…Not that we’re exactly in the post-WannaCryptor era yet. But forgive me if you’ve heard enough of the saga of the ransomware ESET calls Win32/Filecoder.WannaCryptor.D (after just a few days, I certainly have). Craig Williams, of the company Gigabyte IT Solutions on St. Helena, mailed me wondering about my take on the issue.* Here are a […] The post WannaCryptor Afterthoughts… appeared first on ITsecurity. Source: http://itsecurity.co.uk
Even XP, Windows 8, and Windows Server 2003 systems can now be patched against the vulnerability exploited by WannaCrypt. Patching is highly recommended! The post WannaCryptor: XP, Win8, WinServer 2003 patches appeared first on ITsecurity. Source: http://itsecurity.co.uk
My first thoughts on Macron’s victory were that democracy had prevailed. But second thoughts made me wonder. We’re too accustomed to thinking of democracy in old-fashioned Left (socialist) and Right (fascist) terms. Democracy is the peoples’ decision anywhere between left and right. But there is a new (or at least only recently so overt) political […] The post Did democracy win with Macron? Doubtful appeared first on ITsecurity. Source: http://itsecurity.co.uk
Pump and Dump spam campaign still piling on the improbabilities. The post Still Pumping and Dumping appeared first on ITsecurity. Source: http://itsecurity.co.uk
Artificial Intelligence and Games While most of the tech media’s ‘next big thing’ buzz is still focused on VR, that technology is beginning to settle into the early days of its role. Gaming and technology blogs will soon be looking for a new source of excitement. With some of the recent products and demonstrations, it […] The post Artificial Intelligence in the Real and Virtual Worlds appeared first on ITsecurity….
A few years ago, even before I started working directly with vendors in the security industry, ‘Pump and Dump’ scams were a major nuisance. Here’s a description from a paper Andrew Lee and I wrote after I started working with ESET. Pump and Dump (or Hype and Dump) mails are designed to inflate the value […] The post All Hands to the Pump (and Dump) appeared first on ITsecurity. Source:…
Soon coming to the Internet of Things (IoT) is the Injunction of Technology (IoT). In another post I noted that my WiFi router’s power brick had a UL certification, yet the actual WiFi router had nothing similar stating it was safe to use on the Internet. In addition, nothing to ensure it would not hurt […] The post Injunction of Technology (IoT) appeared first on ITsecurity. Source: http://itsecurity.co.uk
The Hardware Hacker by Andrew Huang is not quite what you would expect from looking at the cover. There might be an expectation of page after page of schematics, code, circuit diagrams and…well, hardware – but what this book has to offer is much more than that. Andrew Huang makes what could easily be a […] The post Book Review: The Hardware Hacker appeared first on ITsecurity. Source: http://itsecurity.co.uk
2016 is likely to prove a pivotal year in contemporary history. Two major votes saw the US election of President Trump and the UK exit from the European Union. It was a right-wing populist swing for UKUSA – and I called both votes wrong. I expected both to be close, but the other way round. […] The post Trump, Brexit and the Norns appeared first on ITsecurity. Source: http://itsecurity.co.uk
2016’s slew of Virtual Reality devices are now being considered ‘Generation 1’ in terms of VR. This isn’t an entirely accurate viewpoint. Even discounting earlier attempts at Virtual Reality not created for the mass market and the VR machines intended for use in arcades, the gaming market has seen an earlier entry in the form […] The post Will Virtual Reality Technology see a second generation? appeared first on ITsecurity….