Always Providing You With Ongoing Information

Archive for the ‘Law’ Category

Some Getting paid For Those Annoying Robo Calls



There is a way you can make up to $1,500 for certain robocalls you get on your cell phone. You’re entitled to that money under federal law.

more here

Best Places for Women Entrepreneurs



Top Places for Women Entrepreneurs

Rank Metro Final Score Business Income for Women Compared to Women’s Earnings in Metro Women in Business % of Businesses Owned by Women
Median Average Median Average % of Women Workers Who Are Self-Employed % of Self-Employed Women Who Are Incorporated Self-Employed Incorporated
1 San Francisco 80.5 $10,378 $31,880 17.6% 41.8% 10.6% 20.8% 41.7% 32.1%
2 Austin, Texas 72.2 $8,262 $25,345 19.6% 48.1% 9.0% 24.9% 38.6% 30.1%
3 San Jose, Calif. 67 $7,657 $30,334 12.6% 38.8% 8.3% 22.7% 41.1% 32.2%
4 Memphis, Tenn. 65 $9,068 $20,399 24.9% 45.5% 5.6% 27.0% 35.1% 29.8%
5 Nashville, Tenn. 64.8 $8,866 $23,373 22.9% 49.0% 7.1% 20.1% 34.9% 27.4%
6 Los Angeles 63.7 $7,758 $20,945 18.6% 37.4% 10.9% 24.8% 37.9% 30.7%
7 San Diego 63.6 $8,060 $20,949 18.5% 37.8% 10.0% 24.2% 39.3% 30.2%
8 Sacramento, Calif. 61.6 $7,053 $23,596 15.0% 41.0% 8.4% 21.1% 39.1% 31.9%
9 Seattle 57.6 $4,534 $22,713 9.2% 37.0% 8.6% 30.6% 42.1% 32.7%
10 Cincinnati 56.9 $7,556 $21,432 18.6% 42.2% 5.4% 29.1% 35.4% 28.5%
11 Raleigh, N.C. 56.3 $3,526 $23,664 8.1% 44.0% 7.4% 36.7% 38.4% 31.4%
12 Boston 54.7 $8,060 $22,574 15.3% 33.8% 7.0% 24.3% 39.0% 28.3%
13 Las Vegas 54.3 $5,037 $17,566 13.8% 38.5% 6.6% 30.6% 39.6% 33.4%
14 Washington 53.4 $5,037 $23,448 8.6% 32.7% 7.2% 31.3% 41.4% 32.1%
15 Portland, Ore. 52.9 $4,030 $17,389 9.3% 31.7% 10.2% 29.8% 42.5% 33.8%
16 Denver 52.5 $3,022 $19,820 6.6% 35.0% 9.1% 37.3% 40.4% 33.6%
17 Houston 52 $7,254 $19,029 17.7% 36.3% 7.7% 23.5% 36.0% 28.3%
18 Hartford, Conn. 48.2 $8,060 $22,710 15.8% 37.1% 5.8% 25.1% 34.1% 24.2%
19 Phoenix 47 $4,534 $16,352 11.5% 33.5% 7.9% 31.8% 37.5% 31.5%
20 Providence, R.I. 46.2 $7,053 $18,161 16.1% 33.9% 5.5% 28.8% 34.9% 27.7%
21 New Orleans 46.1 $6,045 $13,475 16.7% 29.8% 7.7% 34.5% 34.9% 30.2%
22 Dallas 45.7 $5,037 $17,407 12.2% 33.9% 7.5% 26.5% 37.2% 30.4%
23 Kansas City, Mo. 45.4 $3,627 $18,160 9.0% 37.3% 6.6% 30.8% 38.2% 31.0%
24 New York 44.6 $5,037 $20,053 10.0% 31.1% 7.6% 32.0% 36.8% 28.2%
24 Baltimore 44.6 $4,937 $17,227 9.8% 28.4% 6.2% 34.2% 39.2% 31.9%
26 Riverside, Calif. 44.5 $5,037 $16,373 13.3% 34.4% 7.9% 23.7% 35.6% 30.6%
27 Miami 43.3 $3,526 $13,004 9.9% 28.8% 10.7% 39.4% 36.5% 29.6%
28 Columbus, Ohio 42.6 $3,022 $22,010 7.3% 43.5% 5.6% 26.6% 36.3% 27.8%
29 Minneapolis 42.3 $4,332 $18,113 9.2% 31.1% 6.8% 34.0% 37.9% 28.7%
30 Milwaukee 40.9 $4,030 $18,281 9.6% 35.6% 5.0% 34.0% 35.8% 28.8%
31 San Antonio 40.3 $4,030 $16,246 11.2% 36.5% 6.5% 24.7% 35.4% 30.0%
32 Atlanta 40.1 $3,022 $15,809 7.3% 30.6% 7.7% 37.4% 36.6% 30.7%
33 Tampa, Fla. 39.6 $3,022 $13,931 8.0% 29.3% 7.7% 42.8% 36.1% 30.2%
34 Charlotte, N.C. 37.8 $4,030 $13,470 10.4% 27.1% 6.6% 35.2% 36.6% 30.7%
35 Orlando, Fla. 35.3 $1,007 $13,833 2.9% 31.3% 7.5% 43.3% 36.8% 31.2%
36 Richmond, Va. 34.6 $1,813 $15,257 4.3% 29.2% 6.1% 33.7% 39.2% 31.8%
37 Salt Lake City 34.3 $2,518 $15,600 6.8% 34.4% 7.0% 30.9% 37.2% 26.2%
38 Oklahoma City 33.6 $2,015 $14,189 5.7% 32.6% 7.7% 32.6% 35.8% 29.2%
39 Virginia Beach, Va. 33.2 $2,317 $12,850 6.1% 27.7% 5.8% 32.9% 39.5% 31.6%
40 Jacksonville, Fla. 32.4 $1,511 $14,078 4.0% 30.3% 6.8% 39.2% 36.6% 29.5%
41 Buffalo, N.Y. 31.5 $5,037 $14,594 12.3% 29.8% 4.7% 28.8% 34.2% 25.2%
42 St. Louis 30.2 $2,015 $13,673 5.0% 27.7% 5.8% 33.5% 36.9% 30.9%
43 Chicago 30 $2,015 $14,622 4.5% 25.8% 6.3% 37.8% 36.3% 29.4%
44 Birmingham, Ala. 28.8 $2,015 $16,139 5.3% 35.8% 5.7% 31.6% 33.1%

