Tag: virus

I Can’t Do That, Dave

I Can’t Do That, Dave

Attack of the Dogmen

Covid and work at home transformed the dynamics of our world.

The true resolve of the human-manipulated contagion will never make the light of day, as tribunals are real things. You can bet there was a purpose to it. Millions died as a result, and millions more are suffering the aftereffects.

While researching the long-term effects under the guise of assisting those with Covid long, it is really about the effectiveness of the virus so that when they do it again, they can build it back better.

Much like tossing a pebble into a pond, the ripple effects were disastrous for that creature called humankind.

The world will never be the same because of the panic, fear, and valuable research. Perhaps change is good, but change over time versus evolution because of a disaster created by man is different.

History is rife with megalomaniacs, from Vlad the Impaler to the Early Church. Some fall into power and feel like they are superior to you. In some twisted aberration of thought, they herd the sheep to accomplish their goal of controlling the masses.

By utilizing valuable idiots to divert the attention of the masses, they create incredibly absurd distractions.

  • Men in women’s bathrooms.
  • Men in women’s sports.
  • Protest, including the burning of cities?
  • The ruling class attacking the group is most likely to catch on to their corruption.
  • A complicit media controlled by the megalomaniacs.
  • Taking lessons from Stalin’s playbook.
  • Useless wars where the atrocities are the focus of every broadcast.

Covid accomplished changes in our world that are not fully understood today. Assuming that this was not an accident or natural evolution, one wonders…

  • What did they accomplish?
  • How many died?
  • What are the social repercussions?
  • What was the total cost in dollars, and to which societies?
  • Did this move the world closer to a one-world government?
  • Did it have the desired effect?
  • When we do it again, what do we do differently?
  • How did it move the world closer to our end goal?
  • What is the end goal?
  • How do we protect the elite from the effects of the weapon?
  • How do we spin this as a natural course of humanity?
  • How do we protect the elite from discovery?
  • How do we mitigate the unintended consequences?
  • What did we learn from the MRNA technology?
  • What was the mortality rate of the vaccine?
  • How did the different vaccines alter the life expectancy of those who took them?
  • What did the Spike protein do to men’s vs. women’s reproductive abilities?
  • How were the cardiovascular systems affected by the vaccine vs the virus?
  • How did social media drive the narrative, and what can we do differently to be more effective?

Many of you reading this will think this is total fiction… I am a science fiction writer, but…I am certainly not stupid.

It’s clear that the world has changed, not for the better. If we work the results backward, we might be able to figure some of this out.

Like 911, the world’s governments garnered greater power over the sheep. Civilians lost more of their rights.

Mental health has taken a significant hit worldwide. Mental health starts with taking social norms, turning them upside down, and presenting them as the new normal.

We start by analyzing social norms vs agoraphobia. Mankind is a social creature. When we create an atmosphere centered on fear of a virus, we find that many will develop agoraphobia. They will find any reason not to leave their home.

We know for a scientific fact that masks do not work against a virus, and yet any trip to the store or public venue will find a large percentage of people wearing them. Those who already have some compromised mental health condition will be severely affected. The deep end for them is much closer without social interaction with coworkers.

If people are living with their own delusions, not being checked or questioned by their peers, it’s much more likely they will develop mental aberrations. These anomalies can and often will turn into psychosis.

When we see mass shootings and other mass casualties created by one person, we can guess that something triggered them into acting out their delusions.

What about the economics of these changes to society? Never mind the business implications of commercial real estate, what about those employees who commuted every day versus working from home?

Zoom, net meetings, and so on have changed the landscape of modern business practices. While undoubtedly not for the better as far as consumers are concerned, the phrase…all of our agents are currently assisting… is all too common. They attempt to guide you to some portal responding to your input via rudimentary AI. “Let’s Chat.”

I wish it were an anomaly, but it seems the norm.

One wonders how many of their agents take care of their kids, cook, clean, sleep, run errands, etc. We, too, head to the store to check our own groceries, hoping above hopes that we didn’t mistakenly forget to scan something. I would feel a little better about it if I were to get a discount on the total bill for doing their job.

