The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
← Previous pageNext page →

    All about Security, News, Events and Incidents

    Discussion in 'Security and Anti-Virus Software' started by Dr. AMK, Apr 26, 2018.

  1. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Vasudev likes this.
  2. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Vasudev and jclausius like this.
  3. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    6,160
    Messages:
    3,265
    Likes Received:
    2,573
    Trophy Points:
    231
    Take it for what it's worth...


    "MICROSOFT SECURITY INTELLIGENCE REPORT (VOLUME 24: JANUARY – DECEMBER 2018)"

    ...insights culled from a year of security data analysis and hands-on lessons learned Data analyzed includes the 6 5 trillion threat signals that go through the Microsoft cloud every day and the research and real-world experiences from our thousands of security researchers and responders around the world

    https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original
     
    Vasudev and Dr. AMK like this.
  4. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    A hacker intercepted your Wi-Fi traffic and stole your contacts, passwords, and financial data. Here’s how.
    https://hackernoon.com/a-hacker-int...sswords-financial-data-heres-how-4fc0df9ff152
    [​IMG]
    Introduction
    As the holiday season was in full swing, a hacker sporting a hoodie, sitting in a car with antennae on the dashboard and a computer on his lap, sat in a parking lot outside a popular cafe chain. Passersby, busied and high on holiday cheer, buzzed in and out and sometimes even stayed for a while.
     
  5. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    NSA director ponders end of phone metadata program
    CBS News
    Published on Mar 6, 2019
    At a cybersecurity conference in San Francisco, NSA Director Gen. Paul Nakasone acknowledged the agency is contemplating ending its phone bulk data collection program, first made public by former NSA contractor Edward Snowden. CBS News' Olivia Gazis, who interviewed Nakasone on stage, joins CBSN with more.
     
    jclausius, Vasudev and Dr. AMK like this.
  6. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    When President and his entire subordinates uses smartphones and take selfies everywhere (Even un-censored version, ahem!) instead they make use of location tags to indirectly track everyone and twist FB/Twitter's hands to give them moar info!!!!
     
    Dr. AMK likes this.
  7. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild
    https://amp.thehackernews.com/thn/2019/03/update-google-chrome-hack.html
    [​IMG]
    You must update your Google Chrome immediately to the latest version of the web browsing application.

    Security researcher Clement Lecigne of Google's Threat Analysis Group discovered and reported a high severity vulnerability in Chrome late last month that could allow remote attackers to execute arbitrary code and take full control of the computers.

    The vulnerability, assigned as CVE-2019-5786, affects the web browsing software for all major operating systems including Microsoft Windows, Apple macOS, and Linux.
     
    hmscott, jclausius and Vasudev like this.
  8. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Everyone take care: LinkedIn Phishing messages are so many these days:
    The link will try to give you look and feel that you are using OneDrive, but look at the link in the address bar you will notice it's another website. My Antivirus Blocked it as below.


    LinkedIn_Phishing_Link.JPG


    Phishing.JPG




    AV_Block.JPG
     
    Last edited: Mar 9, 2019
    Vasudev likes this.
  9. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Malwares can't bypass NOD32 easily! I thought Onedrive site was genuine. Thanks for posting this info.
     
    Dr. AMK likes this.
  10. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    A couple of sites with security bulletins, articles, links to articles, and goes back with 2100+ pages of links to 2010...still active in 2019:

    Security Shelf
    https://securityshelf.com/

    And, another long time resource, 172 archived pages... 2009, with another link to articles from 2005-2009:

    Krebs On Security
    https://krebsonsecurity.com/
    https://krebsonsecurity.com/page/172/
    https://krebsonsecurity.com/2009/12/story-driven-resume-my-best-work-2005-2009-3/

    And, it looks like Kreb's "Security Fix" blog on the Washington Post, ending 2009, is still accessible, although the top menu Archives link does not do what you expect, so some hunting and clicking was needed.

    Security Fix
    http://voices.washingtonpost.com/securityfix/2009/12/farewell_2009_and_the_washingt.html
    http://voices.washingtonpost.com/securityfix/archives.htm
    http://voices.washingtonpost.com/securityfix/archives.htm#categories
     
    Last edited: Mar 12, 2019
    Dr. AMK and Vasudev like this.
  11. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    How hackers could use smart home devices to spy on you (Marketplace)
    CBC News
    Published on Sep 28, 2018
    Smart home devices are supposed to increase convenience and security, but Marketplace reveals they could actually be making your home, your family and your data more vulnerable, and putting your privacy at risk.


