News from the World of Computers
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
The research team, spread across Brazil and China, trained the cyberpup to identify red imported fire ants, which are wreaking havoc in environments across the globe. The robot dogs are pretty good at their job, too. According to researchers, they identify three times more nests with greater precision compared to human inspectors.
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"This Terrifying New Email Scam Is Stealing People's Money"
Sounds like a scene out of a horror film, right? Instead, it’s one of the latest phishing scams.
Like many other email and text scams, this particular extortion scheme uses specific personal information to deceive people into sending money. The email convinces people the hacker knows more about them and that they must exchange payment or Bitcoin in order to keep their information safe.
“I received a PDF over email that included my address and photo of the address and made outrageous claims about my private behavior, and claimed to have video documentation captured from spyware on my computer,” Jamie Beckland, a chief product officer at the tech company APIContext, told HuffPost. “The scammer threatened to release the video if I didn’t pay them via Bitcoin.”
If you get a similar email, here are the steps you can take to figure out if it’s a scam so you protect yourself...
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"Report: Over 100M Americans Rely on Vulnerable Water Systems"
The Environmental Protection Agency's inspector general reviewed more than 1,000 drinking water systems serving 193 million people nationwide, identifying 97 systems with critical or high-risk cybersecurity vulnerabilities that affect 26.6 million people. Another 211 systems, serving over 82.7 million, were flagged for issues such as "externally visible open portals."
The report warns that a one-day disruption in water service across the U.S. "could jeopardize $43.5 billion in economic activity" in addition to generating public health concerns.
The inspector general also found that the EPA lacked a cybersecurity incident reporting system for water and wastewater system owners and operators to report potential breaches or vulnerabilities.
"This challenge is not hypothetical," the report warned, noting how recent high-profile incidents at water systems "demonstrated the urgency needed to address cybersecurity weaknesses and vulnerabilities to physical attacks."
The report comes after the largest water utility in the country was hit with a cybersecurity incident that led to the shutdown of its customer portal in October. New Jersey-based American Water, the largest regulated water and wastewater utility in the U.S. serving over 14 million people across 14 states and 18 military installations, reported it had discovered unauthorized activity in its computer networks and systems caused by a cyber incident (see: Largest US Water Utility Hit by Cybersecurity Incident).
In September, the FBI and Department of Homeland Security also said federal law enforcement was investigating a cyberattack on a water treatment facility in Arkansas City, Kansas.
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"Chinese hackers used a ‘range of sophisticated methods’ to breach US telecom providers, insider says"
The group, dubbed Salt Typhoon by the cybersecurity community, deployed a “range of sophisticated methods” to break into the telecom companies’ systems and conduct a prolonged espionage campaign that’s ensnared dozens of telecommunications and internet providers inside and outside the U.S., said the person, who spoke on the condition of anonymity because they were not permitted to publicly relay their understanding of the events.
"UK warning: Russia’s ‘aggressive’ cyber warfare is threat to NATO"
Russia is “exceptionally aggressive and reckless in the cyber realm,” Cabinet Office Minister Pat McFadden, whose portfolio includes national security, is expected to tell participants at a NATO cybersecurity conference in London on Monday.
“Given the scale of that hostility, my message to members today is clear: No one should underestimate the Russian cyber-threat to NATO,” he will say, according to prepared remarks shared in advance by his ministry.
"Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online"
The analysis, which comes from attack surface management company Censys, found that 38% of the devices are located in North America, 35.4% in Europe, 22.9% in Asia, 1.7% in Oceania, 1.2% in South America, and 0.5% in Africa.
The countries with the most ICS service exposures include the U.S. (more than 48,000), Turkey, South Korea, Italy, Canada, Spain, China, Germany, France, the U.K., Japan, Sweden, Taiwan, Poland, and Lithuania.
The metrics are derived from the exposure of several commonly-used ICS protocols like Modbus, IEC 60870-5-104, CODESYS, OPC UA, and others.
One important aspect that stands out is that the attack surfaces are regionally unique: Modbus, S7, and IEC 60870-5-104 are more widely observed in Europe, while Fox, BACnet, ATG, and C-more are more commonly found in North America. Some ICS services that are used in both regions include EIP, FINS, and WDBRPC.
