|
MIT researchers have created a new system that automatically cleans "dirty data"— the typos, duplicates, missing values, misspellings, and inconsistencies dreaded by data analysts, data engineers, and data scientists. DROP TABLE messy
|
|
|
|
|
Colonial Pipeline paid hackers nearly $5 mln in ransom - Bloomberg News | Reuters
"...Colonial Pipeline paid nearly $5 million to Eastern European hackers on Friday after a crippling cyberattack that shut the largest fuel pipeline network in the United States, Bloomberg News reported, citing two people familiar with the transaction...."
I was surprised they were able to restart their operation that quickly; this answers that.
Since 5$ million is that that much money for that kind of company, We'll see how many infrastructure companies of that size will get hacked in the next few week.
CI/CD = Continuous Impediment/Continuous Despair
|
|
|
|
|
I work in a different industry and yesterday I got a call from the boss who said another organization in our industry was hit by ransomware so the call was made to back everything up including software and production systems. I've been doing it for years so I didn't change a single thing I was doing. Apparently this was a big thing for some people though.
BTW - this hasn't hit the news yet and they are trying to keep it quiet enough that it doesn't. I'm not sure how they are going to explain why hundreds people are not working so I expect a leak any day now. I don't even know who the organization is because I wasn't told. I just know it wasn't us.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
Use image backup every night and swap out the drives daily and you can thumb your nose at those crooks. Of the ransomware attacks that have happened to our customers over the years not one has had to pay a dime and being back and running was as easy as restoring the image.
World infrastructure cats, get a clue.
Windows server backup, Acronis true image, Image for Linux,Apple Time machine, there is just no excuse.
|
|
|
|
|
When the hackers look for quick money, that will work.
But some are more diligent. After infecting your system, they'll wait a couple of month, till they are sure that all your backups are infected with their malware too. And when you restore from the infected (though not yet encrypted) backup, they'll just ...
But of course, that comes with a different risk for the hackers: another group may be faster.
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
Oh... I should have read all the messages before answering... you brought up exactly the same point I wrote... deleting redundant message.
You just answered to Rick and this fits more answering to Ron
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Quote: he hackers provided Colonial Pipeline with a decrypting tool to restore its disabled computer network after they received the payment, but the company used its own backups to help restore the system since the tool was slow,
So, they wasted the $5 million anyway.
|
|
|
|
|
Looks like a lot of criminal organizations know where to get their meal ticket now.
|
|
|
|
|
Just because they got paid doesn't mean they are going to get away with it. The FBI will be on to the job, as will potentially kinetic solutions. Being in eastern Europe won't save anyone. Only being protected by certain governments could provide protection and, even then, might not be guaranteed.
|
|
|
|
|
Old-school security guy’s reaction: The Ransomware Hack[^]
(He’s also expecting it to get worse)
TTFN - Kent
|
|
|
|
|
|
The are serious implications here, particularly for inspiring career choices. Is there anything intrinsically illegal about offering (online?) courses in "Ransomware Made Easy" or "Build Your Own Ransomware in 24 Hours" ?
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
This makes me incredibly sad that, after years of this rubbish, corporations still don't understand the concept of backups.
My thinking here is that 5M for a massive corp is cheaper than what it would cost them to implement full backups. So they save a bit of money, and then pass the problem onto every other person on the planet who may not have the funds or ability or even know-how to manage backups properly.
Even my 82 year old dad does daily backups.
cheers
Chris Maunder
|
|
|
|
|
One such aspect is getting the WinForms designer to act the same in VB.NET projects as it does in C# projects because of the idiomatic differences between the two languages. Twenty-year-old technology fails to work with another twenty-year-old technology
Yeah, I know - WinForms 5 isn't WinForms 4++, so it's not exactly 20 years-old anymore. Still, this is what happens when you decide to stop putting effort into maintenance for a while.
|
|
|
|
|
they work for msft don't they....
Caveat Emptor.
"Progress doesn't come from early risers – progress is made by lazy men looking for easier ways to do things." Lazarus Long
|
|
|
|
|
Nearly every modern software development project relies heavily on open-source software. It's 'free' as in 'puppies', so it needs some care and feeding
|
|
|
|
|
Kind of mandatory[^]
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
if you pay us money it will work on you machine also
Caveat Emptor.
"Progress doesn't come from early risers – progress is made by lazy men looking for easier ways to do things." Lazarus Long
|
|
|
|
|
Smart lightbulbs, door locks, thermostats and other devices should get along better once certified to work with a new network cooperation standard starting in 2021. Will they also share the vulnerabilities?
|
|
|
|
|
Kent Sharkey wrote: Will they also share the vulnerabilities? They are already sharing them... they connect via WiFi, don't they?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
On Earth, we tend to take laundry for granted, but life on the International Space Station is a bit different. No "tooting" allowed?
|
|
|
|
|
They probably know about the 4x law...
once normal,
once front to back,
once inside out,
once back to front
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
What happened to the old Science Fiction standby of hanging them in the airlock for an hour (dehydrating any dirt), and then brushing them off before taking them back inside?
Kent Sharkey wrote: No "tooting" allowed?
Eating bean burritos on the ISS is fine - as long as you do it outside.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Daniel Pfeffer wrote: Eating bean burritos on the ISS is fine - as long as you do it outside.
Yeah, but the gaseous discharge may put the astronaut into a different orbit than the IIS.
|
|
|
|