    How hackers take over your accounts using social engineering (Marketplace)
    CBC News
    Premiered Feb 8, 2019
    We reveal how hackers manipulate people, including customer service agents, to give up your personal information to gain access, and take over your wireless services and other accounts. Are the companies doing enough to protect you?
    To read more: https://www.cbc.ca/news/technology/marketplace-social-engineering-sim-swap-hack-1.5009279
     
    Last edited: Mar 12, 2019
    Dr. AMK and Vasudev like this.
  12. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Chinese hackers strike US universities in bid for military technology
    Prominent names feature on the hacking list.
    By Charlie Osborne for Zero Day | March 6, 2019 -- 12:40 GMT (04:40 PST)
    https://www.zdnet.com/article/chinese-hackers-strike-us-universities-in-bid-for-military-technology/

    "Hackers from China have been conducting a cyberattack campaign against prominent universities in the United States in the hopes of stealing valuable information for military purposes.

    The University of Hawaii, the Massachusetts Institute of Technology (MIT), and the University of Washington are among at least 27 universities which have been targeted worldwide, according to the Wall Street Journal.
    (Continuing the ZDNET article...)
    Accenture Security's iDefense is the source of this claim, made in a new research report due to be published this week.

    The cybersecurity defense unit said the "elaborate scheme" is focused on the theft of maritime technology being developed for military applications.

    Educational institutions in Canada and Asia are also on the target list.

    It is believed that the threat actors behind the campaign have utilized phishing tactics in an attempt to compromise university networks, often by posing as partner universities and institutions.

    The cyberattacks launched against these entities were tracked as their networks were pinging Chinese servers thought to belong to hackers known as Mudcarp, Leviathan, APT40, or Temp.Periscope.

    The group in question is believed to be Chinese, and given the hackers' focus on valuable technology and information of interest to the military, it is possible that Mudcarp is state-sponsored.

    Many of the institutes that Mudcarp has fixated on have ties to US oceanographic research institutes.

    Leviathan has been active since at least 2013. Proofpoint researchers saythat the cyberattackers tend to focus their efforts on maritime industries, naval defense contractors, and university research institutions. However, attacks launched by the group have also been traced back to US shipbuilders in recent years.

    In previous phishing schemes, Leviathan has distributed fake job applications and resumes, as well as an interesting malicious email attachment called "Torpedo recovery experiment." Microsoft Word and Excel documents used in these campaigns contained malware payloads made possible through macros.

    FireEye, which tracks the group as APT40, believes the hackers are state-sponsored and operate "in support of China's naval modernization effort."

    APT40 uses a variety of vulnerabilities in the exploit chain including CVE-2012-0158, CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882...

    While Chinese officials did not comment on the research, in the past, China has staunchly denied any involvement in cyberattacks against the United States or other countries.

    The research comes at a time when diplomatic ties between the US and China are strained. The two global giants have been embroiled in a tit-for-tat trade tariff war, a situation heightened by security concerns relating to Chinese tech firms including Huawei.

    The Trump Administration is considering a ban on 5G equipment by way of an executive order. US federal agencies are already forbidden to purchase Huawei products on the grounds of security, but commercial companies -- at least, for now -- still have the freedom in which to do so.

    Reports suggest that Huawei is preparing to sue the US due to the federal ban, and at the same time, the US Department of Justice (DoJ) has filed criminal charges against Huawei's financial chief, Meng Wanzhou, in relation to the alleged theft of trade secrets."

    Chinese Hackers Target Universities in Pursuit of Maritime Military Secrets
    University of Hawaii, University of Washington and MIT are among schools hit by cyberattacks
    By Dustin Volz, Updated March 5, 2019 5:47 p.m. ET
    https://www.wsj.com/articles/chines...suit-of-maritime-military-secrets-11551781800

    Penn State, More Than 2 Dozen Other Universities Targeted By Hackers
    CBS Pittsburgh
    Published on Mar 9, 2019
    Penn State is one of more than two dozen universities that were reportedly targeted by Chinese hackers.
     
