有个足球雷竞技app网络世界杰里米·柯克 //m.amiribrahem.com EN-US 太阳,2020年5月31日13:44:39-0700 太阳,2020年5月31日13:44:39-0700 https://idge.staticworld.net/nww/networkworld510x510.png 有个足球雷竞技app m.amiribrahem.com网站 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 有个足球雷竞技app m.amiribrahem.com网站 796 288 由于几乎没有选择,公司越来越屈服于勒索软件的需求 2016年4月12日星期二04:00 -0700 杰里米·柯克 杰里米·柯克

Faced with few options, companies are increasingly giving in to cybercriminals who hold their data hostage and demand payment for its return, while law enforcement officials struggle to catch the nearly invisible perpetrators.

The risks to organizations have become so severe that many simply pay their attackers to make them go away -- a strategy that may only embolden the crooks.

It's a case of asymmetric electronic warfare. Ransomware, which encrypts files until a victim pays to have them unlocked, can be devastating to an organization. Barring an up-to-date backup, little can be done aside from paying the attackers to provide the decryption keys.

To read this article in full, please click here

//m.amiribrahem.com/article/3054587/with-lew-options-companies-emergency-yield-to-ransomware-demands.html
Adobe将发布针对Flash漏洞的紧急修补程序 2016年4月11日星期一13:44:09-0700 杰里米·柯克 杰里米·柯克 <本文> <节课=“页面”>

的Adobe正在为它的Flash播放器的紧急补丁后,袭击者据称是利用一个严重的安全漏洞。

该漏洞,CVE-二○一六年至1019年,affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday.

The flaw is being actively exploited on Windows XP and 7 systems running Flash Player versions 20.0.0.306 and earlier.

"Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system," it said.

A patch could be released as soon as Thursday.

To read this article in full, please click here

//m.amiribrahem.com/article/3053564/adobe-to-issue-emergency-patch-for-flash-vulnerability.html
最近的零度闪光日被用来传播Cerber勒索软件 星期四,2016年4月7日11:00:00 -0700 杰里米·柯克 杰里米·柯克

The latest zero-day vulnerability in Adobe Systems' Flash player has been used over the last two weeks to distribute ransomware called Cerber, email security vendor Proofpoint said.

Adobe said it would patch the flaw, CVE-2016-1019, on Thursday. The vulnerability affects all versions of Flash Player on Windows, Mac, Linux and Chrome OS.

Ryan Kalember, senior vice president of cybersecurity at Proofpoint, said his company detected an attack trying to exploit the flaw on Saturday.

One of Proofpoint's customers received an email with a document that contained a malicious macro that led victims through a series of redirects that eventually reached an exploit kit.

To read this article in full, please click here

//m.amiribrahem.com/article/3052170/the-latest-flash-zero-day-was-used-to-spread-cerber-ransomware.html
服务器软件成为勒索软件的软目标 星期二,2016年4月5日18时13分36秒-0700 杰里米·柯克 杰里米·柯克 <文章> <节类=“页”>

有感染的计算机与勒索信号通过网络罪犯在战术的移位,可以把业务的风险更大的另一种方法,根据赛门铁克。

A型勒索称为讪讪已经感染组织,但没有安装在通常的方式。

的“讪讪是在越来越多的勒索软件的变体的另一种变体,但是什么使其有别于其他勒索软件是如何到达its intended targets by way of unpatched server-side software," Symantec wrote.

The perpetrators behind Samsam use a legitimate penetration tool called Jexboss to exploit servers running Red Hat's JBoss enterprise application server.

To read this article in full, please click here

//m.amiribrahem.com/article/3052552/server-software-poses-soft-target-for-ransomware.html
WhatsApp开启端到端加密 2016年4月5日星期二17:47:10-0700 杰里米·柯克 杰里米·柯克

Facebook-owned WhatsApp has strengthened the encryption of its widely used instant messaging app, a development that in theory makes it harder for law enforcement to gain access to communications.

WhatsApp's founders said Tuesday that the application now implements end-to-end encryption, which means only authorized users can decrypt messages.