Federal Judge Halts ‘Grand Theft Auto V’ That Allows Cheats

MMO return Grand Theft Auto V

Take-Two Interactive, which makes Grand Theft Auto Online, experienced a loss of at least $500,000 due to these programs, according to its initial complaint on March 23. Single-player mods are available with his programs, but the online community and publisher began to take issue when the online multiplayer sphere was impacted. The injunction seeks to stop sales of his product, which allows God Mode and can enable the practice of “griefing.” Online communities have engaged in substantial debate as to what qualifies as griefing, but it mostly involves creating inconvenience through level and firepower discrepancies between players.


It Seems That Wikipedia Has A Gender & Race Problem

Snapshotteal gown1_001

The world’s fifth-most-visited website has a long-running problem with gender bias: Only 18 percent of its biographies are of women. Surveys estimate that between 84 and 90 percent of Wikipedia editors are male. Quicksilver, is a software tool by San Francisco startup Primer designed to help Wikipedia editors fill in blind spots in the crowdsourced encyclopedia. Its under representation of women in science is a particular target. Quicksilver uses machine-learning algorithms to scour news articles and scientific citations to find notable scientists missing from Wikipedia, and then write fully sourced draft entries for them. 

The summaries it generates are intended to provide a starting point for Wikipedia editors, who can clean up errors and check the sources to prevent any algorithmic slip-ups contaminating the site.

Idaho Inmates Hacked JPay Tablets For A Quarter Million Dollars In Credits,

Snapshotgreen dress4_001

Chinese Bust Online Cryptocurrency Betting Ring


Chinese police have broken up an illegal World Cup gambling ring hosting more than 10 billion yuan (US$1.5 billion) worth of cryptocurrency bets, in the first major sports betting crime involving digital money in the country. The gambling platform ran on the dark web, which isn’t indexed by traditional search engines. During the eight months of the gambling platform’s operation, the site attracted 330,000 registered users from numerous countries, and built an army of over 8,000 agents who earned commissions for recruiting new members through a pyramid scheme.


Image result for ransomware

What is a ransomware attack?

Ransomware is a form of malicious software — malware — which encrypts documents on a PC or even across a network. Victims can often only regain access to their encrypted files and PCs by paying a ransom to the criminals behind the ransomware.

A ransomware infection often starts with someone clicking on what looks like an innocent attachment, and it can be a headache for companies of all sizes if vital files and documents (think spreadsheets and invoices) are suddenly encrypted and inaccessible. But that’s not the only way to get infected.

What is the history of ransomware?

While ransomware exploded last year, increasing by an estimated 748 percent, it’s not a new phenomenon: the first instance of what we now know as ransomware appeared in 1989.

Known as AIDS or the PC Cyborg Trojan, the virus was sent to victims — mostly in the healthcare industry — on a floppy disc. The ransomware counted the number of times the PC was booted: once it hit 90, it encrypted the machine and the files on it and demanded the user ‘renew their license’ with ‘PC Cyborg Corporation ‘ by sending $189 or $378 to a post office box in Panama.


The AIDS demand for payment — by post. Image: Sophos


How did ransomware evolve?