    Last edited: Mar 12, 2019
    Dr. AMK likes this.
  13. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Windows 10 Now Automatically Uninstalls Updates That Cause Problems
    https://thehackernews.com/2019/03/windows-buggy-updates.html
    [​IMG]

    Do you always think twice before installing Windows updates worrying that it could crash your system or leave it non-working the day after Patch Tuesdays?

    Don't worry.

    Microsoft has addressed this issue by adding a safety measure that would from now onwards automatically uninstall buggy software updates installed on your system if Windows 10 detects a startup failure, which could be due to incompatibility or issues in new software.
     
    hmscott likes this.
  14. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Cool, now MS can introduce MS patented "mistakes" coming or going. :)

    Maybe we can get a nice patch install / uninstall flipping repeating cycle going?

    6 Minutes ago:

    MS Update: Patch time!
    MS De-Update: Nope, not that one!

    MS Update: Patch time!
    MS De-Update: Nope, not that one!

    MS Update: Patch time!
    MS De-Update: Nope, not that one!

    MS Update: Patch time!
    MS De-Update: Remove patches from last 4 minutes...

    1 minute later:

    MS Update: Patch time!

    PC Owner: Game time?

    MS De-Update: Nope, Patch Time!

    :D
     
    Last edited: Mar 13, 2019
    Dr. AMK likes this.
  15. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    On the eve of Patch Tuesday, Microsoft confirms Windows 10 can automatically remove borked updates
    Install. Uninstall. Boot. Repeat

    https://www.theregister.co.uk/2019/03/12/windows_10_auto_uninstall/
    Microsoft has quietly updated a support document to let us know that Windows 10 will have a crack at uninstalling borked updates – just in time for patch Tuesday.
    Windows 10 endures enjoys a near constant stream of updates and patches to, as Microsoft put it, "keep your device secure and running at peak efficiency". This is all well and good, but as a significant section of customers would agree, things sometimes go wrong and a hasty uninstall is required.
    Microsoft has therefore tweaked Windows 10 to spot a recovery from a failed startup (after all, a reboot after a patch seems de rigueur, even in 2019) and bring a hobnailed boot down on the offending update.
    A cheery message saying "We removed some recently installed updates to recover your device from a startup failure" will be shown to the affected users as Windows 10 attempts to fix things by uninstalling recently installed updates.
    The uninstallation only occurs when all other automated attempts at fixing things have failed.
    To stop Windows Update trying to install what Microsoft has delicately described as "problematic" updates again, the borked patches are blocked for 30 days while engineers work on the issue. Then Windows 10 will have another go.
    All editions of Windows 10 enjoy the automated de-borkage according to the support article.
    We contacted Microsoft to check if this functionality would be able to deal with patches that didn't affect startup but still left the OS a sad place to be, such as the recent 1809 update that caused much upset among Destiny 2 players, or whether it could back out the likes of the whiffy firmware inflicted on some Surface Pro 4 owners over the past year, but we have yet to receive a response. ®
     
  16. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Chinese hackers targeting US Navy: Report
    Fox Business
    Published on Mar 12, 2019
    Center for Security Policy President Fred Fleitz and FOX Business foreign policy analyst Walid Phares discuss a report which stated that the U.S. Navy and its industry partners are “under cyber siege” by Chinese hackers.


    China is becoming more dangerous: Rep. Gaetz
    Fox Business
    Published on Mar 13, 2019
    Rep. Matt Gaetz (R-Fla.) discusses the report that the U.S. Navy is “under cyber siege” by Chinese hackers.
     
    Last edited: Mar 14, 2019
    Dr. AMK likes this.
  17. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    FAA says evidence begins to connect Boeing 737 Max 8 crashes


    I saw a movie few years ago that some bad guys were having an advanced system can hack the Airport system. Those were some angry military crew as I remember.
     
  18. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
  19. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Last edited: Mar 15, 2019
  20. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    The Most ANNOYING Windows Feature - UAC

     
    AlexusR likes this.
  21. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    6,160
    Messages:
    3,265
    Likes Received:
    2,573
    Trophy Points:
    231
    Vasudev, Dr. AMK and hmscott like this.
  22. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    28:02 - US tells Germany to stop using Huawei equipment or lose intel access

    US tells Germany to stop using Huawei equipment or lose some intelligence access

    Letter sent from US Ambassador to Germany
    By Colin Lecher @colinlecher Mar 11, 2019, 3:15pm EDT
    https://www.theverge.com/2019/3/11/18260344/us-germany-huawei-5g-letter-security

    "In one of the most explicit demands yet sent to an ally over Huawei, the United States government has told Germany to drop the Chinese company from its future plans or risk losing access to some US intelligence, The Wall Street Journal reports.

