now browsing by tag
Parties close to agreement on voting plan, Parliament return, but committees prove sticking point, says Bloc MP | #tinder | #pof | romancescams | #scams
On the eve of Parliament’s return, government and opposition parties had reached a broad agreement on how the House of Commons and remote voting by Zoom would function—including making the […] View full post on National Cyber Security
#sextrafficking | Post wrongly says Trump created ‘child protective force’ :: WRAL.com | #tinder | #pof | #match | romancescams | #scams
By Madison Czopek, PolitiFact reporter A social media post says that President Donald Trump is underappreciated for his actions to help missing children. “You people hate on Trump but he […] View full post on National Cyber Security
Michelle Obama Says Tinder Can’t Lead to Serious Relationships, Millennials Say ‘OK Boomer’ | #tinder | #pof | romancescams | #scams
Michelle Obama recently gave out some dating advice to perfect the art of long-term relationships | Image credit: Reuters Michelle Obama recently opened up about some tips for youngsters on […] View full post on National Cyber Security
#speeddating | #tinder | #pof | #blackpeoplemeet | Council for Entrepreneurial Development’s interim CEO says it’s ‘full speed ahead’ into a virtual world | romancescams | #scams
RESEARCH TRIANGLE PARK – Kelly Rowell, interim CEO at the Council for Entrepreneurial Development, says much of the organization’s entrepreneurial support programs “translated well to a virtual environment and we’re […] View full post on National Cyber Security
Love Island’s Curtis Pritchard says he can’t face dating again after split from Maura Higgins following cheating claims | #tinder | #pof | romancescams | #scams
CURTIS PRITCHARD has revealed he is not looking for another relationship after his split from Maura Higgins.
The pair dated for eight months after meeting on last summer’s Love Island, but split in March after a series of blazing rows and public bust-ups. There were also accusations of cheating.
Speaking about the break-up previously, Curtis said: “It hurt. I wasn’t ready for everyone to know we had split up — I wanted some time.
“It was a shock to see that she had announced it on social media hours later.”
Curtis is now content to remain single for the time being — and insists you will not find him on a dating app any time soon.
He added: “I’m very old-fashioned. I don’t actually like talking to people over a mobile phone or laptop. I’m a very sociable person. I like to be with somebody and talk to them.”
When asked if he had signed up for dating apps such as Tinder, Curtis said: “No.” His older brother, who has been with girlfriend Abbie Quinnen, a fellow dancer, for two years, added: “He’s too lazy for that, honestly.”
The Pritchard brothers have revealed their “end goal” is to become a presenting duo to rival Ant and Dec.
And they are keeping their eyes firmly on that prize — with no distractions.
For dance pro AJ, quitting Strictly just weeks before the pandemic hit put a break on his ambitious career plans.
But dancer AJ Pritchard has no regrets — and no plans to ever go back
Speaking exclusively to The Sun, the 25-year-old, who made it to the latter stages of the BBC1 series last year with YouTube star Saffron Barker said: “I made a decision and I’m very happy with that decision.
“I felt like coming out on what was a complete high.
“That last year with Saffron was a fantastic year, and if you don’t move forward and keep striving for what is your end goal, you won’t be able to make that jump.
“To wait another year just didn’t feel right for me. I won’t ever go back.”
AJ was the second big Strictly name to announce their departure this year, after Kevin Clifton quit the show in March.
In his four years there, AJ’s highest finish was fourth with Team GB gymnast Claudia Fragapane in 2016.
However, his most memorable series came the following year with singer Mollie King from The Saturdays, as the pair were rumoured to be getting close away from the dance floor.
TV chiefs are still trying to replace AJ and Kevin for the upcoming series, which is set to go ahead despite the complications from Covid-19.
AJ is backing plans for the show to return, but admits there will obviously be draw-backs.
He says: “There are things you can do to still work with social distancing, whether that be dances like the Charleston or jive.
“You can create routines where you don’t have to be close together. I think the professional group numbers are the one thing that could fall short this year. Usually the professionals learn them as a group.”
And he joked: “You could replay all the numbers from the past few years — and then I’ll be back on the TV.”
‘WE WANT TO BE LIKE ANT & DEC’
In recent months, AJ and Curtis have got a taste of their dream jobs as a presenting duo with an appearance on the BBC’s Big Night In charity appeal for those affected by coronavirus.
But their ultimate aim is to bag a prime-time Saturday night variety show, such as Britain’s Got Talent, which AJ appeared on as a contestant in 2013 with dance partner Chloe Hewitt.
AJ said: “Our aim is to get roles on big shiny floor TV shows and to become a household name as presenters.
“We want to definitely get our own shows commissioned and be like Ant and Dec.
“My first TV appearance was on Britain’s Got Talent. Doing some presenting on a variety show like that would be an absolute dream for me.”
The boys were tight-lipped on whether they had been in any meetings to discuss their own series yet, but did confirm nothing had been commissioned.
Curtis added: “We would absolutely love to be presenters.
“BGT is a prestigious and incredible show so hosting something like that would be a bit of a dream come true.”
‘I NEVER WANTED TO BE LABELLED DYSLEXIC’
But with both boys suffering from dyslexia, reading autocues on live shows can be extremely difficult.
Instead, they have to learn their lines ahead of time.
AJ said: “Reading the full text and learning lines can be difficult with dyslexia.
“We do work that bit harder, but I think that TV producers see that and adapt to work with us.”
The boys, who this month became ambassadors for the British Dyslexia Association, credit their dyslexia with making them creative people and for steering them towards dancing.
But they were not always pleased with being a bit different.Curtis said: “I never wanted to be labelled dyslexic for a couple of reasons.
“I was scared of it and I thought it was a bad thing — that I’ve got a problem or something, when in reality I couldn’t have been more wrong because it moulded me into the person I am today.
“And really it’s actually made me more creative and expressive and more knowledgeable.” With their creativity and upbeat attitude, all the brothers need now is for the TV industry to come back to full strength after lockdown.
Match of the Day 2 presenter Mark Chapman’s wife dies at 44 after long illness
Daniel and Majella leave fans in stitches as they struggle with live stream
these old things?
Braless Amanda Holden laughs off the attention after ‘old breasts’ joke
Singer Sandy Kelly opens up about lockdown struggle with special needs daughter
Inside Amy Huberman and Brian O’Driscoll’s €1.8m dream home in Rathmines
Kathryn Thomas shares adorable photo of daughter Ellie ‘looking for snails’
And they are confident it will.
AJ said: “We’re both in the same mindset to move forward with that career.
“But the entertainment side will bounce back because people need to be entertained and want to have fun.”
GOT a story? RING The Sun on 0207 782 4104 or WHATSAPP on 07423720250 or EMAIL email@example.com
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The post Love Island’s Curtis Pritchard says he can’t face dating again after split from Maura Higgins following cheating claims | #tinder | #pof | romancescams | #scams appeared first on National Cyber Security.
View full post on National Cyber Security
#nationalcybersecuritymonth | Swiss Govt Says Ransomware Victims Ignored Warnings, Had Poor Security
Switzerland’s Reporting and Analysis Centre for Information Assurance (MELANI) today warned of ongoing ransomware attacks targeting the systems of Swiss small, medium-sized, and large companies.
According to the alert issued in collaboration with the Swiss Government Computer Emergency Response Team (GovCERT), the attackers have asked for ransoms ranging from thousands of Swiss Francs to millions — 1 million CHF is just over $1 million.
Over a dozen of such ransomware attacks that resulted in systems being encrypted and rendered unusable have been reported in recent weeks.
“The attackers made ransom demands of several tens of thousands of Swiss francs, in some cases even millions,” the alert says.
Swiss ransomware victims ignored warnings, had poor security
As MELANI and GovCERT discovered while investigating these ransomware incidents, recommended best practices such as MELANI’s information security checklist for SMEs were not implemented by the victims and previous warnings of such attacks were not taken into consideration.
The Swiss Government-funded cybersecurity body advises businesses not to pay ransoms to avoid becoming involuntary sponsors for the hackers’ ongoing campaigns.
Also, by paying them, businesses don’t have any guarantee that their data will be recoverable using decryption tools provided by the attackers.
It is important that the companies concerned contact the cantonal police immediately, file a complaint and discuss the further procedure with them. As long as there are still companies that make ransom payments, attackers will never stop blackmailing. – MELANI
MELANI also warned both SMEs and large companies that they are still at risk even after paying the ransoms and restoring their systems and data seeing that “the underlying infection from malware such as ‘Emotet’ or ‘TrickBot’ will remain active.”
“As a result, the attackers still have full access to the affected company’s network and can, for example, reinstall ransomware or steal sensitive data from it.”
MELANI said that there are examples of companies from Switzerland and other countries that were ransomed multiple times within short periods of time.
While analyzing the recently reported ransomware incidents, the Swiss cybersecurity body identified a number of weaknesses that allowed attackers to successfully breach the companies’ defenses (all of them can be mitigated by MELANI’s recommendations):
• Virus protection and warning messages: Companies either did not notice or did not take seriously the warning messages from antivirus software that malware had been found on servers (e.g. domain controllers).
• Remote access protection: Remote connections to systems, so-called Remote Desktop Protocols (RDP), were often protected with a weak password and the input was only set to the default (standard port 3389) and without restrictions (e.g. VPN or IP filter).
• Notifications from authorities: Notifications from authorities or from internet service providers (ISPs) about potential infections were ignored or not taken seriously by the affected companies.
• Offline backups and updates: Many companies only had online backups which were not available offline. In the event of an infestation with ransomware, these backups were also encrypted or permanently deleted.
• Patch and lifecycle management: Companies often do not have a clean patch and life cycle management. As a result, operating systems or software were in use that were either outdated or no longer supported.
• No segmentation: The networks were not divided (segmented), e.g. an infection on a computer in the HR department allowed the attacker a direct attack path to the production department.
• Excessive user rights: Users were often given excessive rights, e.g. a backup user who has domain admin rights or a system administrator who has the same rights when browsing the internet as when managing the systems.
Stream of ransomware warnings
Last year, in November, a confidential report issued by the Dutch National Cyber Security Centre (NCSC) said that at least 1,800 companies from around the globe and with operations in various industry sectors were affected by ransomware attacks.
The three file-encrypting malware strains responsible for the infections — LockerGoga, MegaCortex, and Ryuk — relied on the same infrastructure and were previously spotted in attacks that targeted corporate networks and enterprises such as Norsk Hydro and Prosegur.
The Federal Bureau of Investigation (FBI) also warned private sector partners last month about Maze Ransomware operators focusing their attacks on US companies.
This warning came less than a week after the FBI warned private industry recipients about LockerGoga and MegaCortex ransomware infecting corporate systems from the U.S. and abroad in a flash alert marked as TLP:Amber.
“Since January 2019, LockerGoga ransomware has targeted large corporations and organizations in the United States, United Kingdom, France, Norway, and the Netherlands,” the FBI announced at the time.
“The MegaCortex ransomware, first identified in May 2019, exhibits Indicators of Compromise (IOCs), command and control (C2) infrastructure, and targeting similar to LockerGoga.”
Yesterday, the Cybersecurity and Infrastructure Security Agency (CISA) alerted organizations across all critical U.S. infrastructure sectors of a recent ransomware attack that hit a natural gas compression facility and took down pipeline operations for two days.
View full post on National Cyber Security
(Reuters) – Twitter
The accounts were hacked through a third-party platform, a spokesperson for the social media platform said in an emailed statement, without giving further details.
“As soon as we were made aware of the issue, we locked the compromised accounts and are working closely with our partners to restore them,” the Twitter spokesperson said.
A spokesperson for the IOC separately said that the IOC was investigating the potential breach.
Twitter also said Spanish soccer club FC Barcelona’s account faced a similar incident on Saturday.
“FC Barcelona will conduct a cybersecurity audit and will review all protocols and links with third party tools, in order to avoid such incidents,” the soccer club said in a tweet after the hack.
Last month, the official Twitter accounts of several U.S. National Football League (NFL) teams, including the San Francisco 49ers and Kansas City Chiefs, were hacked a few days ahead of the Super Bowl.
Earlier this month, some of Facebook’s official Twitter accounts were briefly compromised.
(Reporting by Akshay Balan in Bengaluru, Editing by Rosalba O’Brien)
The post #nationalcybersecuritymonth | Twitter says Olympics, IOC accounts hacked | News appeared first on National Cyber Security.
View full post on National Cyber Security
The oft-attacked city of Baltimore not only uses mind-bogglingly bad data storage. Its home state, Maryland, also knows how to swiftly propose mind-bogglingly bad legislation that would outlaw possession of ransomware and put researchers in jeopardy of prosecution.
It is, of course, already a crime to use the data/systems-paralyzing malware in a way that costs victims money, but proposed legislation, Senate Bill 30, would criminalize mere possession.
It’s not supposed to keep researchers from responsibly researching or disclosing vulnerabilities, but like other, similar “let’s make malware more illegal” bills before it, SB 30’s attempts to protect researchers could “use a little more work,” as pointed out by Ars Technica‘s Sean Gallagher.
It covers much of the same ground as does Federal law, but SB 30 would take it a step further by labelling the mere possession of ransomware as a misdemeanor that would carry a penalty of up to 10 years imprisonment and/or a fine of up to $10,000.
The draft could get yet more draconian still: Earlier this month, members of the Maryland Senate Judicial Proceedings Committee said they’d actually prefer to make the crime a felony, according to Capital News Service.
The problematic outlawing of “unauthorized access”
Besides mere possession of ransomware, the bill would outlaw unauthorized, intentional access or attempts to access…
…all or part of a computer network, computer control language, computer, computer software, computer system, computer service, or computer database; or copy, attempt to copy, possess, or attempt to possess the contents of all or part of a computer database accessed.
It would also criminalize acts intended to “cause the malfunction or interrupt the operation of all or any part” of a computer, the network it’s running on, and their software/operating system/data. Also verboten: intentional, willful, unauthorized possession or attempts to identify a valid access code, or publication or distribution of valid access codes to unauthorized people.
Where does that leave researchers? Partially protected by a thin blanket that doesn’t protect them from liability, experts say.
The bill does holler out an exemption for researchers, rendered in full caps in the draft:
THIS PARAGRAPH DOES NOT APPLY TO THE USE OF RANSOMWARE FOR RESEARCH PURPOSES.
But that doesn’t cover any of the extensive list of “thou shalt not touch without authorization” aspects of the bill that could spell trouble for researchers and keep them from reporting vulnerabilities. Well-known vulnerability disclosure policy expert Katie Moussouris – the founder and CEO of Luta Security and creator of Microsoft’s bug-bounty program – told Ars that as it’s now worded, the bill would…
…prohibit vulnerability disclosure unless the specific systems or data accessed by the helpful security researcher were explicitly authorized ahead of time and would prohibit public disclosure if the reports were ignored.
The truth is that organizations ignore responsible vulnerability reports all too often. That’s why responsible disclosure programs have reporting windows: once the clock ticks down, plenty of researchers give up on waiting for a response and go ahead and publish vulnerability details. The rationale: the longer a vulnerability exists, the higher the chance it will be exploited by hackers.
Maryland should follow Georgia’s lead and rethink this
SB 30 is currently still under review. Were it to pass in its current form, there is, of course, a chance that the governor might veto it. That’s what happened to the equally, similarly misguided hacking bill, SB 315, that was passed in Georgia in 2018.
From Governor Brian P. Kemp’s veto message:
Under the proposed legislation, it would be a crime to intentionally access a computer or computer network with knowledge that such access is without authority. However, certain components of the legislation have led to concerns regarding national security implications and other potential ramifications. Consequently, while intending to protect against online breaches and hacks, SB 315 may inadvertently hinder the ability of government and private industries to do so.
Hopefully, Maryland’s lawmakers will take a much closer look at the proposed bill and listen to experts like Moussouris. Hopefully, they’ll come to realize that the legislation may very well harm the very people who are working to protect the state.
Latest Naked Security podcast
Click-and-drag on the soundwaves below to skip to any point in the podcast.
The post #comptia | #ransomware | Let’s make ransomware MORE illegal, says Maryland – Naked Security appeared first on National Cyber Security.
View full post on National Cyber Security
Source: National Cyber Security – Produced By Gregory Evans We’ve been chasing ET for millennia with nothing concrete to show for it. Aside from conspiracy theory claims that the US government has an alien spacecraft hidden away somewhere, the search for alien life has been a complete bust. Michael Masters, a professor of biological anthropology […] View full post on AmIHackerProof.com