Tag Archive for: rules

5 new rules ransomware gangs play by nowadays: Kaspersky report


Over the last few years, technology has moved ahead immensely, and alongside so has the ways cybercriminals distribute malware and ransomware since the older, now common, methods no longer work. Till some time ago, cybercriminals would use encrypted files to spread ransomware on a large scale, now ransomware attacks have become more focused. Nowadays, cybercriminals and hackers examine their targets in detail and do their research so as they can gain additional leverage. Ransomware gangs behave like fully-fledged online service providers and use traditional marketing techniques. Experts at Kaspersky have identified five examples of how these ransomware distribution methods, and how they work, have altered by studying the Darkside ransomware gang as an example.

1. Darkside actively establishes contact with the press.

On the Darkside website, there’s a semblance of a press center set up to enable journalists to ask questions and receive first-hand information, and to learn about upcoming publications of stolen information in advance. In fact, DarkSide operators strive to get as much resonance in the networks as possible.

2. Ransomware groups collaborate with decryption companies.

As the Kaspersky report points out, this is evident because many state-owned companies are prohibited from entering negotiations with cybercriminals. This has created a demand for intermediaries like decryption companies, who provide legitimate data decryption services.

3. Darkside claims to donate part of their income to charity.

They show those who do not want to finance crime, that some of their money will go to a good cause. However, some charities are prohibited from accepting illicit money, and such payments would be frozen.

4. The cybercriminals now carefully analyze stolen data and the market.

Before publishing information, they study the contacts of the company and identify well-known customers, partners, and competitors. Kaspersky experts state that the main purpose of this is to maximise target damage, to intimidate victims, and to increase the chances of getting a ransom.

5. The Darkside ransomware gang now has its own code of ethics.

There’s honour among criminals, just like in real enterprises….

Source…

Cyber Daily: WHO Plans Security Rules for Covid-19 Vaccine Receipts


Hello. The World Health Organization is working on technical details and privacy standards for digital Covid-19 vaccine certificates to give individuals proof of immunization, WSJ Pro’s Catherine Stupp reports. Two aspects are crucial: Individuals should be able to delete their data from the certificates and technology providers shouldn’t be allowed to profit from the data they handle.

Other news: Apple removed Wimkin social-media platform from App Store over calls to violence; Italy, India push back on WhatsApp privacy changes; U.S. warns about intense attacks on cloud services; convicted hacker faces new fraud charges.

Weekend reading: Security chiefs reckon with supply chain security after
SolarWinds

hack; Social-media watchdogs find extremist threats; White House issues maritime security plan.

Readers: Our newsletter won’t be published Monday in observance of the

Dr. Martin Luther King Jr.
holiday.

Covid-19 Vaccination Data

WHO plans privacy, security rules for Covid-19 vaccine certificates. The World Health Organization is working with Estonia and a group of around 150 volunteer privacy, governance and other experts to determine how an international system for verifying individuals’ vaccine history could work. Specifications are expected by the end of the first quarter.

“There’s a very strong sense of urgency for getting the economy working and the citizens of each country would like to start traveling again in a safe way,” said Marten Kaevats, an adviser to the Estonian government on technology issues.

But any technology used to help people travel and avoid infection during the pandemic needs to keep data secure. Estonia started tests this week of a certificate built on blockchain technology.

Read the full story.

Quotable

“I can’t fault them for looking at it. I just wish they would give us a chance.”

— Jason Sheppard, founder of social-media platform Wimkin, on Apple removing the app from the App Store over content, since removed, that included calls for a civil…

Source…

Black Friday: Never break these 6 rules when buying tech gifts


apple-iphone-gift-wrapping-bow-9068

A shiny iPhone 12 makes for a great gift, but you should do some research before buying it for someone else. 


Angela Lang/CNET

This story is part of Holiday Gift Guide 2020, CNET’s gift picks with expert advice, reviews and recommendations for the latest tech gifts for you and your family.

Black Friday is less than a week away, meaning it’s nearly time to start saving money when you’re shopping for holiday gifts. With the holidays getting closer, time is running out to think over exactly what you’re going to give to that special someone or distant relative. But before you make that decision, keep in mind that tech gifts can be the same as giving someone a surprise puppy or kitten — just without the mess to clean up after. 

Gadgets can be personal, with a mess of unintended consequences, like saddling someone with the cost of buying extra gear, landing them with a monthly subscription or exposing their privacy in a way that makes them uncomfortable.

New phoneslaptopssmart speakers and other electronic devices can make a great present, since these devices are a means to work, play, communicate with friends or, with a gadget like a Kindle or game console, temporarily escape. They add value to a person’s life.

But gifter, beware. Keeping in mind that privacy, security and compatibility issues will go a long way in helping you make sound decisions as you shop for new phones and other gadgets. Let’s take a closer look at some best practices you should keep in mind. 

Read more: Best places to sell your used electronics   

Watch out for extras someone else will have to buy

No matter what type of device you end up buying as a gift, keep any extra accessories it may require in mind. Ask yourself — or the salesperson — if the device is ready to use right…

Source…

Rules, precedent were ignored to push through anti-farmer Bills in Rajya Sabha – The Indian Express

Rules, precedent were ignored to push through anti-farmer Bills in Rajya Sabha  The Indian Express
“HTTPS hijacking” – read more