Sealed in glass

Sealed In Glass

Storing data on glass might sound futuristic, but it’s a concept that dates back to the 19th century when single photographic negatives were preserved on panes of glass. Fast forward to today, technology has remarkably expanded the storage capabilities of this sustainable material. A small sheet of glass can now hold several terabytes of data, enough to store approximately 1.75 million songs or 13 years’ worth of music.

Elire, a sustainability-focused venture group, has collaborated with Microsoft Research’s Project Silica team to harness this technology for their Global Music Vault in Svalbard, Norway. Using silica-based glass plates, they’re creating a durable archive that is not only resistant to electromagnetic pulses and extreme temperatures but also environmentally friendly. This vault will complement repositories like the Global Seed Vault and the Arctic World Archive, offering a comprehensive sanctuary for musical heritage—from classical operas to modern hits and indigenous compositions. Looking to the future, Elire plans to expand this enduring musical repository by establishing accessible locations worldwide, inviting the public to interact with this extensive and ever-growing archive. 

https://unlocked.microsoft.com/sealed-in-glass/

Gmail Users Warned About New Account Takeover Scam: Here’s What To Look For

Garry Tan, chief executive of prominent tech-oriented venture capital firm Ycombinator, wrote on X late last week that there is a “pretty elaborate” phishing scam that uses an AI-generated voice.

The scammers “[claim] to be Google Support (caller ID matches, but is not verified),” he wrote in an Oct. 10 post that he termed a “public service announcement.”

“DO NOT CLICK YES ON THIS DIALOG—You will be phished.

“They claim to be checking that you are alive and that they should disregard a death certificate filed that claims a family member is recovering your account. It’s a pretty elaborate ploy to get you to allow password recovery.”

IT consultant Sam Mitrovic, in a blog post last month, wrote of a similar scam attempt targeting Gmail accounts and also using an AI-generated voice.

The scams are getting increasingly sophisticated, more convincing and are deployed at ever larger scale,” Mitrovic wrote in the post. “People are busy and this scam sounded and looked legitimate enough that I would give them an A for their effort. Many people are likely to fall for it.”

https://www.zerohedge.com/technology/gmail-users-warned-about-new-account-takeover-scam-heres-what-look

We Got Hacked

We Got Hacked

US bank Morgan Stanley has posted letters to an unknown amount of customers, notifying them of potential data breaches involving sensitive personal information left on servers and storage sent to recyclers and on an encrypted drive lost at a branch office.

(Tom: In my personal opinion, having my info in the hands of banks and others with whom I do business is risky enough, as this story illustrates only too well, but storing personal or business data in the cloud takes the risk of loss to a whole new level. That is why I continue to use the accounting and business software I created myself hosted on an inhouse computer.

As an additional note, ransomware, phishing and hacking scams are costing businesses obscene amounts of money. Travel giant CWT pays $6.3m ransom to cyber criminals https://www.itnews.com.au/news/travel-giant-cwt-pays-63m-ransom-to-cyber-criminals-551133

Do some homework and formulate firm policy with which you (and any staff) deal with your emails and web sites you visit. For instance I:

Use strong malware protection, currently Emisoft Enterprise Security Suite.

Never click on links in an email from unknown senders.

Even from known senders I sometimes receive emails with just a link, no explanatory text. I do not click on those. I will sometimes email the sender to ask what it is about.

Never download from file transfer sites unless I expect a link from that person and

Always check the displayed and hidden URL match the expected domain as miscreants will sometimes use what is called a sub-domain or sub-folder to make it look more legitimate. For instance last week I got one allegedly from wetransfer.com but when I held my mouse over the link it was not the wetransfer.com domain, that was used as a folder name like this:
www.somethingelse.com/wetransfer/qweoxflkwefow
A valid name used as a sub-domain for a hacker site looks like this:
wetransfer.hackerdomain.com/as/dkfjswlk

So, just because it has a recognisable name somewhere in the URL, that is a trick to fool those not fully tech savvy. Now you are informed, don’t fall for it.)

https://www.itnews.com.au/news/morgan-stanley-customer-data-left-on-decommissioned-servers-551094

AirPod Radiation May Cause Brain Damage, Leading Scientist Warns

airpod Radiation

Apple says the AirPod satisfies FCC requirements for close-range radiation levels. But a UC Berkeley scientist is now warning that AirPods might result in irreversible brain damage, including an erosion of the blood-brain barrier.

As wireless headphone sales start to surge, serious concerns over close-range radiation effects and possible brain damage are surfacing. Those concerns are now hitting overdrive as Apple prepares the release of the AirPod, which promise a torrent of non-stop wireless communications just millimeters from the brain.

‘You are putting a microwave-emitting device next to your brain.’

Those AirPods, which complement a wireless-only iPhone 7, could shift users from traditional earbud-based voice communications and listening towards Bluetooth-powered communication and audio. That could pose serious, long-term dangers, with the AirPod stuffing high-tech radiation right into your ear.

This new Android malware comes disguised as a chat app

A new form of mobile malware designed to snoop on calls, texts and other communications is targeting Android users by duping them into downloading a fake chat application.

The trojan malware, dubbed CallerSpy, has been discovered and detailed by cybersecurity researchers at Trend Micro, who believe the malware attacks are part of a cyber espionage campaign.

https://www.zdnet.com/article/this-new-android-malware-comes-disguised-as-a-chat-app

How to prevent business email compromise attacks

How-to-prevent-business-email-compromise-attacks.png

Business email compromise (BEC) scams are low-tech attacks that use social engineering techniques to exploit natural human tendencies.

While they may not get as much attention from the press as high-profile ransomware attacks, BEC scams are considered one of the biggest threats facing companies today. Between June 2016 and July 2019, there were 32,367 successful BEC scams in the U.S., which cost U.S. businesses more than $3.5 billion, according to figures from the FBI.

Fortunately, there are some very effective and easy-to-implement strategies for stopping BEC attacks. In this post, we’ll show you how you can combine staff training, process implementation and authentication technology to protect your organization from BEC attacks.

State of Ransomware in the U.S.: 2019 Report for Q1 to Q3

In the first nine months of 2019, at least 621 government entities, healthcare service providers and school districts, colleges and universities were affected by ransomware. The attacks have caused massive disruption: municipal and emergency services have been interrupted, medical practices have permanently closed, ER patients have been diverted, property transactions halted, the collection of property taxes and water bills delayed, medical procedures canceled, schools closed and data lost.

Email and attachments and RDP continue to be the attack vectors of choice. The latter is vulnerable to ransomware via exploitation on unpatched systems, misconfigured security settings and brute force attacks on weak login credentials.

“There is no reason to believe that attacks will become less frequent in the near future,” said Fabian Wosar, CTO at Emsisoft. “Organizations have a very simple choice to make: prepare now or pay later.”

Peace!

Peace!

Wishing you the peace and serenity of the countryside, the patience of nature, the drive of the rivers and oceans and the wisdom to know when to apply each.