0

Hacking-Ransomware Attack of 27 June 2017

Ransom-Message-27-June-2017

A new global cyber attack took place in 27 June, 2017. The attack was originated in Ukraine.A tax accounting software company named M.E.Doc become the initial victim. Then ransomware spread to at least 64 countries. Though Ukraine seems to have been particularly badly hit this time round.

Ransom Message

The computers affected by the attack showed a message of red text on a black screen: “Oops, your important files have been encrypted. If you see this text then your files are no longer accessible because they have been encrypted. Perhaps you are busy looking to recover your files but don’t waste your time.”

List of Affected Business

Aircraft manufacturer Antonov, and two postal services
Rosneft (Russia’s biggest oil producer)
Danish shipping company Maersk
Pennsylvania hospital operator (Heritage Valley Health System)
Mondelez (Spanish food giant)
TNT (Netherlands-based shipping company)
St Gobain (French construction materials company)
Merck (Pharmaceutical Company)

Companies are paying. A bitcoin wallet associated with the outbreak has received several payments since the outbreak began.

Author – Rubayat M.

0

Computer Hacking Scam Spearphishing

Computer Scam

Recently we have witnessed some extremely high profile and dangerous cyber attack. High profile – because these attack happen simultaneously in few countries. I am talking about the cyber attack that took place in UK and other European countries in May 20, 2017.

An attack like this shows us, what happen to people and their life, when some of the lifesaving system become un-accessible. It teach us, we need to be vigilant when we are online.

So how these attack took place ? Answer is – in many ways. But I am going to talk about a specific kind of attack that can happen against anyone. It’s called “Spearphishing”

 

What is Spearphishing ?

Bad Guy in Dark

Spear Phishing is a scam. An attacker will send an email to you, disguise as a friend or a business and collect your information. Attacker then use those information and steal money from you.

 

 

 

Search in faceboook

How Phishers Select You ?

One of the common place is Facebook. Most people  like to share every detail of their life. Phisars collect these information from their  Facebook account. So they know your name, your contact email, phone, address and a good understanding about your personality.

 

How Spear phishing Attack Happen ?

I am going to use an example to describe this. Let say you bought an expensive lens for your Nikon digital camera. And posted this in Facebook. Phisars learn about this. Then they start their attack.

Step 1: After your buy the lens, few days later your received an email. Now this email came from your Credit card company and they are saying their have some error happen and your card has been charged few times and they need to rectify the issue.

Step 2: They are also saying they have included a link with the email. And you need to click the link and answer few security question. Then the credit card can start fixing the multiple charge issue.

Step 3:  You – who is now worried about your money, will click the link to fix the problem.

Step 4: The moment click the link, it will take you to a friendly looking website where the phisars already included some malicious code. The code will give the attacker direct control of your computer and your would not even know about it.

Step 5: As the phisars have control over your system, they can now collect any information they want and use them to steal money from you.

Now this is just an example. But actual like this happen on a regular basis. A big example of phishing attack was the September 2015’s Democratic National Committee’s cyber attack Attack.

 

 

Knowledge & Awareness

Protection Against Spearphishing

There is no actual protection against Spear phishing. Staying alert is the only defense.

 

Writer – Rubayat M.

0

Massive Ransomware Attack Hits Computers in 99 Countries

NHH-Ransomeware-Lock-Screen

A massive cyber-attack other wise known as the Ransomware has been infected computer systems in 99 countries. Countries are UK, US, China, Russia, Spain, Italy and Taiwan. So far more then 74,000 computer system has been identified as infected.

This is Huge

UK : The UK’s National Health Service (NHS) has been hit. Some hospitals and doctor’s have been unable to access patient data. Some surgeries has been cancelled.

Russia : Reports confirmed Russia had seen more infections than any other country. In
Germany: Some local railway ticket system is down.

Spain : Communication(Telefonica), utility (Iberdrola, Gas Natural).

Portugal : Communication(Portugal Telecom).

Other Companies : FedEx.

Attack Tools and Who is Behind the Attack

At this point it is not sure who is behind this attack.) Attack tools known as WannaCry believed to have been developed by the NSA (National Security Agency of US) has struck organizations around the world.

Our Ransomware Posts

http://www.linkmeshin.com/blog/home/ransomware-what-is-it-why-it-matters-what-is-the-next-level-how-to-get-protection/

http://www.linkmeshin.com/blog/home/mobile-malware-gooligan-infected-millions-of-devices-and-google-accounts/

http://www.linkmeshin.com/blog/home/beware-of-godless-mobile-malware/

http://www.linkmeshin.com/blog/home/carleton-university-of-canada-is-the-latest-victim-of-hacking-attack/

Writer – Rubayat M.

