despite smoking being banned over a decade ago. This time, I’m going to cover seat belts on airplanes. I’ve often heard people balking at the practice for being somewhat arbitrary and useless, much like balking at turning off electronic devices before takeoff. But while some rules in commercial aviation are a bit arbitrary, there is a very good reason for seat belts.

In addition to being a very, very frequent flier (I just hit 1 million miles on United), I’m also a licensed fixed wing pilot and skydiving instructor. Part of the training of any new skydiver is what we call the “pilot briefing”. And as part of that briefing we talk about the FAA rules for seat belts: They should be on for taxi, take-off, and landing. That’s true for commercial flights as well.

Some people balk at the idea of seat belts on commercial airliners. After all, if you fly into the side of a mountain, a seat belt isn’t going to help much. But they’re still important.

84271048

Your Seat Belt Is For Me, My Seat Belt Is For You

Continue reading

Let’s Encrypt with DANE

For many years we’ve seen Domain Name certificates priced as a luxury add-on, costing many times more than the original name registration fees. Let’s Encrypt has broken that model and now basic security is now freely available to anyone. But the CA model itself is not all that robust, and there are still some critical vulnerabilities that can be exploited by a well-resourced attacker. Adding DANE TSLA records to the DNS signed zone, and equipping user applications, such as browsers, with an additional DNS lookup to fetch and validate the TLSA record is a small step, but a significant improvement to the overall security picture.

20% off Spigen 42mm Apple Watch Case and 2 Screen Protectors – Deal Alert

For the ultimate protection against drops and scratches, Spigen has invented the Rugged Armor case for your 42mm Apple Watch. The case features glossy accents and carbon fiber textures, and air absorption for superior shock protection.  The product ships with 2 screen protectors as well, and is currently listed for just $11.99, 20% off its list price. See the deal on Amazon.To read this article in full or to leave a comment, please click here

8K matures at CES, but your PC may not be ready

In 2020, 4K will be passe. The 2020 Tokyo Olympics will be broadcast in the 8K resolution, which is four times deeper than 4K.The 8K resolution -- 7680 x 4320 pixels -- will make movies will look stunning, and gaming will be even better than on today's PlayStation Pro or Xbox One S.There's a good chance you aren't thinking of 8K yet because you haven't even moved to 4K. The early 8K adopters will be gamers looking to buy the latest and greatest hardware, and creative professionals making 8K content.Content creation is as important as the hardware itself, and efforts to broadcast at 8K are underway. PCs are getting ready: Microsoft has said Windows 10 will support 8K.To read this article in full or to leave a comment, please click here

8K matures at CES, but your PC may not be ready

In 2020, 4K will be passe. The 2020 Tokyo Olympics will be broadcast in the 8K resolution, which is four times deeper than 4K.The 8K resolution -- 7680 x 4320 pixels -- will make movies will look stunning, and gaming will be even better than on today's PlayStation Pro or Xbox One S.There's a good chance you aren't thinking of 8K yet because you haven't even moved to 4K. The early 8K adopters will be gamers looking to buy the latest and greatest hardware, and creative professionals making 8K content.Content creation is as important as the hardware itself, and efforts to broadcast at 8K are underway. PCs are getting ready: Microsoft has said Windows 10 will support 8K.To read this article in full or to leave a comment, please click here

Attending DockerCon? Choose what workshop to attend

Following in last year’s major success, we are excited to be bringing back and expand the paid workshops at DockerCon 2017. The pre-conference workshops will focus on a range of subjects from Docker 101 to deep dives in networking, Docker for JAVA and  advanced orchestration. Each workshop is designed to give you hands-on instruction and insight on key Docker topics, taught by Docker Engineers and Docker Captains. The workshops are a great opportunity to get better acquainted and excited about Docker technology to start off DockerCon week.

DockerCon workshops

Take advantage of the lowest DockerCon pricing and get your Early Bird Ticket + Workshop now! Early Bird Tickets are limited and will sell out in the next two weeks!

Here are the basics of the DockerCon workshops:

Date: Monday, April 17, 2017

Time: 2:00pm – 5:00pm

Where: Austin Convention Center – 500 E. Cesar Chavez Street, Austin, TX

Cost: $150

Class size: Classes will remain small and are limited to 50 attendees per class.

