April 11, 2017
The most dangerous criminals on the Dark Web are states. Hackers sponsored by Russia attacked Ukraine in the past. It is also a matter of time before a rogue state or bad actor takes out critical infrastructure in the US. In addition, he says some believe the Chinese are behind the great blackouts in the US last decade.He then discuss the Bowman Avenue Damn in Rye Brook and how the Iranian National Guard was responsible. He also mentioned how Wells Fargo and JP Morgan Chase were also attacked.Hackers he said will go after American businesses as well as governments.
Russian Pyotr Levashov spread ransomware and other malicious software through the Kelihos botnet, possibly hacked the U.S. election and probably ran the Waledac spam botnet.
In 2009, Levashov was charged with operating the notorious Storm botnet, Kelihos’ predecessor. According to anti-spam organization Spamhaus, Levashov is listed as one of the World’s 10 Worst Spammers and “one of the longest operating criminal spam-lords on the internet”.
How did he get caught? Levashov was arrested in Barcelona, Spain under a U.S. international arrest warrant. But more specifically, he made mistakes. He used the same IP address for his Kelihos botnet and his email@example.com e-mail account.
This shows us the power of hacking… One spammer caused potentially hundreds of millions of dollars of damage or more to the world’s computers and likely extorted many millions of dollars from unsuspecting computer users and it took years to catch him – even after repeated offenses.
“The ability of botnets such as Kelihos to be weaponised quickly for vast and varied types of harms is a dangerous and deep threat to all Americans, driving at the core of how we communicate, network, earn a living and live our everyday lives,” said acting assistant attorney general Kenneth Blanco.
“Our success in disrupting the Kelihos botnet was the result of strong co-operation between private industry experts and law enforcement, and the use of innovative legal and technical tactics,” he said.
Let’s put into perspective that law enforcement had to rely on “innovative legal and technical tactics” even after the spammer in question made two serious mistakes. He resided in a country where U.S. law enforcement could get to him and he used the same IP address for his email as his malicious activity.
Any criminal with a brain and he obviously has a very impressive one based on the scale of his criminal enterprise, would know these mistakes are to be avoided. What this tells us, is there is little fear in the hacker community from law enforcement in general.
This is exactly the same takeaway we received when we reported that Microsoft said we need a Digital Geneva Convention. Even Microsoft with its near unlimited-resources feels vulnerable. The point being, hackers are working with impunity and if they stay in areas where western law enforcement can’t reach them, like Russia, the war on hackers and ransomware will continue be a very unsuccessful one.
It’s why its very important to ensure your company is conducting cybersecurity training and proper Auditing & Documentation in your organization at all times.Use the power management features and sleep mode on your computers and laptops to save money – because so many people work from home at least one day per week, you cut out commuting fees, but you may increase your home bills unless you use energy saving equipment. Unplug electronics when not in use – you can use a power strip and use to switch to cut all power to the appliance, to avoid ‘vampire’ loads. This phenomenon of appliances sucking out power can occur in items such as stereo players, DVD players and kitchen appliances like microwaves. Unplug your battery chargers when not in use or battery is full. A similar option is to use rechargeable batteries for items like digital cameras, which are more cost-effective than disposable batteries. Computers – one of the most important tips when using your computer -understand your computer uses more energy when running for long periods, as opposed to when it starts up. Therefore, spend a lot of time I low-power mode to help your equipment last longer and run cooler. As a rule of thumb, consider the following savings: Turn off the CPU and monitor if you will not use your computer for more than 2 hours Turn off the monitor if you will not use your computer for more than 20 minutes. Your printers, monitors and other accessories like external speakers should be on a surge protector to guard them against drawing power when the power is off. If you do not have a power strip, make sure to unplug them when not in use. PCs produce heat as they run, so keeping them off reduces building cooling loads. Sleep mode – most computers that are currently in the market have sleep modes or power management features, which can help you save up to $30 in your energy bill per year. One thing to note is screen savers are NOT energy savers. In fact, using a screen saver uses more energy than not using one, and modern LCD color monitors do not even need them. Instead, consider setting up the power-down feature on your computer through your Operating system. Who would know that your appliances would lead to high-energy costs? Consider the tips above and watch your bills reduce, saving you money to do other things and increasing your efficiency. Click “Next” to continue reading: Content on WoJournals.com doesn’t constitute, nor is meant to constitute, professional advice of any kind. You should always consult a suitably qualified appropriate professional regarding any specific problem or matter. Sponsored SHARE TWEET ◄ BACK NEXT ►
Read more: http://wojournals.com/10-energy-saving-hacks-for-your-home.html/page12
He said the attacker who went after OPM and took over 21M government worker names and their details also went after Anthem, United and almost ten other companies.