0

Secret US Air Force Plane Conduct Classified Mission in Outer Space for Two Years

X-37B US Air Force Space Plane

The U.S. military’s secret space plane X-37B landed on Sunday at NASA’s Kennedy Space Center in Florida. The plane went to outer space on May 2015 and conduct classified mission that lasted nearly two years. It was the fourth and lengthiest mission so far for the secretive program, managed by the Air Force Rapid Capabilities Office.

Air force did not disclose any detail about the mission.

X-37B built by Boeing is one of two in the Air Force fleet. The space craft looks like a miniature space shuttle, Later this year. The Air Force intends to launch the fifth X-37B mission.

Writer – Rubayat M.

0

Online Secured Password Maker Software

Crack Proof Password

Your password is the last layer of protection between your privacy and the world. That is why it is important to use a strong password. But it is also difficult to create a strong password.

Don’t worry we have a solution for you. LinkMeshin Password Maker – your final steps to your privacy starts here.

Website : www.linkmeshin.com/passwordmaker

What is LinkMeshin Password Maker

LinkMeshin Password Maker is an online password generating software. It generates unique password instantly based on user’s criteria.

Use of LinkMeshin Password Maker

Lets say you are in website and trying to create an account. The one section where you will have most trouble, is the password section. Each website/App has it’s own password criteria.  And in most cases it is difficult to meet the criteria.

This is where LinkMeshin Password Maker comes. In a situation like this – all you have to is, go to www.linkmeshin.com/passwordmaker, then select what types of password you need and the password will be created for you instantly.

No more brain freeze moment ! Here are few things that you need to know.

Service Fees

No service fess – it’s free !

Technical Factors

  • Device friendly – support mobile, tablet laptop & desktop.
  • Browser based – support all major browsers.
  • No download required

How it Works –

First you will select you criteria, then click “Password” and LinkMeshin Password Maker’s algorithm will creates unique password for you. Very simple.

General Password

General Password

Create General Password

A general password a normal password – that contains only  random re-arrangemtnt of A to Z characters. You can define the length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

Create Difficult Password

Difficult Password

Difficult Password

 

A difficult password is a combination of A to Z characters and numbers. You can define the length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

Complex Password

Complex Password

Create Complex Password

A complex password is a combination of A to Z characters and special characters like # or @. You can define the length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

Create Crack Proof Password

Crack Proof Password

Crack Proof Password

 

A complex password is a combination of A to Z characters, numbers and special characters like # or @. You can define the  length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

 

Writer – Rubayat M.

0

Iconic Nokia 3310 is Back

Nokia 3310 Phone

Nokia 3310 is Nokia’s most iconic phone. The original 3310 was first released in 2000. Soon after release it became one the most popular phone and sold over 126 million units worldwide. The phone had a cult status due to its durability. Finally in 2017 Nokia decided to bring the legend back.

The New Nokia 3310

Nokia 3310 User Interface

Nokia 3310 User Interface

The new Nokia 3310 looks and feels like it’s iconic predecessor. It takes the iconic silhouette of the original and reimagines it for 2017. The new 3310 comes in four distinct colors: Warm Red and Yellow, both with a gloss finish, and Dark Blue and Grey. It also has all latest options like – camera, headphone jack etc.

The user interface has the classic interface style, except it is now more sharp and colorful.
The 2.4” polarized and curved screen window provide better readability in sunlight.

And Yes – the legendary Snake is also Back !!!

 

Full Specification

Nokia 3310 Yellow

Nokia 3310 Yellow

Operating System
Operating system Nokia Series 30+

Network And Connectivity
Network speed 2G
Networks GSM 900/1800 MHz

Display
Size and type 2.4” QVGA

Battery Life
Battery type Removable 1200 mAh battery5
Max. talk time Up to 22.1 hours
Max. standby time Up to 31 days
Max. MP3 playback time Up to 51 hours
Max. FM radio playback time Up to 39 hours

Connectivity
Connectivity Micro USB (USB 2.0), Bluetooth 3.0 with SLAM

Design
Colors Warm Red (Glossy), Dark Blue (Matte), Yellow (Glossy), Grey (Matte)
Size 115.6 x 51 x 12.8 mm

Storage
Internal memory 16 MB4
MicroSD card slot Support for up to 32 GB, memory card sold separately

 

 

Camera
Primary camera 2MP
Flash LED flash

Audio
Connector 3.5 mm AV connector
Apps FM radio, MP3 player

 

Writer – Rubayat M.

0

Thomas Starzl the Father of Liver Transplantation Dead at 90

Thomas Starzl

Thomas Starzl who is also known as “the father of modern transplantation” died on March 4, 2017.He was 90 years old. Thomas Earl Starzl was born on March 11, 1926 Iowa (USA).

