Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for the delivery of ransomware is the use of the Nullsoft Scriptable Install System (NSIS) with an encrypted payload. The list of the most common families using this technique is diverse and includes Cerber, Locky, Teerac, Crysis, […] more…Brief wireless (psu) disruption at Pattee hubsite
There may a brief interruption to the wireless service (psu) for about 1 to 3 minutes during 6:00 am to 6:15 am on 3/17 Friday, in the following buildings. For further information, please refer CHG0041067. MRL BiomechanicsLab Burrowes Carpenter Cedar Chambers EisenhowerChapel Ford Forum Hamilton Ihlseng Irvin Jordan Keller Kern Mateer McKee Moore Music Music […] more…Latest phishing tactics: infected PDFs, bogus friend requests, fake HR emails
The bad guys have always got new tricks up their sleeves: here are some tips to help you steer clear of them more…What are the Pros and Cons of Snooping on Your Kids Online?
I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five years ago. I’ve had to. Technology has dramatically changed all of us in that short time. Still, at least once a month a parent asks me, “How much should I really be snooping on my […] more…Resolved: Wireless – Degraded State
Update, the following buildings were also impacted: Ag Arena Arboretum Bank Of America Blue Band Computer Dairy Barns Data Center Eisenhower Auditorium Farm Services Findlay Fleet Greenhouse Prod1 Hazmat Headhouse I High Pressure Gas Lab Hostetter Housing IM Katz Keller Laundry Mateer Meats Lab Millennium Music Nittany Depot Oswald Pasture Research Physical Plant Procure Salvage […] more…Meet the Self-Driving Car Built for Human-Free Racing
Designers get to have a lot of fun with self-driving cars. Foldaway steering wheels. Spinning seats. Screens everywhere you look. After all, things get wild when the human inside doesn’t have to drive, or even look at the road, anymore. But when you take the human out of the car altogether, the design department can […] more…8 steps to regaining control over shadow IT
A dangerous practice on the rise Image by Pexels “Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to […] more…Kim Dotcom faces extradition to the US
A New Zealand court ruled on Monday that internet entrepreneur Kim Dotcom could be extradited to the United States to face charges relating to his Megaupload website, which was shut down in 2012 following an FBI-ordered raid on his Auckland mansion. The Auckland High Court upheld the decision by a lower court in 2015 on […] more…Malware: 5 Tips for Fighting the Malicious Software
Malware—the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our lives. From an entire attack campaign on banks worldwide, to a strain residing within medical devices, to a variant that has learned to self-heal, the list […] more…How Google fought back against a crippling IoT-powered botnet and won
In September, KrebsOnSecurity—arguably the Internet’s most intrepid source of security news—was on the receiving end of some of the biggest distributed denial-of-service attacks ever recorded. The site soon went dark after Akamai said it would no longer provide the site with free protection, and no other DDoS mitigation services came forward to volunteer their services. […] more…EyePyramid and a Lesson on the Perils of Attribution
In the past weeks, information-stealing malware EyePyramid made headlines after it was used to steal 87GB of sensitive data from government offices, private companies and public organizations. More than 100 email domains and 18,000 email accounts were targeted, including those of high-profile victims in Italy, the U.S., Japan and Europe. The natural assumption for many […] more…Critical flaw lets hackers take control of Samsung SmartCam cameras
The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them. The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past. The flaw […] more…Resolved: Wireless authentication problems
Between 5:18 PM and 6:48 PM this evening wireless users in the buildings listed below would have been unable to authenticate onto the psu network. OVPIT identified and resolved an issue with a radius authentication server responsible for authentication for wireless networks for the buildings listed. For more information, please reference INC0441811. Arboretum Computer FarmServ […] more…Businesses as Ransomware’s Goldmine: How Cerber Encrypts Database Files
Possibly to maximize the earning potential of Cerber’s developers and their affiliates, the ransomware incorporated a routine with heavier impact to businesses: encrypting database files. These repositories of organized data enable businesses to store, retrieve, sort, analyze, and manage pertinent information. When utilized effectively they help maintain the organization’s efficiency, so holding these mission-critical files […] more…Resolved: Scheduled Maintenance – UPS replacement at Pattee/Paterno Library hub site
OVPIT – ENCS/TNS will be replacing the Uninterruptible Power Supply (UPS) system that serves the Pattee HUB site on Sunday 11/20/2016, starting at 5AM with work expected to be completed by 5PM. In order to perform this work, all equipment at the Pattee HUB site will transferred to temporary power. This temporary power source will […] more…Scheduled Maintenance – UPS replacement at Pattee/Paterno Library hub site
OVPIT – ENCS/TNS will be replacing the Uninterruptible Power Supply (UPS) system that serves the Pattee HUB site on Sunday 11/20/2016, starting at 5AM with work expected to be completed by 5PM. In order to perform this work, all equipment at the Pattee HUB site will transferred to temporary power. This temporary power source will […] more…More information
- Serious Flaws Found in ControlByWeb Industrial Weather Station
- Critical Ignition Gateway Vulnerability Can Lead to Disruption in Plants
- Voice-activated drone, baby monitor win Amazon’s IoT contest
- Afero Raises $50 Million for Its Secure IoT Platform
- The ransomware that says, “I don’t want money” – play a violent game instead!
- How to rescue your PC from ransomware
- Cryptocat ‘encrypted’ group chats may have been crackable for 7 months
- Microsoft Edge Chakra Scripting Engine CVE-2019-0922 Remote Memory Corruption Vulnerability
- Microsoft Edge CVE-2017-11803 Information Disclosure Vulnerability
- How the Top 5 PC Makers Open Your Laptop to Hackers