    Huawei has faced accusations from the US that it could be used by the Chinese government for espionage. The company has repeatedly denied that it would act on behalf of China, and pointed out that the US government has not publicly produced any evidence to corroborate the claims, but US officials have remained unconvinced. The Trump administration has been pressing allies to end their relationships with Huawei, but Germany, moving ahead with its plans, has not moved to ban the company from its networks.

    According to the Journal, a letter sent from the US Ambassador to Germany warns the country that the US will stop sharing some secrets if it allows Huawei to work on its next-generation 5G infrastructure. The letter, according to the Journal, argues that network security can’t be effectively managed by audits of equipment or software. While the US plans to continue sharing intelligence with Germany regardless, the Journal reports, officials plan to curtail the scope of that information if Huawei equipment is used in German infrastructure.

    In the US, the battle over the company has continued to escalate. The Justice Department has accused Huawei of stealing trade secrets, and its chief financial officer is facing extradition to the US on suspicion of violating sanctions against Iran. Huawei has denied wrongdoing, and last week, the company upped the stakes even higher when it filed a lawsuit against the US, arguing that a ban on its equipment in the government was unconstitutional."
     
  23. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Android ad fraud scheme drained users' batteries and data
    It mostly affected apps that use Twitter's MoPub ad platform.
    https://www.engadget.com/2019/03/22/android-ad-fraud-scheme-drained-batteries/
    [​IMG]

    BuzzFeed News has confirmed a massive ad fraud scheme, which was originally uncovered by at least two fraud detection firms, that drained users' batteries and data. The scheme begins by hijacking the in-app advertisements of developers using Twitter's MoPub ad platform. It then silently runs autoplaying video ads behind legit banner advertisements, with the users being none the wiser. And since the video ads are still marked as completed even though none of the viewers got to see them, the scheme also rips off hapless advertisers.

    Protected Media, one of the anti-fraud firms that discovered the scheme, absolved Twitter of any wrongdoing -- the social network itself was merely exploited by the fraud's masterminds. Upon investigating the fraudulent ads, the firm named Israeli company Aniview and its subsidiary OutStream Media as part of the scheme. Outstream created the banners and codes the investigators found in the dodgy ads.

    That discovery corroborates a previous investigation by DoubleVerify, another fraud detection firm, which spotted the same MO late last year. DoubleVerify learned that the illegal video ads used Aniview's player, and it also found 60 million ad calls made for fraudulent video ads every month.


    Aniview (Israeli company), however, denied any involvement. Company chief Alon Carmel told BuzzFeed News that the perpetrator is an unknown bad actor who created an account on the platform and used the banner ad images designed by Outstream Media. "To be crystal clear, another customer on Aniview's [self-serve] platform used this [video ad] player and is responsible for this activity and we took actions immediately to stop this activity. We are fighting against bad activities, pushing and focus on clean and legit activities and should not be blamed or framed for bad use of our platform," he said.

    Even if Aniview isn't really involved and has truly squashed all the bad activities originating from its platform, Android users will likely still come across more fraudulent video ads in the future. According to Protected Media, several ad tech companies like Aniview engaged in and even started similar illegal ad schemes in the past.

    Capture.JPG
     
    hmscott likes this.
  24. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,604
    Messages:
    23,561
    Likes Received:
    36,864
    Trophy Points:
    931
  25. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    NSA Whistleblower: Government Collecting Everything You Do
    Empire Files
    Published on Apr 1, 2019
    Abby Martin interviews former Technical Director of the National Security Agency, Bill Binney, who blew the whistle on warrantless spying years before Edward Snowden released the evidence. They discuss the US empire's mass surveillance program and dangers of the Intelligence Industrial Complex.
    Transcript & Links: https://bit.ly/2VkHT9i
     
    Starlight5 and Vasudev like this.
  26. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    6730b, Vasudev and hmscott like this.
  27. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    The problem is that we have living humans in orbit in the ISS that is a huge target for debris hurtling in space that can damage or destroy the ISS living environment, and blowing satellites up in orbit will make things much worse, NASA says 44% worse:

    " At the Q&A session, Bridenstine explained that NASA and the military had assessed the debris field last week, and determined the risk of small debris impacting the ISS was increased by 44 percent, over a period of 10 days. (This came in spite of previous comments from Lieutenant General David Thompson, vice commander of U.S. Air Force Space Command the week before, who said,according to Reuters, that the ISS at that point was not at risk.) Bridenstine said NASA had identified about 400 pieces of orbital debris created by the event (and in all likelihood, there were probably 10 times as many fragments produced). Only about 60 pieces were large enough (at least 10 centimeters in diameter) to be actively tracked."