In 1963 Starzl performed the world’s first liver transplant in 1963. He was a pioneer in kidney  transplantation collected from dead bodies.He was also a leading researcher into anti-rejection drugs. Thomas Starzl was a gifted doctor.  His works save thousands of lives.

Click here to learn more about Thomas Starzl.

 

Writer – Rubayat M.

0

How Google Collect and Use Our Personal Information

Google

Google – worlds most advanced search engine and tech company. These days any technology you see, you will find Google’s name on it. They have become a house hold commodity name and part of our life. Google changed our life so much.

But how much we actually know about Google. We all know that Google provide free information about everything and some of know that they also collect a massive amount of information about us. But how much information do they collect ? What types of information do they collect ? What do they do with that information ? Hers is your answer –

What Information They Collect

Personal Information

  • User’s name
  • Email address
  • Credit card associated with Google account.
  • What language you speak.

Device Information

  • Device type like cell phone, laptop, tablet, desktop, others.
  • Model of the device – eg. Samsung Galaxy s7 or iPhone 5 or Macbook Pro.
  • Device software – Operating system, browser name.
  • Device hardware unique number – like the IMEI (every cell phone has a unique 15 digit number) number for the cell phone
  • Telephone number – if you are using your cell phone.
  • ISP/Cell phone carrier information.

Location Information

  • Your physical location –  when you ware using Google’s service. Google is able to detect your physical location if you are using Google’s service from your home of from a grocery store.
  • Your IP address.

Activity History

  • Your search History– eg. If you search for cooking recipe or if you search for a famous person.
  • For Android Phone – phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls.
  • YouTube – what video you watched and what videos you liked.

How Do They Collect

Google collect your information every time you use any Google service like –

  • Google website – www.google.com to search something.
  • Google Product – Android phone, android tablet, Chrome operating system.
  • Google has created software that runs in the hardware level and collect these information.

How Google Use The Collected Information

  • They use the collected information mainly to maintain and improve their products.
  • They also use these information to (eg. location or language etc.) to display adds and other commercial contexts.

With Whom do They Share Information

Share For Business

Google do not share their users personal information with companies, organizations and individuals outside of Google unless one of the following circumstances applies:

  • They share their user’s personal information with companies, organizations or individuals outside of Google when they have their user’s consent to  do so.
  • Google provide their user’s personal information to their affiliates to process the collected information for them.

Share with Law Enforcement Agency

According to Google – They share personal information with companies, organizations or individuals outside of Google if they
(in good-faith) belief that access, use, preservation or disclosure of the information is reasonably necessary to:

  • Meet any applicable law, regulation, legal process or enforceable governmental request.
  • Enforce applicable Terms of Service, including investigation of potential violations.
  • Detect, prevent, or otherwise address fraud, security or technical issues.
  • Protect against harm to the rights, property or safety of Google, our users or the public as required or permitted by law.

Google’s Warranties and Liabilities

Google provide their services using a commercially reasonable level of skill and care. But there are certain things that they don’t promise about their Services. They will not be responsible for lost profits, revenues, or data, financial losses or indirect, special, consequential, exemplary, or punitive damages.

 

We are giving away so much our personal information to get free information every day to Google and other search engines. Google’s sophisticated algorithm now knows more about us, then what we know about our self. I guess this also makes us a resource and at the same time product of Google.

Writer – Rubayat M.

0

About Internet of Things and What You Need to Know

Wearable Device

Definition of Internet of Things – IoT

Independent individual devices connected with each other or to system to share information over the standard internet.

This is a cloud based system. IoT or Internet of Things does not mean artificial intelligence, but they can be part of an AI. They usually perform some certain tusk, but together they create an ecosystem. In other word, it is more than a machine to machine communication without human interaction.

Impact and Use

It’s impact and use is huge. From regular house hold application to health, transportation to large-scale industry. One example – lets say your favorite yogurt is out of stock. Your IoT equipped fridge (it comes with sensor and knows it’s inventory list) will then use the home WiFi to contact the yogurt company’s ordering server and place order for you. Your per-approved credit will make the payment. Yogurt company then send the ordered items to your house. The whole inventory maintenance happens without any action from you.

History of Internet of Things

Carnegie Mellon University

Carnegie Mellon University

The idea was first discussed at the begging of 80s.In 1982 a coke vending machine was placed in Carnegie Mellon University. The machine was able to send report about the inventory to the main system automatically. The name Internet of Things was first used in 1985 by Peter T.Lwise at US FCC meeting. In his speech Peter talked about interconnected devices and how it can be used to ease the system of collecting data and managing system. Even though it took some time, but at the end of 90s the concept became popular.

 

Common Internet of Things Devices

Wearable Deceives

Wearable devices are the device that people ware in their hand like wristwatch. These are connected to internet. It send and receive data. Some shows live update of text message or phone call.
Examples: Fitbit, jawbone used to collect user’s physical movement and update the online database.

