IT news, malware, virii, trojans (both kinds), generalized IT sarcasm, 2nd ugliest blog on the net, vaguely related to ThermionicEmissions
Tuesday, January 7, 2020
It's Tuesday. It could be worse. It could be Monday
More malicious Google Play apps.
An unpatched government website just got pwned by an Iranian script-kiddie.
Hey, at least we bombed them.
iPhone ios13 keeps reminding you an app is tracking you. For each app.
Placed over lock screen, fake Win10 desktop tries to scam by pretending to be police, locking your screen for illegal activity
Apparently getting breached over 20 times upsets the FTC. InfoTrax Systems only detected the last breach when the servers went over capacity and has settled with the FTC. Now you know where to go when you need back-end ops systems and MLM software. Be prepared for neck injuries from shaking your head when you read this.
An IT executive embezzled $6 million and just got caught by Word doc metadata.
Microsoft comes through again!
Travelex, an international foreign currency exchange company, got hit with ransomware, demanding $3 million.
Ladies and Gentlemen, this is a business opportunity. Gather a sheaf of papers (or usb drive) with each significant breach listed. Explain backups. Sell them backups and installation. None of these breaches had backups, reliable or otherwise. Also include a patching service, which is another way the ransomware can get in. As for employee clicking, perhaps a flamethrower. Start small.
EA boots linux users of Battlefield V.
F them with fire.
Subscribe to:
Post Comments (Atom)
Corona Malware
This blog has been suspended for a bit because it's practicing social distancing. Or no one reads it. Or I'm too lazy. Or the str...
-
Crafty Web Skimming Domain Spoofs “https” What WHO calling the coronavirus outbreak a pandemic means it means more headlines to bea...
-
Microsoft delivers emergency patch to fix wormable Windows 10 flaw Modern RAM used for computers, smartphones still vulnerable to...
-
The Internet of Things is a security nightmare reveals latest real-world analysis: unencrypted traffic, network crossover, vulnerable OS...
No comments:
Post a Comment