These New Hacking Groups Are Striking Industrial Operational Tech Targets

Cyberattacks launched against industrial players, providers of critical infrastructure, utilities, and energy companies – whether oil, gas or renewables – are often less about making a quick buck and more about data theft or causing real-world disruption. The ransomware incidents experienced by Colonial Pipeline and JBS called attention to the ramifications of digital attacks on supply chains. After Colonial Pipeline temporarily halted delivery services to investigate a cyberattack, fuel panic-buying took place across parts of the United States....

April 6, 2023 · 4 min · 726 words · Colleen Allegra

These Old Security Vulnerabilities Are Creating New Opportunities For Hackers

Analysis by cybersecurity researchers at F-Secure suggests that 61% of security vulnerabilities that exist in corporate networks are from 2016 or even older, despite patches being available for five years or more. Some of the vulnerabilities that continue to be exploited to breach networks are more than a decade old. One of the most common unpatched vulnerabilities plaguing businesses is CVE-2017-11882, an old memory corruption issue in Microsoft Office, including Office 365, which was uncovered and patched in 2017, but had existed since 2000....

April 6, 2023 · 3 min · 502 words · Efrain Gee

Third Party Data Breach In Singapore Hits Healthcare Provider

The healthcare services provider said none of its own IT systems, network, and databases were impacted by the breach. It filed reports with both the police and Personal Data Protection Commission, which oversees Singapore’s Personal Data Protection Act. Agape first detected the intrusion on October 19 and “acted immediately” to isolate and suspend use of the system, the vendor said in a statement Monday. “None of our core infrastructure has been compromised,” it said, adding that the breach “appears” to be limited to Fullerton Health....

April 6, 2023 · 3 min · 575 words · Benjamin Welch

This Broken Ransomware Can T Decrypt Your Files Even If You Pay The Ransom

Coded in Python, Cryptonite ransomware first appeared in October as part of a free-to-download open-source toolkit – available to anyone with the skills required to deploy it in attacks against Microsoft Windows systems, with phishing attacks believed to be the most common means of delivery. But analysis of Cryptonite by cybersecurity researchers at Fortinet has found that the ransomware only has “barebones” functionality and doesn’t offer a means of decrypting files at all, even if a ransom payment is made....

April 6, 2023 · 3 min · 544 words · Brian Brauer

This Must Have Screwdriver Has Two Cool Hidden Tricks

Also: 3 security gadgets I never leave home without This compact Wera screwdriver kit solves all that. Here’s a screwdriver kit I can pop into a pocket or bag, and not compromise on quality or power. And this screwdriver has some cool hidden tricks. First, it can go from a stubby to a long screwdriver (and back again) with the press of a button. This is super handy for tackling a variety of jobs....

April 6, 2023 · 3 min · 467 words · Daniel Braun

This Raspberry Pi Is Heading Into Space For A Python Programming Challenge

The UK-designed computer was first put into space by British European Space Agency (ESA) astronaut Tim Peake in December 2015 in the Principia mission. The computers have been programmed by 54,000 students in 26 countries for tasks like looking back at Earth from space and monitoring what crew members are doing on ISS. SEE: Programming languages: Python’s new developer in residence and their ‘make-it-or-break-it’ role ESA flagged two challenges in what it calls called Mission Zero and Mission Space Lab....

April 6, 2023 · 3 min · 541 words · Kimberly Bell

This Simple Drone Mistake Could Cost You Of Thousands Of Dollars

But there’s one area of drone piloting where strict laws, along with substantial penalties, exist. Commercial drone operations. Must read: iPhone bug makes it easy for someone to break your Wi-Fi. Here’s the fix and how to prevent it If you are flying a drone commercially in the US, you need what is called part 107 certification. This is again administered by the FAA, and unlike the recreational certification, which is free and lasts indefinitely, part 107 certification costs $150 and is valid for two years....

