Sunday, September 29, 2019

MSPoweruser: Malware that can’t be detected by Windows Defender is spreading by the thousands

MSPoweruser: Malware that can't be detected by Windows Defender is spreading by the thousands.
https://mspoweruser.com/malware-that-cant-be-detected-by-windows-defender-is-spreading-by-the-thousands/

Forbes: Apple Issues New Warning For Millions Of iPhone Users

Forbes: Apple Issues New Warning For Millions Of iPhone Users.
https://www.forbes.com/sites/gordonkelly/2019/09/28/apple-iphone-11-pro-max-upgrade-display-battery-iphone-xs-max-xr-update/

Friday, September 27, 2019

Forbes: The CrowdStrike Conspiracy: Here’s Why Trump Keeps Referencing The Cybersecurity Firm

Forbes: The CrowdStrike Conspiracy: Here's Why Trump Keeps Referencing The Cybersecurity Firm.
https://www.forbes.com/sites/rachelsandler/2019/09/26/the-crowdstrike-conspiracy-heres-why-trump-keeps-referencing-the-cybersecurity-firm/

9to5Mac: New ‘unpatchable’ iOS exploit could lead to permanent jailbreak for iPhone 4s to iPhone X

9to5Mac: New 'unpatchable' iOS exploit could lead to permanent jailbreak for iPhone 4s to iPhone X.
https://9to5mac.com/2019/09/27/ios-unpatchable-ios-exploit-jailbreak-iphone-x/

Thursday, September 26, 2019

Understanding Computer Security

The internet is far more dangerous than it seems. It is not just storing endless information, it is the limitless battleground in a war between good and evil. The Civilization of Cyberspace is the fight for a Digital Democracy. A level playing field as a mathematical platform ruled by the people, instead of dictators, monopolies, criminals, and enemies.
Ken Hamer-Hodges takes a deep dive into the history of computer science to explain the universal model of computation, nature's perfect, future-safe alternative. Kenneth shows how form and function express digital boundaries for the flawless-automation of computer science. It is the only way to secure democracy in a software-run society.
Grab your copy to learn how data-tight cyberspace can be safely colonized. The Cold War Computer cannot resist malware or hackers and Artificial Intelligence will bring catastrophic results. We need the science of mathematical machines. It all began with the Babylonian Abacus.

Wednesday, September 25, 2019

New Book on Computer Security

The Civilization of Cyberspace by K J Hamer-Hodges
Visit www.sipantic.net to place advanced orders.
Cyberspace in the 21st Century and beyond is far more dangerous than anyone appreciates. It is not just endless, poorly guarded information; it is limitless battlegrounds in a software empowered war between good and evil in a conflicted world. Worse still, General-Purpose Computer Science replaces the standards of democracy with corrupt digital dictatorships. The Civilization of Cyberspace is the fight for a Digital Democracy that meets the needs of freedom loving nations. A level digital playing field without the centralized hacker privileges used by isolated mainframes architectures from the Cold War.
A mathematical machine is engineered for the people, instead of dictators, monopolies, criminals, and enemies. Kenneth J Hamer-Hodges wrote this microcode for the first capability-based computer. The PP250 deconstructed statically compiled procedures into dynamic object-oriented machine code, where digital boundaries detect and prevent malware and hacking. He takes a deep dive into the dilemmas of the General-Purpose Computer, using history to explain nature's fail-safe, future-safe machinery of life. A universal model of computation revealed by the Church-Turing Thesis. Kenneth shows how form and function define the DNA of object boundaries needed for the flawless
automation of software that obeys all the laws of the λ-calculus.
The PP250 pioneered this Church-Turing Computer Architecture by adding a λ-calculus meta-machine. Distributing the mathematical powers of software this way protects the future. Crucially, the λ-calculus secures private data in the hands of concerned individuals. A capability controlled, software-run society using a true to form level playing field, where digital computations are data-tight, and the colonization of cyberspace is mathematically pure, equal and just to one and all. The commercial computer is security limited by centralized Identity Based Access Control while increasing complexity plus Artificial Intelligent Malware guarantees impending national disasters. Ken simplifies the opaque art of cyber security to explain, in human terms for all to understand, the need for trusted mathematical machines that began in Babylon with the Abacus.