"The idea is simple: when you send a message, the only person who can read it is the person or group chat that you send that message to," Jan Koum and Brian Acton wrote in a blog post. "No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us."

To read this article in full, please click here

//m.amiribrahem.com/article/3052447/whatsapp-turns-on-end-to-end-encryption.html
特朗普酒店调查可能支付卡违约 2016年4月4日星期一18:47:43-0700 杰里米·柯克 杰里米·柯克

The Trump Hotel Collection said on Monday it is working with the Secret Service and FBI to investigate a possible payment card breach, its second one in less than a year.

The luxury hotel group is run by Republican presidential candidate Donald Trump and his family. 

"Like virtually every other company these days, we are routinely targeted by cyber terrorists whose only focus is to inflict harm on great American businesses," said Eric Trump, one of the candidate's sons, in an email statement. "We are committed to safeguarding all guests' personal information and will continue to do so vigilantly."

News of the breach was first reported by computer security writer Brian Krebs, citing three unnamed sources in the financial sector.

To read this article in full, please click here

//m.amiribrahem.com/article/3051561/trump-hotels-investigating-possible-payment-card-breach.html
CloudFlare旨在阻止更少的合法Tor用户 2016年3月31日星期四17:37:23 -0700 杰里米·柯克 杰里米·柯克 <本文> <节课=“页面”>

CloudFlare的是调整其系统,以使其更容易为合法Tor用户使用其网络提供内容访问的网站。

Tor用户抱怨说,CloudFlare的供电网站过于频繁显示验证码,安全门旨在阻止自动网络漫游和滥用。验证码是你必须解决,以证明你是一个真正的人。

在弯弯曲曲的文字或困惑的问题是,使用Tor的许多计算机所从事的滥用行为,造成的CloudFlare显示CAPTCHA系统检测到时使用Tor网络计算机。

合法Tor用户因此具有较差的浏览体验给出的广泛使用CloudFlare的CDN的。 阅读这篇文章完全,请点击这里 //m.amiribrahem.com/article/3050734/cloudflare-aims-to-block-less-rengal-tor-users.html MedStar Health在怀疑勒索软件攻击后部分恢复服务 2016年3月30日星期三18:07:25-0700 杰里米·柯克 杰里米·柯克 <本文> <节课=“页面”>

MedStar健康周三表示,正在恢复的电脑系统之后的网络攻击,据说涉及的文件加密的恶意软件。

在不以营利为目的的组织,这runs 10 hospitals in the Washington, D.C., area, was hit with ransomware, the Baltimore Sun reported on Wednesday, citing two anonymous sources.

MedStar Health officials could not be immediately reached for comment. The organization issued two statements Wednesday, but did not describe what type of malware infected its systems.

It said in one statement that its IT team has worked continuously to restore access to three main clinical systems. It said no patient data or associate data was compromised.

To read this article in full, please click here

//m.amiribrahem.com/article/3049957/medstar-health-partially-restores-services-after-suspected-ransomware-attack.html
CNBC刚刚收集了你的密码并与营销人员共享 星期二,2016年3月29日19:40:00 -0700 杰里米·柯克 杰里米·柯克

CNBC inadvertently exposed peoples' passwords after it ran an article Tuesday that ironically was intended to promote secure password practices.

The story was removed from CNBC's website shortly after it ran following a flurry of criticism from security experts. Vice's Motherboard posted a link to the archived version.

Embedded within the story was a tool in which people could enter their passwords. The tool would then evaluate a password and estimate how long it would take to crack it.

A note said the tool was for "entertainment and educational purposes" and would not store the passwords.

That turned out not to be accurate, as well as having other problems.

To read this article in full, please click here

//m.amiribrahem.com/article/3049409/cnbc-just-collected-your-password-and-shared-it-with-markets.html网站
美国大型医疗保健提供商的网络被恶意软件关闭 2016年3月28日星期一18:15:00 -0700 杰里米·柯克 杰里米·柯克

A large healthcare provider in the Washington, D.C., area said it has resorted to paper transactions after malware crippled part of its network early Monday.

MedStar Health, a not-for-profit that runs 10 hospitals, said its clinical facilities were functioning and that it did not appear data had been compromised. The malware prevented "certain users from logging into our system."