    The more intelligent, thoughtful, meaningful non-destructive test would be the "near miss".

    Like above ground nuclear testing, I thought there were international rules to stop destructive in orbit testing...

    Hmm, it sounds like India might get a bill in the mail... :)

    India's Anti-Satellite Missile Test Is a Big Deal. Here's Why.
    By Doris Elin Salazar 11 days ago
    https://www.space.com/india-anti-satellite-test-significance.html

    "NASA Administrator Jim Bridenstine touched on testing that creates space debris in a U.S. House of Representatives hearing on NASA's proposed budget on March 27.

    " Debris ends up being there for a long time. If we wreck space, we're not getting it back," Bridenstine said. "And it's also important to note that creating debris fields intentionally is wrong ... because some people like to test anti-satellite capabilities intentionally and create orbital debris fields that we today are still dealing with. And those same countries come to us for space situational awareness because of the debris field that they themselves created.

    "And that's being provided by the American taxpayer, not just to them, but to the entire world for free," he added. "The entire world [has to] step up and say, 'If you're going to do this, you're going to pay a consequence.' And right now, the consequence is not being paid.
    "
     
    Last edited: Apr 9, 2019
    6730b, Vasudev and Dr. AMK like this.
  28. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Great country, land of peace and diversity New Zealand.
    The New Zealand Air Force draws the name of the Allah in solidarity with Muslim victims ... A free lesson in the military ethics of all countries of the world.
    0.jpg
    New Zealand shooting: PM Jacinda Ardern lays wreath at mosque, embraces mourners of Christchurch
     
    Last edited: Apr 9, 2019
    Vasudev likes this.
  29. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    What does the words mean?
    I thought it was a signal of war. It did look like sickle and Trident.
     
    Dr. AMK likes this.
  30. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Allah = الله = The name of God
     
  31. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    What you wrote and what NZ AF wrote are completely different. Don't you think?
     
  32. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    No it's not, but coz it's wrote by planes and smook.
     
    Vasudev likes this.
  33. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    I don't know. I just remember what my friends used to write in their notebooks when they write something in arabic or persian.
     
  34. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Microsoft publishes SECCON framework for securing Windows 10
    https://www.zdnet.com/google-amp/ar...shes-seccon-framework-for-securing-windows-10
    Microsoft publishes simple guide for securing Windows 10 PCs based on five DEFCON-like security access levels.

    Microsoft published today a generic "security configuration framework" that contains guidance for systems administrators about the basic security settings they should be applying in order to secure Windows 10 devices.

    "We sat down and asked ourselves this question: if we didn't know anything at all about your environment, what security policies and security controls would we suggest you implement first?," said Chris Jackson, Principal Program Manager at Microsoft.

    The end result was what Microsoft has named the SECCON framework, which organizes Windows 10 devices into one of five distinct security configurations.

    "Mimicking the DEFCON levels used to determine alert state by the United States Armed Forces, lower numbers indicate a higher degree of security hardening," Jackson said.

    The five possible Windows 10 SECCON security configuration levels are:
    [​IMG]
     
    Vasudev and hmscott like this.
  35. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Hackers publish personal data on thousands of US police officers and federal agents
    https://techcrunch.com/2019/04/12/police-data-hack/
    [​IMG]
    A hacker group has breached several FBI-affiliated websites and uploaded their contents to the web, including dozens of files containing the personal information of thousands of federal agents and law enforcement officers, TechCrunch has learned.
     
    Vasudev, Papusan and hmscott like this.
  36. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,747
    Trophy Points:
    156
  37. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    [​IMG]
    Hackers had access to Outlook.com accounts - Microsoft informs them by mail
    [​IMG] good Morning

    Anyone who uses Outlook.com and receives a mail from Microsoft should not immediately declare it as spam. Because Microsoft is currently writing to an unknown number of Outlook.com users whose data was viewed by hackers.