Tuesday, September 24, 2019

Bloomberg: Snowden’s Book Is a Bestseller -- and a Honeypot for Hackers

Bloomberg: Snowden's Book Is a Bestseller -- and a Honeypot for Hackers.
https://www.bloomberg.com/news/articles/2019-09-23/snowden-s-book-a-bestseller-and-a-honeypot-for-hackers

The Next Web: North Korean hackers are targeting ATMs in India with new data-stealing malware

The Next Web: North Korean hackers are targeting ATMs in India with new data-stealing malware.
https://thenextweb.com/security/2019/09/24/north-korean-hackers-are-targeting-atms-in-india-with-new-data-stealing-malware/

Forbes: Critical Windows Security Warning Issued For Windows 10, 8.1 And 7 Users

Forbes: Critical Windows Security Warning Issued For Windows 10, 8.1 And 7 Users.
https://www.forbes.com/sites/daveywinder/2019/09/24/new-critical-windows-security-warning-for-windows-10-81-and-7-users/

Forbes: Security Warning For 23 Million YouTube Creators Following ‘Massive’ Hack Attack

Forbes: Security Warning For 23 Million YouTube Creators Following 'Massive' Hack Attack.
https://www.forbes.com/sites/daveywinder/2019/09/23/youtube-security-warning-issued-for-23-million-creators-as-massive-hack-attack-confirmed/

Sunday, September 22, 2019

WIRED: Hackers Hit Click2Gov Bill-Paying Portals in 8 Cities

WIRED: Hackers Hit Click2Gov Bill-Paying Portals in 8 Cities.
https://www.wired.com/story/hackers-hit-click2gov-bill-paying-portals

Fox News: 5 essential steps to protect yourself from hackers and online criminals

Fox News: 5 essential steps to protect yourself from hackers and online criminals.
https://www.foxnews.com/tech/5-essential-steps-to-protect-yourself-from-hackers-and-online-criminals

Friday, September 20, 2019

Ars Technica: World’s most destructive botnet returns with stolen passwords and email in tow

Ars Technica: World's most destructive botnet returns with stolen passwords and email in tow.
https://arstechnica.com/information-technology/2019/09/worlds-most-destructive-botnet-returns-with-stolen-passwords-and-email-in-tow/

Forbes: New Android Warning: 500M+ Users Have Installed Apps Hiding Nasty Malware—Uninstall Now

Forbes: New Android Warning: 500M+ Users Have Installed Apps Hiding Nasty Malware—Uninstall Now.
https://www.forbes.com/sites/zakdoffman/2019/09/20/new-android-warning-500m-users-have-installed-apps-hiding-nasty-malwareuninstall-now/

Thursday, September 19, 2019

WannaCry-Aftershock.pdf

Must read paper Here

New ransomware strain uses ‘overkill’ encryption to lock down your PC | ZDNet

Hi, I thought you'd like this: New ransomware strain uses 'overkill' encryption to lock down your PC | ZDNet - https://www.zdnet.com/article/this-ransomware-uses-overkill-encryption-to-lock-down-your-pc/

CIO vs CFO: How digital transformation is changing IT budget decisions | ZDNet

Hi, I thought you'd like this: CIO vs CFO: How digital transformation is changing IT budget decisions | ZDNet - https://www.zdnet.com/article/cio-vs-cfo-how-digital-transformation-is-changing-it-budget-decisions/

Ars Technica: Advanced hackers are infecting IT providers in hopes of hitting their customers

