Read the Latest News & Current Events Related to Telecommunications
Ransomware, a type of malicious software designed to block access to a computer system until a sum of money is paid, is a pandemic spreading across the world affecting all types of organizations. Ransomware payments are typically made via anonymous bitcoin transactions – where ransoms can cost anywhere from $500-$2,000 to unlock an average PC. The impact is spiraling to enormous levels and data collected by the FBI suggests that ransomware payments could reach more than one billion dollars this year. Even with the FBI’s research, it remains hard to scope the full scale of the problem because of the anonymity of cybercriminals and the difficulty of knowing precisely how many anonymous payments have been paid.Continue reading
Federal regulators have approved new broadband privacy rules that make internet service providers like Comcast and Verizon ask customers’ permission before using or sharing much of their data, potentially making it more difficult for them to grow advertising businesses.Continue reading
The invention was presented at the Offshore Energy trade fair in Amsterdam on Tuesday. “It’s a large industrial filter about 8 meters (26 feet) long, made of steel … placed basically on top of buildings and it works like a big vacuum cleaner,” company spokesman Henk Boersen told AFP. The firm describes their invention as the “world’s first giant outside air vacuum cleaner,” according to AFP.Continue reading
An American vigilante hacker — who calls himself “The Jester” — has defaced the website of the Russian Ministry of Foreign Affairs in retaliation for attacks on American targets.Continue reading
Following the large scale cyberattack that took down a number of high-profile sites last Friday, a Chinese electronics component manufacturer has admitted that its products were utilised by the attackers behind the disruption. Hangzhou Xiongmai Technology, which produces DVRs and internet-connect cameras, came forward on Sunday to acknowledge that its products were exploited and that the attackers had taken advantage of security vulnerabilities resulting from weak default passwords. The Mirai malware was used to orchestrate the attack as it can quickly amass large numbers of connected devices. These devices are then used by cyber attackers to launch large-scale distributed denial of service (DDoS) attacks.Continue reading
THIS BLOG claims no credit for any images posted on this site unless otherwise noted. Images on this blog are copyright to its respectful owners. If there is an image appearing on this blog that belongs to you and you do not wish for it to appear on this site, please E-mail with a link to said image and it will be promptly removed.