Registration: The workshops are only open to DockerCon attendees. You can register for the workshops as an add-on package through the registration site here.

DockerCon workshops

Below are overviews of each workshop. To learn more about each topic head over Continue reading

FTC goes after D-Link for shoddy security in routers, cameras

The U.S. Federal Trade Commission is cracking down on D-Link for selling wireless routers and internet cameras that can easily be hacked, the regulator said Thursday.Thousands of consumers are at risk, the FTC said in a complaint filed against the Taiwanese manufacturer charging D-Link with repeatedly failing to take reasonable measures to secure the products.The action comes as hackers have been hijacking poorly secured internet-connected products to launch massive cyberattacks that can force websites offline. Recently, a notorious malware known as Mirai has been found infecting routers, cameras, and DVRs built with weak default passwords.To read this article in full or to leave a comment, please click here

FTC goes after D-Link for shoddy security in routers, cameras

The U.S. Federal Trade Commission is cracking down on D-Link for selling wireless routers and internet cameras that can easily be hacked, the regulator said Thursday.Thousands of consumers are at risk, the FTC said in a complaint filed against the Taiwanese manufacturer charging D-Link with repeatedly failing to take reasonable measures to secure the products.The action comes as hackers have been hijacking poorly secured internet-connected products to launch massive cyberattacks that can force websites offline. Recently, a notorious malware known as Mirai has been found infecting routers, cameras, and DVRs built with weak default passwords.To read this article in full or to leave a comment, please click here

Intel’s Compute Card mini-computer is so small that you may lose it

You've perhaps never seen a full-blown computer smaller than Intel's amazingly thin Compute Card, announced for the first time at CES.At first glance, it's easy to mistake the modular computer for a credit card or smart card. It's so thin, it could be easy to lose.But it's a full blown computer, crammed with a 7th Generation Intel Kaby Lake processor, memory, storage, and wireless connectivity.It's so small, it can't accommodate USB-C or other ports to power up or connect to displays. The Compute Card will work only after being plugged into a slot of a larger device, much like smart cards.Here's the bad news: It's not targeted toward PCs. However, we hope Intel will eventually make them for PCs, and there are hints the chipmaker could.To read this article in full or to leave a comment, please click here

Woth Reading: Domain name proxies for privacy

Privacy/proxy services carry no per se stigma of nefarious purpose, although when first introduced circa 2006 there was some skepticism they could enable cybersquatting and panelists expressed different views in weighing the legitimacy for their use. Some Panels found high volume registrants responsible for registering domain-name-incorporating trademarks. Others rejected the distinction between high and low volume as a determining factor. WWF-World Wide Fund for Nature aka WWF International v. Moniker Online Services LLC and Gregory Ricks, D2006-0975 (WIPO November 1, 2006) expresses the consensus, namely that use of these services “does not of itself indicate bad faith; there are many legitimate reasons for proxy registration services”). —Circle ID

LinkedInTwitterGoogle+Facebook

The post Woth Reading: Domain name proxies for privacy appeared first on 'net work.

IDG Contributor Network: 5 New Year’s resolutions for the telecom industry

Every year around this time we “gaze into our crystal ball” to identify key trends for the coming year. But this year I’ve decided to do something different. So, instead I’ll share some suggestions for New Year’s resolutions that we, as an industry, should work on together in 2017.What’s the difference, you ask? Trends are defined by the general direction in which something is shifting or changing, whereas the dictionary defines resolution as “a firm decision to do or not do something” or “the action of solving a problem, dispute or contentious matter.” So while the trends of the past few years have prepared us to expect the unexpected when it comes to today’s networks and what users demand, now is the time for us to be bold in our solutions.To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here

IT Resume Makeover: Focus on results that matter

Your resume needs to convey your work history and experience in a way that makes sense to a recruiter or hiring manager. But it's difficult to view your personal work experience as an outsider would, or to remember that not everyone has the same technical knowledge. That was the case for Rick Deckard, (whose name has been changed for this article). He needed to cut through the technical jargon to better show his personality and unique skills.To read this article in full or to leave a comment, please click here(Insider Story)

7 tips for better security awareness training sessions

Boring training sessions?Image by ThinkstockAt their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful opportunities to raise security issues and lay the groundwork for better habits.To read this article in full or to leave a comment, please click here