Cybersecurity
What's more, 34% of C-more human-machine interfaces (HMIs) are water and wastewater-related, while 23% are associated with agricultural processes.
"Many of these protocols can be dated back to the 1970s but remain foundational to industrial processes without the same security improvements the rest of the world has seen," Zakir Durumeric, Censys co-founder and chief scientist, said in a statement.
"Coast Guard Warns of Continued Risks in Chinese Port Cranes"
Cranes manufactured by state-owned Chinese companies account for nearly 80% of all heavy lift gantry cranes used to load and unload container ships at American ports. Their design can include remote control, Coast Guard said in a Tuesday notice. A February executive order gave the Coast Guard new authorities to help improve cyber conditions at ports nationwide.
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"USPS warns about package tracking 'smishing' text messages: Here's what to know"
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"US government tells officials, politicians to ditch regular calls and texts"
Right now.
In written guidance released on Wednesday, the Cybersecurity and Infrastructure Security Agency said "individuals who are in senior government or senior political positions" should "immediately review and apply" a series of best practices around the use of mobile devices.
The first recommendation: "Use only end-to-end encrypted communications."
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"Did you get a package you didn't order? It may be a brushing scam."
These so-called brushing scams have been around for a few years and there's a few varieties. They can range from a "victimless" crime to one that involves scanning a QR code to find out who the package is from.
That could lead consumers to a site tricking them to enter personal information, similar to a phishing scam. In some cases, malicious QR codes could also install malware to steal information from the consumer's phone.
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"From passwords to medical records,10 things to never say to AI bots"
Artificial intelligence bots are owned by tech companies known for exploiting our trusting human nature, and they’re designed using algorithms that drive their profits. There are no guardrails or laws governing what they can and cannot do with the information they gather.
When you’re using a chatbot, it’s going to know a lot about you when you fire up the app or site. From your IP address, it gathers information about where you live, plus it tracks things you’ve searched for online and accesses any other permissions you’ve granted when you signed the chatbot’s terms and conditions.
The best way to protect yourself is to be careful about what info you offer up.
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"The North Korea worker problem is bigger than you think"
This swarm of technical North Korean experts isn’t just intruding businesses as ad hoc freelance IT workers; they’ve gained full-time employment as engineers and specialists of various skill sets with the highest degree of access in enterprise systems.
“We work with a fair cross-section of the Fortune Global 2000 organizations, and right now we have active investigations going on with 7% of our customer base,” Mohan Koo, co-founder and president of DTEX, said in an interview. DTEX has a couple hundred customers and estimates thousands of critical infrastructure organizations have been infiltrated by North Korean operatives.
"FBI, Healthcare Agencies Warn of Credible Threat Against Hospitals, After Multi-City Social Media Terror Plot Alert"
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"Trump’s firing of NSA chief is ‘rolling out the red carpet’ for cyber attacks"
Gen. Timothy Haugh, a four-star general who served as head of both the National Security Agency and U.S. Cyber Command, was largely seen as an apolitical and uncontroversial appointee. He was confirmed unanimously by the Senate in 2023 under then-President Joe Biden and had worked in signals intelligence for three decades.
Haugh’s firing on Thursday evening leaves two of the nation’s top cyber and intelligence agencies without Senate-confirmed leadership and suggests that Trump is prioritizing loyalty over experience as he continues to fill senior roles in his administration. It also follows a massive breach of U.S. telecommunications networks by China-backed hacking group Salt Typhoon that allowed hackers to spy on the phones of senior U.S. officials, including Trump and Vice President JD Vance.
“We’re under attack, and the president just irresponsibly removed our most important general from the field,” said Sen. Angus King (I-Maine), a member of both the Senate Armed Services and Intelligence committees. “This is an outrageous decision.”
"Trump's Cyber Rollbacks Expose States to Ransomware Attacks"
During a Tuesday congressional hearing, state officials and lawmakers from both major political parties backed the Federal Emergency Management Agency state and local cybersecurity grant program. It has provided more than $800 million to states for cyber defenses since 2022 but is set to expire in September, leading panelists to warn that White House shutting the program could cripple cash-strapped agencies and leave local governments defenseless against increasingly sophisticated ransomware attacks. Homeland Security Secretary Kristi Noem, the only governor to reject federal cybersecurity grant funding for her state while in office, has threatened to cut programs like SLCG, and recently vowed to eliminate FEMA entirely.