He said the FBI does now issue warning against Chinese hacking (one, earlier this May) – when they did not do this before. He said that multiple agencies have sounded the alarm about APT6 – an allegedly Chinese Nation-state sponsored hacking group.
Some believe this group has been operating since 2008 or 2011. He also said President Obama met with Chinese leaders and agreed neither country would hack for commercial purposes.
He went on to say FireEye noted that numerous Chinese hacking groups have ceased hacking as a result.
He says experts say that the attacks are still coming but China is using better “trade craft.”
He said in past days, the Chinese would show the data they stole.
In addition, Silicon Valley is working more closely with the government to identify attacks and attackers.
He said there is no cost on China for taking hundreds of billions of dollars per year of American Intellectual property – in the form of US exports to Asia.
Others say hacking costs us companies $400B per year and China is responsible for 90% of this number or $360 billion.
Others say this will continue until we demand that it stop.
At the moment “There is very little reason for Beijing to stop what it is doing.”
He went on to say that some time back five Chinese hackers were indicted but it is unlikely we will never find them and bring them to justice.
At this point, companies are not allowed to fight back.
Some are suggesting US companies be given the right to do this.
Others say, until hacking stops, we need across the board tariffs on Chinese products. Obviously Donald Trump believes this and Senator John McCain agrees.
In addition, other countries see China is not being held liable and other countries could copy the same path to economic prosperity.
“China wants to move up the value chain in manufacturing and they cant do this unless they protect it.” That’s the good thing. The idea here is China will need to worry about cyber-theft as well.
Also, since the Chinese economy is in distress, they are less likely to be a good global citizen.
China’s distress is good for the US – because they need access to the American market.
From there he went on to discuss the North Korea hacking of Sony Pictures because of the movie The Interview.
The hackers though were using Chinese IP addresses (Unit 121). He said this shows the Chinese government was complicit in this attack. Especially since all the data from Sony had to pass through the Great Chinese Firewall.
We know in 2012 North Korea and Iran signed an agreement to cooperate in cyberspace.
“Washington can not let others – especially Russia, North Korea, China and Iran decide what we read and have access to.” referring to the plot to stop us from seeing the movie. From there we went on to say this will continue until Washington stops if from happening.
Start-up businesses are all the rage on big sites on the Internet at the moment. People from various professional backgrounds are leaving traditional employment to seek their fortune on their own, on their own terms. In this technological age, most people want financial freedom, but they also want personal freedom to be able to work when they like and express themselves creatively – the best way they see fit. This is where start-ups come into play. With no employer or task-masters telling you how to do your job, you can at last branch out into the area of your specialty you like best and are most confident doing.
Whatever business you’re involved in, you need help with your start-up. Here are the 3 best apps for start-up businesses. We look at the three main areas every startup must consider carefully, clients (people to do business with), money (how you earn it and how you spend it) and time management (how you work and how well you work within a set time-frame).
Image Source: Pixabay
If you’re a blogger, you’ve heard of Mailchimp. The main asset of every start-up business is its clients. The more people you have access to and can communicate with, the more you can potentially grow your business, online or offline. Mailchimp allows you to design your emails, letter etc., and send them out to your subscribers or clients. Mailchimp can be integrated easily into your Google Analytics so you can monitor your progress and test your responses. Mailchimp eliminates the need to constantly keep up with your clients individually. You can write one (or a few) all-inclusive email, decide when you want to send it and who you want to send it to, and get the job done in minutes.