    Yoo trust Micro$oft? The spy company nr.1. Nope.
     
    Vasudev, hmscott and Dr. AMK like this.
  38. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Does it mean Level 1 is least protected? Much more confusing to follow SECCON. Usually Red means Danger, Yellow = Caution and Green means its Okay/Good.
     
    Dr. AMK likes this.
  39. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Yes you are right about the colors, but in this case the colors are meaningless I think.
     
    Vasudev likes this.
  40. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Yes indeed its more focused for enterprise deployments rather than Home/SOHO deployments.
     
    Dr. AMK likes this.
  41. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    U.S. officials order Chinese company to sell Grindr
    CBS News
    Published on Apr 13, 2019
    U.S. officials have ordered a Chinese company to sell the gay dating app Grindr over national security concerns. CBS News contributor Isaac Stone Fish joins CBSN to discuss.


    What company owns Grindr?
    "Grindr founder and CEO Joel Simkhai has logged off the gay dating app with the purchase of his remaining stake by Kunlun Group Limited, a gaming company based in Beijing. Kunlun first invested in Grindr in January 2016, taking a 60 percent stake for $93 million.Jan 9, 2018"

    Grindr CEO exits with sale to Chinese gaming company
    By Annlee Ellingson – Staff Writer, L.A. Biz
    Jan 9, 2018, 2:32pm PST
    https://www.bizjournals.com/losange...dr-ceo-exits-with-sale-to-chinese-gaming.html

    "Grindr founder and CEO Joel Simkhai has logged off the gay dating app with the purchase of his remaining stake by Kunlun Group Limited, a gaming company based in Beijing.

    Kunlun first invested in Grindr in January 2016, taking a 60 percent stake for $93 million. The investment valued the West Hollywood startup at $155 million.

    In May, the companies announced that Kunlun would buy the rests of Grindr.

    Terms of the deal were not disclosed when the sale closure was announced on Friday, but in May, Reuters reported that the total purchase price would be $152 million.

    At that time, Simkhai also said that he would be staying on at the company, but he is now exiting.

    Yahui Zhou, chairman of the board, will serve as interim CEO, with Vice Chairman Wei Zhou taking on the executive vice chairman and CFO roles, and Facebook and Instagram veteran Scott Chen joining as CTO.

    "We are extremely excited about the excellent work Grindr is doing in becoming a leading global technology company, serving and supporting our users no matter where they are in the world, Yahui Zhou said in a statement.

    Citing the "strength and global reach of our community,” Simkhai added, “I look forward to Grindr and Kunlun's continued commitment to building tolerance, equality, and respect around the world."

    Launched in 2009 and boostrapped until the Kunlun investment in 2016, Grindr is the largest LGBTQ mobile social network in the world with 3.3 million daily active users."


    Rare Grindr Block As U.S. Forces Chinese Owner To Sell
    Kori Hale, Apr 11, 2019, 08:43am
    https://www.forbes.com/sites/koriha...-s-forces-chinese-owner-to-sell/#44dcf15f5133
     
    Last edited: Apr 14, 2019
    Vasudev likes this.
  42. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Unpatched Internet Explorer Zero-Day Exploit Lets Hackers Steal Files hothardware.com | April 14, 2019
    Microsoft is hoping for a big browser comeback with the Chromium-based version of the Microsoft Edge browser, there’s another browser in the company’s repertoire that many people have already forgotten about. Of course, we’re talking about the “undead” Internet Explorer.

    Microsoft has responded to Page's research by stating, "We determined that a fix for this issue will be considered in a future version of this product or service. At this time, we will not be providing ongoing updates of the status of the fix for this issue, and we have closed this case."​

    That seems like a half-baked response to us, and it seems as though this exploit should have Microsoft's full attention rather than simply being "considered." Nice :)
     
    Vasudev and hmscott like this.
  43. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,747
    Trophy Points:
    156
    hmscott, Papusan and Vasudev like this.
  44. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    hmscott and Vasudev like this.
  45. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Any idea if I was hacked? I keep getting lot of spams from few months on Outlook mail.
     
  46. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Don’t be paranoid. But nothing is 100% safe if you use computers. And the big companies which guarantee you safety... They will all fail sooner or later! One after one!
     