This early ransomware was a relatively simple construct, using basic cryptography which mostly just changed the names of files, making it relatively easy to overcome.

But it set off a new branch of computer crime, which slowly but surely grew in reach — and really took off in the internet age. Before they began using advanced cryptography to target corporate networks, hackers were targeting general internet users with basic ransomware.

One of the most successful variants was ‘police ransomware’, which tried to extort victims by claiming to be associated with law enforcement. It locked the screen with a ransom note warning the user they’d committed illegal online activity, which could get them sent to jail.

However, if the victim paid a fine, the ‘police’ would let the infringement slide and restore access to the computer by handing over the decryption key.

An example of ‘police ransomware’ threatening a UK user. Image: Sophos


What are the main types of ransomware?

Ransomware is always evolving, with new variants continually appearing in the wild and posing new threats to businesses. However, there are certain types of ransomware which have been much more successful than others.

Perhaps the most notorious form of ransomware is Locky, which terrorised organizations across the globe throughout 2016. It infamously made headlines by infecting a Hollywood hospital. The hospital gave into the demands of cybercriminals and paid a $17,000 ransom to have its networks restored.


Locky remained successful because those behind it regularly update the code to avoid detection. They even update it with new functionality, including the ability to make ransom demands in 30 languages, so criminals can more easily target victims around the world. Locky became so successful, it rose to become most prevalent forms of malware in its own right.

Cryptowall is another form of ransomware which has found great success for a prolonged period of time. Starting life as doppelganger of Cryptolocker, it’s gone onto become one of the most successful types of ransomware.

One of the most common forms of ransomware distributed in this way is Cerber, which infected hundreds of thousands of users in just a single month. The original creators of Cerber are selling it on the Dark Web, allowing other criminals to use the code in return for 40 percent of each ransom paid.

Cerber ransomware became so successful that it surpassed Locky — which appeared to mysteriously disappear over Christmas, although reemerged in April with new attack techniques — to become the most dominant form of ransomware on the web, accounting for 90 percent of ransomware attacks on Windows as of mid-April 2017.



The cryptography behind Cerber is so advanced that there’s currently no decryption tools available to help those infected by the latest versions.

Cerber now comes with the ability to steal to steal bitcoin wallet and password information, in addition to encrypting files.

In exchange for giving up some of the profits for using Cerber, wannabe cyber-fraudsters are provided with everything they need in order to successfully make money through the extortion of victims.

What is WannaCry ransomware?

In the biggest ransomware attack to date, WannaCry — also known as WannaCrypt and Wcry — caused chaos across the globe in an attack which started on Friday 12 May 2017. WannaCrypt ransomware demands $300 in bitcoin for unlocking encrypted files — a price which doubles after three days. Users are also threatened, via a ransom note on the screen, with having all their files permanently deleted if the ransom isn’t paid within a week.

WannaCry ransomware infected Windows XP systems across the globe. Image: Cisco Talos


More than 300,000 victims in over 150 countries fell victim to the ransomware over the course of one weekend, with businesses, governments, and individuals across the globe all affected.

Healthcare organisations across the UK had systems knocked offline by the ransomware attack, forcing patient appointments to be cancelled and hospitals telling people to avoid visiting Accident and Emergency departments unless it was entirely necessary.

Of all the countries affected by the attack, Russia was hit the hardest, according to security researchers, with the WannaCry malware crashing Russian banks, telephone operators, and even IT systems supporting transport infrastructure. China was also hit hard by the attack, with 29,000 organizations in total falling victim to this particularly vicious form of ransomware.

Other high-profile targets included the car manufacturer Renault which was forced to halt production lines in several locations as the ransomware played havoc with systems.

What all the targets had in common is that they were running unsupported versions of Microsoft Windows, including Windows XP, Windows 8, and Windows Server 2003.

The ransomware worm is so potent because it exploits a known software vulnerability called EternalBlue. The Windows flaw is one of many zero-days which apparently was known by the NSA — before being leaked by the Shadow Brokers hacking collective. Microsoft released a patch for the vulnerability earlier this year — but only for the most recent operating systems.

In response to the attack, Microsoft took the unprecedented step of issuing patches for unsupported operating systems to protect against the malware.


It was almost three months before the WannaCry attackers finally withdrew the funds from the WannaCry bitcoin wallets — they made off with a total of $140,000 thanks to fluctuations in the value of bitcoin.

But despite critical patches being made available to protect systems from WannaCry and other attacks exploiting the SMB vulnerability, a large number of organisations seemingly chose not to apply the updates.



Petya ransom note Image: Symantec


But that’s a relatively modest loss in comparison to other victims of the attack: shipping and supply vessel operator Maersk and goods delivery company FedEx have both estimated losses of $300m due to the impact of Petya.