April 6, 2023 · 2 min · 269 words · Marie Stamey

Thumbnails Not Appearing In Windows 11 How To Fix

Like seriously, why else would it decide to remove the drag and drop feature from Taskbar, prevent you from changing its size or position, or end up removing the never combine feature? And that’s the tip of the iceberg. With each new quality update, you get a chance to welcome another quality bug, all at no additional effort! While the dust was about to settle, it seems there’s a new addition to this list....

April 6, 2023 · 6 min · 1077 words · Richard Stepp

Time To Update Google Chrome Browser Patches High Severity Security Flaw

The Stable Channel Update for Google Chrome on desktop is for Windows, Mac and Linux versions of the browser. It’s recommended that users apply the security update as soon as possible – something that Google Chrome will do automatically when the browser is closed and reopened. The update fixes CVE-2022-4262, a vulnerability classed as high severity that allows a remote attacker to potentially exploit a Type Confusion issue in Google V8’s javascript engine by causing heap corruption via a crafted HTML page....

April 6, 2023 · 3 min · 435 words · Jason Ciprian

To Stop Quantum Hackers The Us Just Chose These Four Quantum Resistant Encryption Algorithms

NIST, a US standards setting body and research organization within the Department of Commerce, announced the four algorithms after a six-year period assessing potential quantum-resistant (QR) alternatives to today’s cryptographic algorithms for public key encryption, digital signatures, and key exchange. In 2016, NIST asked the world’s cryptographers to devise and then vet potential quantum-resistant methods to secure communications for everything from websites to email. SEE: What is quantum computing? Everything you need to know about the strange world of quantum computers Today’s key algorithms include AES-256 for symmetric key encryption, SHA-256 and SHA-3 for hashing functions, RSA public key encryption for digital signatures and key establishment, Elliptic Curve Cryptography (ECDSA, ECDH) and DSA public key encryption for digital signatures and key exchange....

April 6, 2023 · 4 min · 749 words · Linda Eldridge

Twitter Handle Swatter Jailed After Victim Dies Following Home Raid

The victim, Mark Herring, was a resident of Tennessee and owned the Twitter account @Tennessee, which happened to be a sought-after name. As reported by the Washington Post, the coveted handle was the object of Shane Sonderman, who was just under 18 years old at the time. Sonderman, together with co-conspirators, attempted to coerce Herring into giving it up by intimidating him and his family. These methods included harassing texts, cash-on-delivery food orders, and phone calls, the aim being to obtain the handle and then sell it on....

April 6, 2023 · 2 min · 386 words · Robert Steinle

Uber Freight Acquires Logistics Firm Transplace For 2 2B

Once the deal closes, Uber says it will have one of the largest managed transportation and logistics networks in the world. The deal should also help the Uber business segment speed up its path to profitability. Uber Freight is a relatively small segment of Uber, but it is growing quickly. During Uber’s last-reported quarter, the business segment brought in $301 million in revenue, up 51% year-over-year. Its adjusted EBITDA was negative $29 million....

April 6, 2023 · 2 min · 288 words · Tom Horn

Updates Released For Multiple Vulnerabilities Found In 42 Gears Suremdm Products

Immersive Labs published a detailed breakdown of the vulnerabilities – one of which is critical – that affect SureMDM’s Linux agent and the web console. Kevin Breen, director of cyber threat research at Immersive Labs, told ZDNet that the company says it has more than five million successful deployments worldwide and 18,000 customers. It is unclear how many use the products affected by the issues they discovered, but Breen said anyone using the Linux version listed in the post was vulnerable to those vulnerabilities....