    Last edited: Apr 15, 2019
    hmscott, Dr. AMK and Vasudev like this.
  47. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    How Apple’s iCloud authentication system fails to protect your account when using a browser

    Apple’s 2FA iCloud system is generally very diligent about securing your account, especially when you have two devices, but it has one key flaw.

    -------------------------------------------

    ASUS Updates Security Certificates of Motherboards, Graphics Cards, Mini PCs, Workstations [​IMG][​IMG] Guru3d.com | Apr 15, 2019

    [​IMG]
    ASUS is releasing this advisory to provide information related to the new implementation of a tiered certificate structure that upgrades the security infrastructure of our expanding software ecosystem...

    The upgrade requires the current code-signing certificate of several ASUS products to be revoked. This revocation can cause some existing software utilities to trigger a Windows Security dialog box, and may prevent legitimate ASUS programs, such as Aura, AI Suite III, GPU Tweak II and others, from running normally when users attempt to execute the associated 'Setup.exe' or 'AsusSetup.exe' file.
     
    Last edited: Apr 15, 2019
    hmscott and Dr. AMK like this.
  48. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Another sad day,
    Paris prosecutor opens an investigation into the Notre Dame fire

    https://edition.cnn.com/world/live-news/notre-dame-fire/index.html
    From CNN’s Saskya Vandoorne

    [​IMG]
    LUDOVIC MARIN/AFP/Getty Images
    The Paris prosecutor’s office has opened an investigation into the devastating fire at Notre Dame Cathedral, a spokesperson told CNN on Monday.
    Prosecutors will be investigating an "involuntary destruction by fire,” the spokesperson said.

    Notre Dame cathedral spire collapses



    Notre-Dame fire: Treasures that make it so special
    https://www.bbc.com/news/world-europe-47937775
    [​IMG]
    Media captionThere were gasps from the crowd at the moment Notre-Dame’s spire fell
    A catastrophic fire has engulfed the Notre-Dame cathedral in Paris, destroying its roof, toppling the spire and threatening the remaining structure of the building.

    The deputy mayor of Paris, Emmanuel Gregoire, said the cathedral had suffered "colossal damages", and the emergency services were trying to salvage the art and other priceless pieces stored in the cathedral.

    The wooden interior has been destroyed.

    But which other features in the 850-year-old Gothic structure make it stand out in a city of iconic buildings?
     
    Last edited: Apr 15, 2019
    Spartan@HIDevolution and Papusan like this.
  49. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Microsoft's work with Chinese military university raises eyebrows
    APRIL 12, 2019
    https://phys.org/news/2019-04-microsoft-chinese-military-university-eyebrows.html
    xinjiangisho.jpg
    "Xinjiang is home to most of China's Uighur ethnic minority and has been under heavy police surveillance in recent years after violent inter-ethnic tensions

    Microsoft has been collaborating with researchers linked to a Chinese military-backed university on artificial intelligence, elevating concerns that US firms are contributing to China's high-tech surveillance and censorship apparatus.

    Over the past year, researchers at Microsoft Research Asia in Beijing have co-authored at least three papers with scholars affiliated with China's National University of Defence Technology (NUDT), which is overseen by the Central Military Commission.

    The research covers a number of AI topics, such as face analysis and machine reading, which enables computers to parse and understand online text.

    While it is not unusual for US and Chinese scholars to conduct joint research, Microsoft's work with the military-backed NUDT comes amid increasing scrutiny around China-US academic partnerships, as well as China's high-tech surveillance drive in the northwest region of Xinjiang.

    "The new methods and technologies described in their joint papers could very well be contributing to China's crackdown on minorities in Xinjiang, for which they are using facial recognition technology," said Helena Legarda, a research associate at the Mercator Institute for China Studies, who focuses on China's foreign and security policies.

    "Many of these advanced technologies are dual-use, so they could also contribute to the PLA's (People's Liberation Army's) modernisation and informatisation drive, helping the Chinese military move closer to the 2049 goal of being a world-class military," she added.

    In an email, a Microsoft spokesman told AFP that the company's researchers "conduct fundamental research with leading scholars and experts from around the world to advance our understanding of technology."

    In each case, the research "fully complies with US and local laws" and is published to "ensure transparency so everyone can benefit from our work," he said Thursday.