In February 2018, the governments of the United Kingdom, the United States, Australia and others officially declared that the NotPetya ransomware had been the work of the Russian military. Russian denies any involvement.

What is Bad Rabbit ransomware?

October 2017 saw the third high profile ransomware attack of the year when organizations in Russia and Ukraine fell victim to a new variant of Petya ransomware.

Dubbed Bad Rabbit, it infected at least three Russian media organisations while also infiltrating the networks of several Ukrainian organisations including the Kiev Metro and Odessa International Airport – at the time, the airport said it had fallen victim to a ‘hacker attack’.

The initial attack vector used to distribute Bad Rabbit was drive-by downloads on hacked websites – some of which had been compromised since June. No exploits were used, rather visitors were told they had to install a phony Flash update, which dropped the malware.

Bad Rabbit ransom note Image: Kaspersky Lab

Like NotPetya before it, Bad Rabbit spread through networks using a leaked NSA hacking tool – but this time it was via the EternalRomance SMB vulnerability, rather than the EternalBlue exploit.

Analysis of Bad Rabbit shared much of its code – at least 67 percent – with Peyta and researchers at Cisco Talos concluded that this, combined with how it uses SMB exploits, means there’s “high confidence” in a link between the two forms of ransomware – and that they could even share the same author.

Bad Rabbit was named after the text which appeared at the top of the Tor website hosting the ransom note. Some security researchers joked it should’ve been named after the lines in the code referencing characters from Game of Thrones.


SpriteCoin ransomware demands payment in Monero. Image: Fortinet.

How do you prevent a ransomware attack?

With email being by far the most popular attack vector for ransomware, you should provide employees with training on how to spot an incoming malware attack. Even picking up on little indicators like poor formatting or that an email purporting to be from ‘Microsoft Security’ is sent from an obscure address which doesn’t even contain the word Microsoft within it might save your network from infection. The same security policies that protect you from malware attacks in general will go some way towards protecting your company from ransom demands too.

At the very least, employers should invest in antivirus software and keep it up-to date, so that it can warn users about potentially malicious files. Backing up important files and making sure those files can’t be compromised during an attack in another key.

How long does it take to recover from a ransomware attack?

Simply put, ransomware can cripple a whole organization — an encrypted network is more or less useless and not much can be done until systems are restored.

If your organization is sensible and has backups in place, systems can be back online in the time it takes the network to be restored to functionality, although depending on the size of the company, that could range from a few hours to days.


FedEx said that it may not be able to recover all the systems affected by the Petya cyberattack, meaning that while the company is back up and running, some machines won’t ever be able to be restored.

Outside of the immediate impact ransomware can have on a network, it can result in an ongoing financial hit.

How do I get rid of ransomware?

The ‘No More Ransom’ initiative — launched in July 2016 by Europol and the Dutch National Police in collaboration with a number of cybersecurity companies including Kaspersky Lab and McAfee — offers free decryption tools for ransomware variants to help victims retrieve their encrypted data without succumbing to the will of cyber extortionists.

Initially launching as a portal offered portal offers decryption tools four for families of ransomware — Shade, Rannoh, Rakhn, and CoinVault — the scheme is regularly adding more decryption tools for even more versions of ransomware including Crypt XXX, MarsJoke, Teslacrypt, Wildfire and Nemucod.

The portal — which also contains information and advice on avoiding falling victim to ransomware in the first place — is updated as often as possible in an effort to ensure tools are available to fight the latest forms of ransomware.

No More Ransom has grown from offering a set of four tools to carrying 52 decryption tools covering hundreds of families of ransomware. So far, these tools have decrypted tens of thousands of devices, depriving criminals of millions in ransoms.

The platform is now available in over 29 languages with more than 100 partners across the public and private sectors supporting the scheme.

The No More Ransom portal offers free ransomware decryption tools. Image: Europol

Individual security companies also regularly release decryption tools to counter the ongoing evolution of ransomware — many of these will post updates about these tools on their company blogs as soon as they’ve cracked the code.

 A decryption tool was recently released which may be able to help if your PC has been hit by one of the original versions of the Petya malware — the so-called Red Petya, Green Petya, and GoldenEye — and may enable you to recover the lost files (although it can’t help with PetrWrap or those hit by the Petya/NotPetya global attack). However, these tools don’t always work so it is always wise to make additional backups.

Another way of working around a ransomware infection is to ensure your organization regularly backs up data offline.

Should I pay a ransomware ransom?

There are those who say victims should just pay the ransom, citing it to be the quickest and easiest way to retrieve their encrypted data — and many organizations do pay even if law enforcement agencies warn against it.

WARNING: if word gets out that your organization is an easy target for cybercriminals because it paid a ransom, you could find yourself in the crosshairs of other cybercriminals who are looking to take advantage of your weak security.


Tag Cloud

%d bloggers like this: