How a ransomware attack cost one firm £45m
Imagine the excitement when hackers gained a foothold in the computer system of Norsk Hydro, a global aluminium producer.
We don't know when it was, but it's likely that once inside they spent weeks exploring this group's IT systems, probing for more weaknesses.
When they eventually launched their ransomware attack, it was devastating - 22,000 computers were hit across 170 different sites in 40 different countries.
Imagine the hacker's anticipation as they waited to receive a reply to their ransom note. After all, every minute counts for a modern manufacturing powerhouse. They probably thought they could name their price.
But the reply never came. The hackers were never even asked how much money they wanted. Imagine the shock.
The Linux desktop is in trouble
For example, better Linux desktops, such as Linux Mint, provide an easy way to install applications, but under the surface, there are half-a-dozen different ways to install programs.
The broad strokes of the Linux desktop are painted primarily by Canonical and Red Hat, but the desktop is far from their top priority. Instead, much of the nuts and bolts of the current generation of the Linux desktop is set by vendor-related communities: Red Hat, Fedora, SUSE's openSUSE, and Canonical's Ubuntu.
It is not easy building and supporting a Linux desktop. It comes with a lot of wear and tear on its developers with far too little reward.
Flatbed Scanners Used as Relay Point for Controlling Malware in Air-Gapped Systems
For this technique to work, two conditions must be met. First, the flatbed scanner lid must be left open in an upright position so an attacker can aim light beams at its sensors.
Second, an attacker must find a way to install malware on an air-gapped system.
Similarly, scientists hacked a smart lightbulb that was installed in the same room as the air-gapped PC, and made it pulsate in a controlled manner that relayed commands to the scanner, and to the attached air-gapped PC.
New ASLR-busting JavaScript is about to make drive-by exploits much nastier
The attack uses simple JavaScript code to identify the memory addresses where system and application components are loaded. When combined with attack code that exploits vulnerabilities in browsers or operating systems, the JavaScript can reliably eliminate virtually all of the protection ASLR provides.
Given how crucial caching is to the performance of modern CPUs, the researchers say architectural fixes are likely to be too costly to be feasible.
"We hence recommend ASLR to no longer be trusted as a first line of defense against memory error attacks and for future defenses not to rely on it as a pivotal building block."
Tech Industry Warns Against French-German Plans To Weaken Encryption
A new European Commission proposal could undermine the confidentiality of encrypted communication. A new “ePrivacy proposal”, expect end of this year, would likely include a loophole for governments to request access to encrypted data.
The following can be attributed to CCIA Europe Director, Christian Borggreen:
“We are worried that EU proposals can allow governments to challenge end-to-end encryption and thus threaten the security and confidentiality of Europeans’ communications.”
New Plastic For Old Amigas and Commodores
Amiga enthusiast Philippe Lang has created a new Kickstarter campaign to design and build new, improved molds for Amiga 1200 housings and do a licensed production run using anti-UV ASA plastic in the original color plus black, transparent, and 9 other colors. His team is also investigating the feasibility of producing new Amiga 1200 keyboards if this campaign succeeds.
Lenovo has been selling laptops that come loaded with Superfish 'malware'
Computer manufacturer Lenovo is being criticized for selling laptops that come pre-installed with invasive software, which many users are calling malware.
There are reports that Superfish is carrying out what's known as a "man in the middle" attack — impersonating the security certificates of encrypted websites to let it serve up its ads.
Lenovo says it has now "temporarily removed Superfish from our consumer systems until such time as Superfish is able to provide a software build that addresses these issues."
The Almost forgotten Story of the Amiga 2000
Steve Jobs was quoted that he wanted to" Make a dent in the Universe", and now,everyone (other than Amiga users) wants to change the history books and erase Commodore and the Amiga from history but, there actually was one Amiga that truly changed the world.
TV shows like "Home Improvement" to the Pilot of Babylon 5, to Seaques DSV took full advantage not only of the A2000 with a Video Toaster, but of the 3D animation software that came with the VT called "Light Wave". LightWave also made movies like "Jurasic Park" Possible, because without test animations for it, it would have ended up a "stop motion" dinosaurs (it was originally planed as stop motion and miniatures like the old harryhausen movies).
NASA chose the Amiga over the Apple, because they could make and developed their own custom hardware. When they asked Commodore for documentation, Commodore sent them palettes full of books, schematics and software. In Fact, Some Amiga's were being still used at NASA up until 2003.
The NSA has nearly complete backdoor access to Apple's iPhone
An NSA program called DROPOUTJEEP allows the agency to intercept SMS messages, access contact lists, locate a phone using cell tower data, and even activate the device’s microphone and camera.
“Either [the NSA] have a huge collection of exploits that work against Apple products, meaning they are hoarding information about critical systems that American companies produce, and sabotaging them, or Apple sabotaged it themselves,” Appelbaum said at the Chaos Communication Conference in Hamburg, Germany.
U.S. says Chinese government behind cyberespionage
The Chinese government and military have engaged in widespread cyberespionage targeting U.S. government and business computer networks, the Pentagon said Monday.
"In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military," the report said.
In March, the Obama administration demanded that China end its "unprecedented" campaign of cyberespionage, warning that the hacking activity threatens to derail efforts to build stronger ties between the two countries.