Ars Technica: Advanced hackers are infecting IT providers in hopes of hitting their customers.
https://arstechnica.com/information-technology/2019/09/advanced-hackers-are-infecting-it-providers-in-hopes-of-hitting-their-customers/

Tuesday, September 17, 2019

Naked Security: Simjacker silent phone hack could affect a billion users

Naked Security: Simjacker silent phone hack could affect a billion users.
https://nakedsecurity.sophos.com/2019/09/16/spies-are-using-simjacker-silent-phone-hack/

Monday, September 16, 2019

CNBC: Boeing board will reportedly call for structural changes after 737 Max crashes

CNBC: Boeing board will reportedly call for structural changes after 737 Max crashes.
https://www.cnbc.com/2019/09/15/boeing-board-to-call-for-structural-changes-after-737-max-crashes-nyt.html

ZDNet: The ransomware crisis is going to get a lot worse

ZDNet: The ransomware crisis is going to get a lot worse.
https://www.zdnet.com/article/the-ransomware-crisis-is-going-to-get-a-lot-worse/

Sunday, September 15, 2019

Cointelegraph: Hacker Spends $1K to Win Over $110K in EOS Betting Game Using REX

Cointelegraph: Hacker Spends $1K to Win Over $110K in EOS Betting Game Using REX.
https://cointelegraph.com/news/hacker-spends-1k-to-win-over-110k-in-eos-betting-game-using-rex

Friday, September 13, 2019

Tom's Hardware: Hackers Use CAPTCHA to Launch Phishing Campaign

Thursday, September 12, 2019

ProPublica: Watch a Hacker Install Ransomware

ProPublica: Watch a Hacker Install Ransomware.
https://www.youtube.com/watch?v=9DlrT4AQNYY

Wednesday, September 11, 2019

CRN: The Biggest Tech News For Partners, And The IT Channel: 'This Can't Be Happening': One MSP's Harrowing Ransomware Story

CRN: The Biggest Tech News For Partners, And The IT Channel: 'This Can't Be Happening': One MSP's Harrowing Ransomware Story.
https://www.crn.com/news/security/-this-can-t-be-happening-one-msp-s-harrowing-ransomware-story

Sunday, September 8, 2019

Apple Slaps Google For Stoking Fear Over Massive iPhone Security Breach In Shockingly Rare Rebuttal - Forbes


Hi,

I thought you'd like this:
http://www.forbes.com/sites/jeanbaptiste/2019/09/06/apple-slaps-google-for-stoking-fear-over-massive-iphone-security-breach-in-shockingly-rare-rebuttal/

Apple Slaps Google For Stoking Fear Over Massive iPhone Security Breach In Shockingly Rare Rebuttal - Forbes

Saturday, September 7, 2019

Ios attack

WIRED: An Unprecedented Cyberattack Hit the US Power Grid

WIRED: An Unprecedented Cyberattack Hit the US Power Grid.
https://www.wired.com/story/power-grid-cyberattack-facebook-phone-numbers-security-news

Project Zero: A very deep dive into iOS Exploit chains found in the wild

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking | WIRED

WIRED: Apple Finally Breaks Its Silence on iOS Hacking Campaign

WIRED: Apple Finally Breaks Its Silence on iOS Hacking Campaign.
https://www.wired.com/story/ios-hacks-apple-response

Tom's Hardware: State-Sponsored Chinese Group Hacks Enterprise VPN Servers

Tom's Hardware: State-Sponsored Chinese Group Hacks Enterprise VPN Servers.
https://www.tomshardware.com/news/apt25-hacks-enterprise-vpn-servers-security,40342.html

Sunday, September 1, 2019

CNBC: Google's report on massive iPhone security flaw doubles as dig against Apple's privacy stance

CNBC: Google's report on massive iPhone security flaw doubles as dig against Apple's privacy stance.
https://www.cnbc.com/2019/08/30/googles-iphone-security-report-doubles-as-criticism-of-apple-privacy.html