    'Raw material'

    The growing concerns around human rights violations in Xinjiang have also added pressure to US firms with business in the region, where some one million Uighurs and other mostly Muslim Turkic language-speaking minorities are held in re-education camps, according to a UN panel of experts.

    In February, US biotechnology manufacturer Thermo Fisher announced it would stop selling equipment used to create a DNA database of the Uighur minority to China.

    That same month, a security researcher exposed a massive database compiled by Chinese tech firm SenseNets, which stored the personal information and tracked the locations of 2.6 million people in Xinjiang.

    At the time of the data leak, Microsoft was listed as one of SenseNets' partners. The company declined to comment.

    But experts have also stressed that, in the case of NUDT, Microsoft's co-published work is open and publicly accessible.

    "The authors are basically sharing with the rest of the world how to replicate their approaches, models, and results," said Andy Chun, an adjunct computer science professor at City University of Hong Kong.

    That allows others to potentially "build upon, enhance and expand this research," he said.

    Microsoft Research Asia also tends to focus on long-term research or projects that are not immediately transferable to applications, such as those that could be used to monitor or suppress a population of people, pointed out Yu Zhou, a professor at Vassar College, who studies globalisation and China's high-tech industry.

    And while such concerns are certainly valid, it may be difficult for AI researchers to avoid China, she told AFP.

    "It's a field where Chinese researchers have made quite a lot of advancements, and they are generating data which is the raw material for this industry -— so how are you going to avoid that?""


    Is Microsoft AI Helping To Deliver China's 'Shameful' Xinjiang Surveillance State?

    Zak Doffman, Mar 15, 2019, 07:07am
    https://www.forbes.com/sites/zakdof...lance-state-but-its-complicated/#72a0a34e3061

    "When an ethical hacker exposed the SenseNets data breach, shining a light on the technologies including facial recognition being used to track Xinjiang Muslims in real time, there followed an online debate as to whether Microsoft 'partnered' with SenseNets, and whether they were aware of the inclusion of their technology in the dystopian surveillance program that has drawn international condemnation for the subjugation of the Muslim Uighur population of Xinjiang Province.

    The breach by the Shenzhen-based facial recognition company exposed a database of more than 2.5 million records: names and addresses; ID card numbers; dates of birth; passport photographs; employer details; and, most alarmingly, 6.5 million records relating to the GPS locations passed by those individuals in the prior 24 hours.

    Information shared online appears to show the use of Microsoft technology (GitHub and Azure) within the SenseNets program, although Microsoft denies any partnership or commercial relationship with either SenseNets or its parent company. If the information that has been shared publicly is correct, and Azure Cognitive Services are being used, then either this has been procured through a different source or even personally by one or more of the developers themselves. If the technology was there, then it is quite likely to have been (or still be) a fundamental part of the program.

    Microsoft has its own complicated relationship with facial recognition. At the World Economic Forum in Davos this year, CEO Satya Nadella said that “one of the things that I feel today is, in the marketplace, there’s competition; there’s no discrimination between the right use and the wrong use of facial recognition.”

    And nowhere is that lack of discrimination between right and wrong more of an issue than in Xinjiang.

    Victor Gevers, the hacker responsible for publishing the breach and sharing the Microsoft related information, tweeted at the time of the SenseNets breach that, "the company 微软 also known as Microsoft has been a precious partner who has turned more than once a blind eye to the (technical) / (mal)practices of the engineers of SenseNets. From pirated versions of Windows servers to offering Azure Cognitive services for Face (recognition)."..." See site for more...

    Microsoft worked with Chinese military university on AI
    One paper detailed new AI method which would have applications for surveillance
    Wed, Apr 10, 2019, 08:28
    Madhumita Murgia in London, Yuan Yang in Beijing
    https://www.irishtimes.com/business...h-chinese-military-university-on-ai-1.3855553

    How Microsoft Helped Build China’s Nightmare Surveillance | China Uncensored
    China Uncensored
    Published on Apr 15, 2019
    Did you know Microsoft, Google, and many other Western tech companies have partnered with Chinese military universities for research into cutting edge technology, including artificial intelligence, computer deep learning and facial recognition cameras and software. The fruits of this research are currently being used to persecute the ethnic Uighur Muslims of Xinjiang. Even MIT is in on the action.
     
    Last edited: Apr 16, 2019
    6.|THE|1|BOSS|.9 and Papusan like this.
  50. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Papusan likes this.
← Previous pageNext page →