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Double Retired
Veteran

Joined: 31 Jul 2020
Age: 70
Gender: Male
Posts: 6,585
Location: U.S.A. (Mid-Atlantic)
"China is trying to recruit current and former feds, intelligence document warns"
China and other groups are “targeting current and former U.S. government (USG) employees for recruitment by posing as consulting firms, corporate headhunters, think tanks, and other entities on social and professional networking sites,” said the document, which also contains seals from the Justice Department and the Defense Counterintelligence and Security Agency.
“Their deceptive online job offers, and other virtual approaches, have become more sophisticated in targeting unwitting individuals with USG backgrounds seeking new employment,” it said, adding that workers with security clearances must remember their obligation to protect classified information, even after leaving government service.
Efforts to shrink the size of the government, fueled by the Elon Musk-led Department of Government Efficiency, have targeted agencies across the federal enterprise, including the Defense Department and core intelligence offices like the CIA and the National Security Agency. The CIA has been given the legal go-ahead to terminate some staff outright.
On Tuesday, Director of National Intelligence Tulsi Gabbard announced a sweeping DOGE-like efficiency effort to cut out “wasteful spending, inefficiencies, and bloated bureaucracy” from the U.S. intelligence nexus. The Office of the Director of National Intelligence, which would be a target for these changes, houses the counterintelligence unit that issued the Chinese recruitment warning.
Warning signs that a recruitment effort is a sham meant to sway government workers include flattery, urgent requests to respond and the promise of an expedited timeline to a job offer, the intelligence paper said.
"Russia is ramping up hybrid attacks against Europe, Dutch intelligence says"
"We see the Russian threat against Europe is increasing, including after a possible end to the war against Ukraine," MIVD director Peter Reesink said in the agency's annual report.
"In the Netherlands, we saw the first (Russian) cyber sabotage act against a public service, with the aim of gaining control of the system. It was thwarted, but it was the first time."
The MIVD did not specify what public service had been targeted.
The agency also found a Russian cyber operation against critical infrastructure in the Netherlands, possibly as preparation for sabotage, the report said.
Western countries have in recent years said hybrid threats by Russia and China were becoming increasingly more aggressive.
Such threats could include everything from physical sabotage of critical infrastructure to disinformation campaigns, espionage and cyber attacks in a bid to influence or undermine society, the agency said.
The MIVD said last year Chinese cyber espionage was more extensive than initially thought, targeting Western governments and defence companies.
"North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature"
The campaign, tracked by SEAL as Elusive Comet, begins with a standard press‑relations pitch or a direct message inviting the target to appear on a podcast run by Aureon Capital.
If the victim takes the podcast appearance bait, the hackers schedule a call over Zoom to learn more about the potential victim’s work, sometimes withholding meeting details until the very last minute in order to induce additional urgency.
“Once the potential victim has joined the call, they are prompted to share their screen to present their work. At this point, [the hackers] will use Zoom to request control over the potential victim’s computer. If the potential victim is not paying close attention, they may accidentally grant remote access, which allows Elusive Comet to install their malware to the victim’s device,” according to the SEAL alert.
The alliance said the malware is capable of acting as an infostealer that immediately exfiltrates relevant secrets, or a RAT (remote access trojan) that allows for exfiltration at a later time.
The Zoom Remote Control feature allows one computer user to take control of another participant’s screen in a meeting when they’ve given explicit permission.
In the observed attacks, the hackers change their display name to “Zoom” that masks a permission dialog from another participant into what looks like an innocuous system pop‑up.
One hasty click gives the intruder full mouse‑and‑keyboard access, after which a malware installer (SEAL has spotted both data‑dumping loaders and full remote‑access Trojans) lands and begins trawling browser sessions, password managers and seed phrases.
_________________
When diagnosed I bought champagne!
I finally knew why people were strange.
Similar Topics | |
---|---|
more bad news for us social security recipients |
07 Mar 2025, 11:55 pm |
the man who sold the world.... |
16 Mar 2025, 7:51 pm |
What do you think about YT's The Aspie World? |
16 Feb 2025, 5:22 pm |
Does Anybody Here Know Dandy's World Or Is Familiar With It? |
25 Apr 2025, 1:22 pm |