Browsed by
Author: Greg Swiecicki

IBM SCAMP

IBM SCAMP

In 1973, IBM presented a device with a not very sophisticated name – IBM Special Computer APL Machine Portable, or IBM SCAMP for short. And although SCAMP never went into mass production, it was based on a computer that could be considered the first portable computer in history – IBM 5100. Unfortunately, it did not offer much beyond its portability, and even here it could be accused of much.

Scammers steal $10 million from Norway’s state investment fund

Scammers steal $10 million from Norway’s state investment fund

The fraudsters spent many months in the system; they managed to extort from the Norwegian state investment fund $ 10 million. They gained access to email, which allows monitoring of communication between employees and partners. They also had access to people who were responsible for money transfers.

https://www.bleepingcomputer.com/news/security/scammers-steal-10-million-from-norways-state-investment-fund/

Researcher Spots New Malware Claimed to be ‘Tailored for Air‑Gapped Networks’

Researcher Spots New Malware Claimed to be ‘Tailored for Air‑Gapped Networks’

Malware “Ramsay” is still developing, but two variants have been detected in the wild, they are not yet a very complex attacker structure. For now !!! Ramsay infiltrates target computers via malicious documents, sent as spear-phishing emails, or using a USB drive, using an old security vulnerability when executing code in Microsoft Office and taking control of the system.

https://thehackernews.com/2020/05/airgap-network-malware.html

Security is a basic

Security is a basic

Nowadays, I recommend using tools whose security is a basic, embedded solution and does not require complicated configurations. Functionality and convenience are not the only criteria for choosing a solution for cooperation. In each of them must be accompanied by functions that ensure security. Always remember to turn off all tools and functions associated with them. Turn off the microphone, camera, screen sharing or file sharing. Working at home, we feel more comfortable than in the office, so it’s worth covering the camera in your computer. Remember that some video conferencing applications automatically turn on video as soon as you join the conversation or when you allow hosts to enable video features for participants. If you intend to share the screen during a conference call, turn off desktop notifications and make sure that wallpaper and other windows are suitable to present to participants in a virtual meeting. Consider how access to virtual meetings is ensured – it’s best if your remote work tools are integrated with security solutions. Require meeting host permission to add guests and share recordings – although teleconferencing has long been a standard in many organizations, now there are more than ever.

Researcher finds 1,236 websites infected with credit card stealers

Researcher finds 1,236 websites infected with credit card stealers

Make every purchase online responsibly. MageCart is a common threat that preys on unreliable online stores. Hundreds of thousands of cash pages have been detected that contain malicious JavaScript to steal card data from buyers.

https://www.bleepingcomputer.com/news/security/researcher-finds-1-236-websites-infected-with-credit-card-stealers/