Household Devices

Nest Thermostat

Nest Thermostat

Smart thermostat :   These devices can collect the weather data and save user preference. Based on that, the device can set the house temperature.
Example -Nest Thermostat

Home Assistant :
Amazon Echo. Users can verbally ask Alexa to play music, provide a weather report,

 

 

Transportation : Public transportation system has WiFi, that connect millions other devices. Some personal cars also connected to internet. So users can use that. This system also connect other cars as well.
Example : Connected cars

 

What you need to know – The Good, The Bad and The Ugly

The Good : Ease of Life

If properly use, IoT or Internet of Things are a big blessing for us. One good example of this – the Fall Alarm Devices used by the elderly people or nursing home. These devices can send a distress call, if the person who is wearing this fell or have a medical emergency.

The Bad : Security

Most of the IoT or Internet of Things devices that we use these days are not secured. They are easy to compromise. For example – if a hacker is able take control of the home  smart thermostat (IoT or Internet of Things device), they can do damage to the home. Like in -25C cold temperature, if the home heating system is turned off,  it will create serious damage. Like the water pipe could get frozen and that can eventually cause flood.

The Ugly : Privacy

IoT or Internet of Things devices maker companies collect users information. But with whom do they share this information ? How extent does this sharing goes ? How the other companies is going to use that information ? Because of this information sharing, what if someones social  reputation is damaged whom should they  contact to rectify the problem ? There is no specific guide line about this.

IoT or Internet of Things is a great thing. But it will only became truly helpful once –
These deceives become fully secured
and
The companies who makes them – start strictly following the ethical and consumer guideline.

Writer – Rubayat M.

Disclaimer – all images collected from internet. Please let us know if there is any concern or copyright issue regarding these images. We will remove them.

0

Rise of the Machine 2 – Internet is Slowly Killing the Newspaper

Internet has changed the traditional news media. The way we used to get news fifteen years ago is not the standard anymore. In old days – we used to read about an event few hours after it happen. But today we learn it almost right the way.

Thanks to the internet and advancement in communication technology – we have many sources for news. Now if anything happen in any part of the world, we learn about it in Twitter, then we read about it online if different news sites and finally we watch the video in YouTube. We don’t wait for our favorite newspaper’s early edition to read about it anymore.

Also because of the advancement of mobile device like cellphones and tablets we are no longer tied with our big home computer. We are carrying our source of news all time with us anywhere we go.

And this change everything. We are not buying newspaper any more. We are not subscribing paper based magazine any more. Now we read online and we subscribe online. As a result of this the traditional print media business is slowly dying.

In next few year, we will see another big change in the job sectors related to print media. Some job will remain and some job will be gone. Here is a snapshot –

News Reporter or Journalist

People who collect, research and create information about a certain event.
Future : These job will remain as these jobs are the core of the news media industry.

Newspaper Editors

Newspaper editors is the person who decide which news stories are to be printed in the paper. They also assign the news reporter or journalist to check news and also check the accuracy of the news. A newspaper editor’s professionalism and ethical values define a news paper’s value and respect.
Future : These jobs will remain as these jobs are the core of the news media industry.

Here comes the part that may not have any future –
Printing press – this is the place where news gets printed in paper. Multiple other services involved here that are required to run the process.

Service 1 Paper Supply 

To print news paper materials are needed. Papers are made from wood pulp and recycled matter. Making paper is a big industry.
Future :Declining rate of news paper will not kill the industry, but it will face serious financial trouble.

Service 2 Printing Press Employees

People who operates the printing machinery and other services. If print media industry stop printing news in a paper format, then these people will need to look for job elsewhere.
Future : If the news media stop publishing news in paper, then people who work here, will lost their job.

Service 3 Distribution

This department is responsible for getting the newspaper from the print press to the reader.
Future : If the news media stop publishing news in paper, then people who work here, will lost their job.

Service 4 Circulation

This department maintains subscribers record. They also maintain record of the rack sales and sales of the coin-operated dispensers. News carriers are usually independently contracted employees who deliver the newspaper to reader house. They are also a part of the circulation channel.
Future : If the news media stop publishing news in paper, then people who work here, will lost their job.

These changes that we just talked – will not happen tomorrow. It will take long time. In some country these changes will happen fast and in some country it will take long time. It all depends on the technological advancement. Either it happen tomorrow or many years from now, we need to start working from today. We need to find alternative job solution for the people who will lost the job.

But one thing we are certain – news media industry will not go anywhere. It will continue satisfying human curiosity as long as the human civilization survive.

Writer – Rubayat M.

Disclaimer – all images collected from internet. Please let us know if there is any concern or copyright issue regarding these images and we will remove them.