Check Point finally posted a detailed description on how attackers use images on Facebook and LinkedIn to install dangerous malware on a user’s computer/device. (For more on this exploit see the original article.) The installed malware will give the criminal full access to a victim’s computer and possibly encrypt all files on it with Locky Ransomware. … Continue reading Update: Facebook Messenger and Linkedin Users: You are Being Targeted
I was never interested in seeing this film. This may seem surprising as I spend much of my time investigating cybersecurity. However, I had my reasons for this. First of all, I had already watched Citizenfour, the documentary on the Snowden incident. I found it mildly interesting but not compelling. Why would I want to … Continue reading Movie Review: Snowden
Those who predicted the future of technology in the 1950s never even conceived of the internet. The prevailing network of scientific thought at that time constrained logical projections of anything so illogical as a digitally interconnected world. The nuclear battery, unveiled at the University of Bristol’s recent Ideas to Change the World lecture, may be … Continue reading A Cell Phone that Never Needs Charging? How Nuclear Batteries may Make This and Other Dreams a Reality
I’ve been getting a lot of questions on how to tell if an attachment or link is valid or malicious. Although I’ve mentioned these methods in a variety of posts, I’ve never put all of this information in one place. So here it is: a compendium of information on keeping yourself safe from malicious email … Continue reading How can I Tell if Email Links or Attachments are Safe?
It didn’t help that San Francisco’s transportation system, known as Muni, was using old, Windows 2000 servers that haven’t been receiving updates in years. Sure, they may have paid Microsoft to give them special updates, but this doesn’t nullify the fact that exploits for Windows 2000 servers are readily available online. In any event, the … Continue reading SF Metro’s Handling of a Ransomware Attack Deserves Some Credit