Not everyone knows that much about accounting. However, as an online entrepreneur, you need to know how to do your own books (at least). FreeAgent makes it easy for you so that you can concentrate on what you do best. FreeAgent will help you with Bookkeeping and accounting. It’s an application designed to help small businesses or start-ups. You have to pay a monthly fee, but it’s well worth the time, frustration and effort it’ll save you.
You’ve got control now of your two main concerns: your clients and your accounts. One can’t be ignored at the cost of the other. Now here comes the next area of business start-ups need to worry about – time management. As a freelance, I need to manage my time precisely. Bad management means less productivity, less pay and unsatisfied clients. My business won’t thrive in such a situation. Late deliveries mean loss of potentially good and loyal clients to one of your competitors with better time management skills (or apps). The Time Master app will keep track of your time and help you manage your productivity and your clients’ work. It even gives you the option of producing time sheets and schedules for clients, making it easy to keep on top of all your deadlines.
Do you consider yourself an online entrepreneur or owner of a start-up What apps do you find useful and can you recommend any of them to us?
Tech executives will be heading before Congress in the coming week to testify about their efforts to crack down on extremist content on their platforms.Facebook Head of Global Policy Management Monika Bickert, YouTube Global Head of Public Policy and Government Relations Juniper Downs and Twitter Head of Public Policy and Philanthropy Carlos Monje will appear before the Senate Commerce Committee on Wednesday.Much of Washington’s attention has been focused on how tech companies handled Russian election interference. But Senate Commerce Committee Chairman John Thune (R-S.D.) said the hearing on terrorist content and social media had been in the works for some time.
“We’ve been talking about it for awhile. We decided to have a hearing on the subject because we think it’s a big issue,” Thune said to reporters on Thursday.
“One of the biggest tools that terrorists use to recruit is social media platforms. We just want to use this as an opportunity to hear from the tech companies about some of the things they’re doing to prevent those activities.”
The top Democrat on the committee, Sen. Bill Nelson (D-Fla.) agreed, saying that he would like to know more about how companies are trying to keep extremist content off their platforms.
Tech companies say they have been taking significant steps to address the issue.
Twitter found itself under fire in recent years over the large amount of pro-ISIS content on its platform. The company took steps to target those accounts. In a report in September, Twitter said it had shut down over one million accounts promoting terrorism. The moves earned the company praise in many quarters.
But tech companies also face a difficult balancing act, with critics cautioning them against going too far and infringing on free speech.
YouTube, for example, is removing videos that don’t meet its criteria for extremist content but that are still tied to individuals linked to terrorism. Those tougher standards have sparked concern from civil libertarians.
Tech companies are also facing new heat from some lawmakers over Russian interference.
On Tuesday, the top Democrat on the Senate Intelligence Committee, Sen. Mark Warner (Va.), criticized Twitter after it failed to meet a deadline to provide the committee with information about Russian interference on its platform in 2016.
Facebook and Google met the deadline to provide information, but Twitter sought an extension.
“I’m disappointed. I’ve been disappointed throughout this,” Warner told reporters. “Twitter has been often times the slowest to respond. Most of their work was derivative to the Facebook work. The other companies met the deadline which was way over a month from when they testified.”
Democrats on the Senate Foreign Relations Committee also released a report Wednesday challenging the adequacy of Twitter and Facebook’s investigations into Russian influence to manipulate the United Kingdom’s Brexit vote.
Both the House and Senate will be in session in the coming week. While lawmakers will be focused on passing a spending bill to avoid a government shutdown after Jan. 19, there are also a number of tech items on the docket.
On Wednesday at 10 a.m., the House Science Committee’s space panel will hold a hearing on systems development at NASA.
Also on Wednesday, the House Homeland Security Committee will review the Continuous Diagnostics and Mitigation program, an effort to help beef up federal cybersecurity,” at 2 p.m.
On Thursday, the House Commerce subcommittee on consumer protection will hold a hearing on the Internet of Things and its impact on manufacturing and innovation. That hearing is at 10 a.m.