April 6, 2023 · 4 min · 724 words · Rosemary Muller

Us Australia And Japan Stump Up For Subsea Cable Between Nauru Kiribati And Federated States Of Micronesia

The new cable will connect the island containing the capital of Kiribati with Nauru and the island of Kosrae in FSM, before connecting with the Hantru-1 cable at the island of Pohnpei in FSM. A joint statement between the six nations said the cable would provide better connectivity to 100,000 people across the three Pacific nations. “We will continue to coordinate closely with the World Bank and the Asian Development Bank to ensure this project complements investments by these institutions to enhance digital connectivity in FSM, Kiribati, and Nauru,” the statement said....

April 6, 2023 · 2 min · 298 words · Jeanette Lovelace

Us President Biden Signs Law To Ban Huawei And Zte From Receiving Fcc Licences

The legislation, Secure Equipment Act of 2021, will require the Federal Communications Commission (FCC) to adopt new rules that clarify it will no longer review or approve any authorisation applications for networking equipment that pose national security threats. Last year, the FCC formally designated Huawei and ZTE as national security threats, with that decision being made as the agency found that both companies had close ties to the Chinese Communist Party and China’s military apparatus....

April 6, 2023 · 3 min · 428 words · Susan Martinez

Using Home Security To Protect Your Prescription Drugs

Which medications are the target of theft? Opioids: Opioids are used to reduce the intensity of pain and are highly addictive. Even when used as prescribed by your doctor, long-term use of opioids can lead to addiction, which is why opioids are mainly used in short bursts after major events like surgery. Before prescribing, doctors should abide by the CDC Guideline for Prescribing Opioids for Chronic Pain. CNS Depressants: Central nervous system depressants are a class of tranquilizers and sedatives that are used to treat anxiety and sleep disorders....

April 6, 2023 · 10 min · 1936 words · Karen Elmore

Vivaldi Now Offers A Built In Mail Client That S Pretty Fabulous

Vivaldi is also a calendar. It’s also an RSS feed reader. And now, it’s also an email client. That’s right, the developers of the Vivaldi web browser have integrated a full-blown email client, so you don’t have to either deal with web-based clients or work with yet another application window on your desktop. As to the Vivaldi Mail features, it includes such things as: IMAP, POP3, Gmail, iCloud, and Outlook supportLabels, filters, and a powerful search toolUnseen/unread countersCustom keyboard shortcutsIntegrated Feed readerShow/hide read email, mailing lists, custom folders, feed, junk, and trashSave searchesMessage queuing and batch sendingInvite management with Vivaldi Calendar integration...

April 6, 2023 · 3 min · 606 words · Raymond Gordon

Want A Next Gen Set Of Wheels Try This Auto Balancing Hoverboard

We’re not sure exactly when it happened, but hoverboards have officially gone from a curious toy to a legit mode of transportation. You can see them zooming around the streets of almost any city now, but where did they come from all of a sudden? They’ve likely gone mainstream for the same reason any tech finally breaks through: The performance has gotten better and the price has gone down. There’s no better example of that than the Hover-1 Electric Self-Balancing Scooter Ranger, which is now available for less than $130 as a factory remanufacture....

April 6, 2023 · 2 min · 283 words · Teri Dunn

Want To Be A Cmo Here S What You Need To Know

Today’s chief marketing officers must consider the bigger picture: how can their company stand out in a competitive field? How does customer experience play a role in their company’s success? What do customers want throughout the entire lifecycle and buying journey? And, can the company meet those buyers’ needs? These questions go beyond marketing efficiency, pushing the boundaries of marketing innovation to move the needle on sales, customer loyalty, and lifetime customer value....

April 6, 2023 · 6 min · 1094 words · John Shellhamer

Watch Face And Aod Not Working In Galaxy Watch 4 After Update

However, in some instances, the update could end up bringing a few bugs and issues as well. And this seems to be the case this time around. The latest update for the EU region (version XXU1EVA8/OXM1EVA8) seems to have broken the AOD functionality. According to various users, the Always-on Display is no longer in sync with the device time, as it doesn’t update itself after every minute (something that used to happen before users installed that update)....

April 6, 2023 · 3 min · 577 words · Ruben Hahn