Tag Archive for: Probably

Paying the WannaCry ransom will probably get you nothing. Here’s why.

Last Friday’s massive WannaCry ransomware attack means victims around the world are facing a tough question: Should they pay the ransom?

Those who do shouldn’t expect a quick response — or any response at all. Even after payment, the ransomware doesn’t automatically release your computer and decrypt your files, according to security researchers.  

Instead, victims have to wait and hope WannaCry’s developers will remotely free the hostage computer over the internet. It’s a process that’s entirely manual and contains a serious flaw: The hackers have no way to prove who paid off the ransom.

“The odds of getting back their files decrypted is very small,” said Vikram Thakur, technical director at security firm Symantec. “It’s better for [the victims] to save their money and rebuild the affected computers.”

To read this article in full or to leave a comment, please click here

Network World Security

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency.

The hackers, known as the Shadow Brokers, posted a sample file of the cyberweapons earlier this month and at least some of them appear to be zero-day exploits, or attacks that rely on software defects that practically no one knew about.

Before they were publicly leaked, each of these zero-day exploits could have sold for a great deal of money, according to security researchers. They’re designed to affect firewall and router products from Cisco, Juniper Networks and Fortinet, in addition to those from Chinese vendors.

To read this article in full or to leave a comment, please click here

Network World Security

Automotive cybersecurity; what we don’t hack will probably be used to kill us

Car hacking is not only a “thing” but it’s also a thing that’s in its early days and because there’s the potential for exploits with serious and quite possibly life-threatening consequences, automotive cybersecurity is something we should all be very concerned about.

Just imagine your own car traveling at speed and having your ability to steer, alter speed, and brake, taken away and then being ransomed to regain control.

jeep cherokee kl 3200cc registered july 2014 Charles01 / Wikipedia

Chrysler Jeep Cherokee

To read this article in full or to leave a comment, please click here

Network World Security

Apple’s iOS 10 Code Is Unencrypted, But Probably More Secure

They then pay those hackers for finding the glitches and patch them before they can be exploited by a malicious hacker. While Apple said in its statement that unencrypting the iOS 10 kernel—something it hadn’t done in previous iOS versions—would …
mac hacker – BingNews