"MedStar acted quickly to prevent the virus from spreading throughout the organization," it said in a statement posted on Facebook. "We are working with our IT and cybersecurity partners to fully assess and address the situation."

To read this article in full, please click here

//m.amiribrahem.com/article/3048954/large-us-healthcare-providers-network-shut-down-by-malware.html
FireEye表示,黑客正在竞相入侵POS系统 星期一,2016年3月28日十六时40分35秒-0700 杰里米·柯克 杰里米·柯克

Cybercriminals are redoubling efforts to steal payment card details from retailers before new defenses are put in place, according to FireEye.

More than a dozen types of malware were found last year that target point-of-sale systems, the electronic cash registers the process payments at many retailers.

Over the last few years, hackers have successfully breached the systems, targeting weaknesses or software vulnerabilities in order to extract card details to sell on the black market.

As of last October, retailers are liable for fraudulent transactions that are not completed using EMV payment cards, which have a microchip and enhanced security defenses that better shield card data.  

To read this article in full, please click here

//m.amiribrahem.com/article/3048549/fireeye-says-hackers-are-racing-to-declare-pos-systems.html
在央视软件固件错误可能给黑客POS立足点 2016年3月23日星期三23:10:06-0700 杰里米·柯克 杰里米·柯克

A researcher with RSA says faulty firmware found in security cameras sold by at least 70 vendors may be a contributor to many of the credit card breaches that have proved costly to retailers.

Rotem Kerner based his research on a paper RSA published in December 2014 into a malware nicknamed Backoff, which steals payment card details processed by point-of-sale systems.

The U.S. Secret Service and Department of Homeland Security warned in August 2014 that upwards of 1,000 U.S. businesses may have been infected with Backoff.

To read this article in full, please click here

//m.amiribrahem.com/article/3047450/firmware-bug-in-cctv-software-may-have-given-pos-hackers-a-foothold.html
招数这个袋子可以帮助停止Locky勒索软件感染 星期二,2016年3月22日22时08分52秒-0700 杰里米·柯克 杰里米·柯克

A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.

Ransomware is malware that encrypts a computer's files. Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundreds dollars to thousands, payable to cybercriminals in bitcoin.

Locky is a relative newcomer to the ransomware scene, which computer security researchers first saw over the last few months. It is primarily distributed through spam messages that try to trick people into opening attachments, such as fake invoices.

To read this article in full, please click here

//m.amiribrahem.com/article/3047205/this-bag-of-tricks-may-help-stop-a-locky-ransomware-infection.html
叙利亚电子军对Gmail、Facebook的使用不慎 2016年3月22日星期二18:14:52-0700 杰里米·柯克 杰里米·柯克

If you're a hacker, it's a good idea to stay away from Facebook and Gmail to communicate with your colleagues.

Three men, who allegedly were part of a multi-year hacking campaign executed by the Syrian Electronic Army (SEA), left a long digital trail that didn't make them hard to identify, according to court documents.

The U.S. Department of Justice unsealed charges on Tuesday against the men, who are accused of hacking companies and defacing websites.

The SEA, which emerged around July 2011, claimed credit for prominent hacks that sought to support Syrian President Bashar al-Assad. The group targeted the White House, Harvard University, Reuters, the Associated Press, NASA and Microsoft, among others.

To read this article in full, please click here

//m.amiribrahem.com/article/3047199/the-syrian-electronic-army-was-careless-with-gmail-facebook.html
Tor项目说它能很快捕捉到间谍代码 2016年3月21日星期一18:54:38-0700 杰里米·柯克 杰里米·柯克

The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday.

There are worries that Tor could either be technically subverted or subject to court orders, which could force the project to turn over critical information that would undermine its security, similar to the standoff between Apple and the U.S. Department of Justice.

Tor developers are now designing the system in such a way that many people can verify if code has been changed and "eliminate single points of failure," wrote Mike Perry, lead developer of the Tor Browser, on Monday.

To read this article in full, please click here

//m.amiribrahem.com/article/3046845/tor-project-says-it-can-quickly-catch-spying-code.html