now browsing by tag
Needless to say, being honest is the time-proven value people are taught growing up. It is what they seek in their business or life partners and the lack of it causes broken hearts or forever loss of one’s credibility. As …
The post How Being Honest Works for You in The Online Dating Game appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
An unusual strain of virus-like hacker software that exploits computer server vulnerabilities without requiring human interaction is a leading example of a new generation of “ransomware,” according to a new report by Cisco Systems Inc.
Hackers use such software to target large-scale networks and hold data hostage in exchange for bigger payments. Such a strain, known as Samas or samsam, hit the MedStar Health Inc. hospital chain in the US last month.
In such attacks, hackers target backup files and records, encrypting them to make them unreadable. To regain access, users without additional safe backups who don’t want to lose critical files often pay the ransom, typically $10,000 to $15,000 for an entire network or hundreds of dollars for a single computer.
The ability to demand payment in bitcoin, a difficult-to-trace virtual currency not controlled by any country, was “basically the birth of ransomware” and has helped drive its success since the currency’s introduction in 2009, said Craig Williams, a senior technical leader at Cisco’s Talos security research group.
Samas exploits vulnerabilities giving hackers a way into JBoss application servers that are frequently used by some of the largest corporations. Once inside, the hackers sometimes implant a tool that steals credentials, allowing it to spread through the system, and encrypt scores of digital files along the way.
Ransomware has become a new targeted attack, with thousands of variants emerging over the last six months, said Dmitri Alperovitch, co-founder and chief technology officer of Crowdstrike Inc.
Most ransomware still requires a human to click a link or open an infected email attachment, but Cisco’s report warned that “the age of self-propagating ransomware, or cryptoworms, is right around the corner.” Worms are generally virus-like infections that are programmed to spread automatically, without human interaction.
Ransomware has become an increasing threat over the last six months. Last year’s 2,453 reports of ransomware hackings to the FBI totaled a reported loss of $24.1 million, making up nearly one-third of the complaints over the past decade. They also represented 41% of the $57.6 million in reported losses since 2005.
Such losses are significantly higher than any paid ransoms because companies routinely include remediation costs, lost productivity, legal fees and sometimes even the price of lost data in their estimates.
View full post on AmIHackerProof.com
View full post on Am I Hacker Proof
It is some of the most sophisticated and fascinating technology that you will ever see and it’s being used right here in South Florida – and across the country – to catch people sharing, viewing and even creating child pornography.
The tech is responsible for the headline-grabbing arrest over the summer of Carl Lechner, a longtime, trusted gymnastics coach in South Florida, who was involved in the lives of countless children.
According to Broward Sheriff’s Office detectives, Lechner had a strong interest in watching and viewing child pornography and he faces dozens of criminal charges.
CBS4 News is pulling back the curtain on what led to Lechner’s arrest – technology from the Child Rescue Coalition (CRC).
The post Boca Raton-Based Child Rescue Coalition Works “To Find Those That Victimize Kids” appeared first on Parent Security Online.
View full post on Parent Security Online
IST Research’s 24 employees have fairly typical backgrounds for the Fredericksburg region. They’re government contractors, retired military personnel and recent college graduates. But their work creating technology for the developing world and mining the Internet for data connections touches a wider swath of the globe. IST tackles problems such as human trafficking, Ebola and ISIS. Ryan Paterson, who founded the Spotsylvania County company in 2008, said its social mission drives his staff to keep innovating. Memex, a project on which IST is the prime subcontractor with the Defense Advanced Research Projects Agency (DARPA), was recently profiled on an episode of “60 Minutes” that aired Feb. 8. The program, which IST has worked on since last September as a program developer and analyst of data, is an innovative approach to finding human traffickers and prosecuting those organizations. Memex is a search tool that goes beyond the capabilities of Google, which searches only about 5 percent of the content on the Web, according to the episode. It searches the deep Web and shows a visual representation of where advertisements for sex traffickers are being posted. By following these people, it creates a visual representation of where human trafficking networks are and connects […]
For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com
The post Spotsylvania tech firm works on Memex project featured on ’60 Minutes’ appeared first on National Cyber Security.
View full post on National Cyber Security