How to tell if you’ve been hit by fake ransomware

Unlike most malware, ransomware is not stealthy. It's loud and obnoxious, and if you've been infected, the attackers will tell you so in no uncertain terms. After all, they want to be paid.“Your personal files are encrypted,” the message on the computer blares. “Your documents photos, databases, and other important files have been encrypted with strongest encryption and unique key, generated for this computer.” While the language may vary, the gist is the same: If you don’t pay the ransom -- typically within 48 to 72 hours -- your files are hosed.[ Oh no! Got real ransomware? Then one of these tools might help. | 4 reasons not to pay up in a ransomware attack. | Safeguard your data! The tools you need to encrypt your communications and Web data. ] Or are they? There is a slim possibility the perpetrators may be trying to fake you out and the files haven’t been encrypted. While not a common scenario, it does happen, according to industry experts. Rather than paying up, you can bypass the scary fake message and move on with your day.To read this article in full or to leave a comment, please click here

How to tell if you’ve been hit by fake ransomware

Unlike most malware, ransomware is not stealthy. It's loud and obnoxious, and if you've been infected, the attackers will tell you so in no uncertain terms. After all, they want to be paid.“Your personal files are encrypted,” the message on the computer blares. “Your documents photos, databases, and other important files have been encrypted with strongest encryption and unique key, generated for this computer.” While the language may vary, the gist is the same: If you don’t pay the ransom -- typically within 48 to 72 hours -- your files are hosed.[ Oh no! Got real ransomware? Then one of these tools might help. | 4 reasons not to pay up in a ransomware attack. | Safeguard your data! The tools you need to encrypt your communications and Web data. ] Or are they? There is a slim possibility the perpetrators may be trying to fake you out and the files haven’t been encrypted. While not a common scenario, it does happen, according to industry experts. Rather than paying up, you can bypass the scary fake message and move on with your day.To read this article in full or to leave a comment, please click here

11 Excel tips for power users

Want to get more out of Excel? At Microsoft's inaugural Data Insights Summit last month, several experts offered a slew of suggestions for getting the most out of Excel 2016. Here are 10 of the best.(Note: Keyboard shortcuts will work for the 2016 versions of Excel, including Mac; those were the versions tested. And many of the query options in Excel 2016's data tab come from the Power Query add-in for Excel 2010 and 2013. So if you've got Power Query on an earlier version of Excel on Windows, a lot of these tips will work for you as well, although they may not work on Excel for Mac.)1. Use a shortcut to create a table. Tables are among the most useful features in Excel for data that is in contiguous columns and rows. Tables make it easier to sort, filter and visualize, as well as add new rows that maintain the same formatting as the rows above them. In addition, if you make charts from your data, using a table means the chart will automatically update if you add new rows.To read this article in full or to leave a comment, please click here

Microsoft locks down Cortana: Blocks integration with other browsers, search engines

Microsoft is tightening control over Cortana.  Only its Microsoft Edge browser and Bing search engine will work with searches initiated through Windows 10’s digital assistant, the company said Thursday.Microsoft isn’t prohibiting third-party browsers like Opera and Chrome from working with Windows 10, and you can still configure the operating system to launch those browsers by default, when, say, a coworker emails you a link to a Web page. But, if you launch a search via Cortana, only Edge and Bing will be used to complete it, Microsoft said in a blog post. To read this article in full or to leave a comment, please click here

IDG Contributor Network: WiGig reaches for 60GHz

The entrepreneur and financier Peter Thiel likes to ask, “What important truth do very few people agree with you on?” Many significant breakthroughs in technology are driven by the hope and optimism of a few in the face of mass indifference and disbelief. Only after success has been achieved can the rest of us recognize the brilliance of the original vision.Which brings us to the Wi-Fi Alliance and its foray into the 60GHz band with 802.11ad, known as WiGig. Years in the making, the WiGig certification should be launched by the end of 2016, and indeed some products are already available. As one might expect, there is a body of true believers who are certain that WiGig will transform communications, and there's a mass of skeptics doubting it will ever catch on. We should be able to see who is right by the end of 2017. In the meantime, it’s worth keeping an eye on WiGig.To read this article in full or to leave a comment, please click here

Here’s why analytics is eating the supply chain

A peculiar thing happens in northern Florida every year in the springtime. That's harvest season on the many fern farms scattered across the region, and it's also the time when demand for rattlesnake antivenom skyrockets there. That's no coincidence. Rattlesnakes like to form dens under fern crops, it turns out. That means trouble for those who harvest the plants, and it puts urgent pressure on local hospitals and healthcare providers, which must come up with the highly perishable antivenom on demand. "A lot of times you never really know how much you're going to need," said Kyle Pudenz, senior director of purchasing for pharmaceutical wholesaler H. D. Smith. "But you also can't stock up and leave it on the shelf."To read this article in full or to leave a comment, please click here

IDG Contributor Network: Rip up the script when assembling a modern security team

The advanced threats companies face require security teams have different characteristics than the backgrounds analysts typically have. However, most businesses hire security practitioners who have similar professional backgrounds and capabilities. Analysts usually have IT backgrounds, are taught to quickly resolve threats and work in an environment that doesn’t embrace speaking out when there’s a security incident.The adversaries, meanwhile, have a more evolved perspective on how to carry out hacking campaigns. Attack operations often include people who have a range of experiences. For example, to hack a bank, attackers will hire hacking experts as well as someone with deep knowledge about the financial services industry. Hacking teams often employ experts who have various technical capabilities to help them approach attacks in different ways and switch gears if one tactic isn’t working. Hackers realize that a more diverse team—and the mindset it brings—increases the likelihood of the attack’s success.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Rip up the script when assembling a modern security team

The advanced threats companies face require security teams have different characteristics than the backgrounds analysts typically have. However, most businesses hire security practitioners who have similar professional backgrounds and capabilities. Analysts usually have IT backgrounds, are taught to quickly resolve threats and work in an environment that doesn’t embrace speaking out when there’s a security incident.The adversaries, meanwhile, have a more evolved perspective on how to carry out hacking campaigns. Attack operations often include people who have a range of experiences. For example, to hack a bank, attackers will hire hacking experts as well as someone with deep knowledge about the financial services industry. Hacking teams often employ experts who have various technical capabilities to help them approach attacks in different ways and switch gears if one tactic isn’t working. Hackers realize that a more diverse team—and the mindset it brings—increases the likelihood of the attack’s success.To read this article in full or to leave a comment, please click here

Phishing apps posing as popular payment services infiltrate Google Play

Google's efforts to police the Android app store -- Google Play -- are far from perfect, with malicious apps routinely slipping through its review process. Such was the case for multiple phishing applications this year that posed as client apps for popular online payment services.Researchers from security firm PhishLabs claim that they've found 11 such applications since the beginning of 2016 hosted on Google Play, most of them created by the same group of attackers.The apps are simple, yet effective. They load Web pages containing log-in forms that look like the target companies' websites. These pages are loaded from domain names registered by the attackers, but because they are loaded inside the apps, users don't see their actual location.To read this article in full or to leave a comment, please click here

Phishing apps posing as popular payment services infiltrate Google Play

Google's efforts to police the Android app store -- Google Play -- are far from perfect, with malicious apps routinely slipping through its review process. Such was the case for multiple phishing applications this year that posed as client apps for popular online payment services.Researchers from security firm PhishLabs claim that they've found 11 such applications since the beginning of 2016 hosted on Google Play, most of them created by the same group of attackers.The apps are simple, yet effective. They load Web pages containing log-in forms that look like the target companies' websites. These pages are loaded from domain names registered by the attackers, but because they are loaded inside the apps, users don't see their actual location.To read this article in full or to leave a comment, please click here

IDG Contributor Network: School district repurposes buses as Wi-Fi hotspots

A poverty-stricken school district in Southern California has come up with a novel way to alleviate the lack of internet access for kids in its catchment area. It’s repurposing school buses as internet hotspots.The school buses are parked overnight in impoverished areas where hard-wired broadband Internet access isn’t usually available and students aren’t able to access the internet. Most of the school district’s students reside in stone-broke rural areas and/or reservations.All of the children in the vast, 1,220-square-mile school district qualify for reduced-priced or free meals, says the Office of Educational Technology (OET). And almost half of the students are English-language learners.To read this article in full or to leave a comment, please click here

VMware cloud boss to leave

Bill Fathers, the former executive of Savvis who has been leading VMware’s hybrid cloud efforts for the past three years, is leaving the company. LinkedIn VMware EVP and GM of Cloud Services Bill Fathers is leaving the company VMware confirmed the news that was first reported by Fortune.+MORE AT NETWORK WORLD: Microsoft, Google sweeten their cloud freebies | OpenStack then vs. now +To read this article in full or to leave a comment, please click here

Supreme Court approves rule change that expands FBI computer search powers

The Supreme Court has adopted amendments to a rule to give judges the authority to issue warrants to remotely search computers whose locations are concealed using technology.The proposed move had been criticized by civil rights groups and companies like Google that said it threatened to undermine the privacy rights and computer security of Internet users.The top court has approved changes to the Federal Rule of Criminal Procedure , including Rule 41, which with some exceptions prohibits a federal judge from issuing a search warrant outside of the judge’s district. The change in the rule was proposed by the Advisory Committee on the Rules of Criminal Procedure at the request of the Department of Justice .To read this article in full or to leave a comment, please click here

Supreme Court approves rule change that expands FBI computer search powers

The Supreme Court has adopted amendments to a rule to give judges the authority to issue warrants to remotely search computers whose locations are concealed using technology.The proposed move had been criticized by civil rights groups and companies like Google that said it threatened to undermine the privacy rights and computer security of Internet users.The top court has approved changes to the Federal Rule of Criminal Procedure , including Rule 41, which with some exceptions prohibits a federal judge from issuing a search warrant outside of the judge’s district. The change in the rule was proposed by the Advisory Committee on the Rules of Criminal Procedure at the request of the Department of Justice .To read this article in full or to leave a comment, please click here

HELLO, WORLD

Welcome to Cloud Packet! I’m Shakib Shaygan, a full-time blogger and network engineer who has been designing and building networks for over 6 years now. I recently completed the CCIE lab to earn CCIE #46559 (Routing and Switching & Data Center), besides that I have some knowledge of open source and other networking product such as Juniper & Brocade.

As for a bit of background, I’ve worked as a normal IT Support, help desk, and currently as a network researcher, focusing on SDN for Telco. Currently I’m looking forward to doing some research, learning, and writing on a variety of networking-oriented topics. Look for a series of posts related to the CCIE Data Center experience as well as any other interesting topic which I encounter.

One of the reasons that I start this blog was to have a base that I can share my notes, as usually I write down everything that I learn because we are human and we will forget most of them for sure.

Ebbinghaus Forgetting curve

Information is lost over time when there is no attempt to retain it. That's almost same condition with every human which follow simple rules, the more you repeat this Continue reading