Businesses are thinking creatively and achieving more with fewer resources. From kiosks to online, skilled workers are becoming more and more antiquated.

Privacy concerns are a real problem. Software exists to monitor the mouse movements and keystrokes of those stay-at-home workers. What is to stop them from activating microphones and cameras? You probably sign your rights away with some small print in a contract around paragraph 768.

2024 will usher in new dynamics in the business world. We have entered a self-service world.

AI is taking over, and people who take useless classes in college will have a hard time finding jobs. Even checkers are being replaced by technology, causing frustration for customers who don’t want to wait in line because the slowest cashier is the one person still working a register, and they still can’t find the code for bananas.

Online shopping has made it easier than ever to impulse buy while pissing. Targeting your social media feeds with things that Alexa heard you discuss is flat-out spooky.

We are addicted to our smart stuff. How many of you have turned around and gone back home to get your phone that you accidentally left on the charger? How many of you are on your phone at the dinner table or with friends at some eating establishment?

Food for thought… How many of you could turn off the internet, streaming services, and phone and lose all connection to the online digital world? If you want to talk to someone, you go see them. If that thought causes you extreme anxiety, you should absolutely consider doing it.

Try spending quality time with your friends or family by turning off SIRI, Bixby, or even Hey Google. Just turn it all the way off. Unplug the router. Take a vacation from the overload of information that has so addicted us to the constant stream of propaganda.

A mental health crisis exists. Social media has to play a role in creating a false sense of importance. The media are lying to you with biased opinions that are simply trash.

  • There are only two genders.
  • Biological men have zero business cheating ladies out of their rightful place in women’s athletics, period. Any other opinion is demented.
  • Children are sacrosanct. Leave them out of your twisted ideologies.

If I could offer advice for young people today, it would be to find vocations that technology cannot replace.

Mass immigration policies today aim to replace this generation, who is coddled and believes that video games and free stuff are entitlements. This same group cannot define the only two genders that exist. They firmly believe that truth is hate speech and that they have the right to take whatever they want.

The more people ignore the cancer in our culture, wokeism, the worse the culture becomes.

AI will have zero use for illogical behavior.

As those immigrants who have not lived the coddled life will replace today’s youth, those looking for any opportunity will fill those non-skilled jobs. They are modern-day slaves and happy to have a place to call work. Businesses are the driving force calling the immigration shots. Our current administration is a puppet with globalists pulling the strings.

Those humans left to do the menial task must necessarily be non-educated with just enough smarts to put Block A on top of Block B until robots can do it.

AI will replace creative types.

AI will consume our work to date on things like ad campaigns, science, literature, and ART, and it will thrust some concatenation of our collective works into the world at a fraction of the cost. AI-generated ART, MUSIC, and so on will become the rage until humans are no longer necessary but problematic.

Computers don’t call in sick, they don’t demand $15 an hour, and they never go on strike. Robots also don’t pay into the system of taxes.

This same technology will take our current understanding of science and push it to additional levels without human intervention.

Robots with AI capabilities might very well be tomorrow’s soldiers and police force. Think about a combination of a man and a police dog all in one robot. We give the robot titanium teeth instead of guns and paint the bad guy with a DNA sensor. Viola, the bad guy or victim, ends up missing part of a leg to the bite of the new sheriff in town.

It’s coming.

Take these same dog men hybrids and set them loose on the battlefield. Send them into space to colonize Mars or the moon.

When AI determines humans are the problem, which it will, removing said delinquent creatures will be no problem for the dog soldiers.

AI will allow researchers to rapidly discover cures for common ailments by utilizing large data sets and quantum processing power.

These same data sets will determine how many people on earth can sustain themselves and will take corrective actions by changing how we grow food, taking a page from Stalin by starving his citizens.

It’s only a matter of time before self-driving cars morph into self-flying aircraft. AI will be built into the machine with wings; no humans are necessary.

Using today’s technology, AI will make it more efficient, eliminating the need for more people.

The need for college education will dwindle with the indoctrination of our youth, offering them careers in hopelessness and happiness through drugs and other self-destructive activities and ideologies that tear apart the fabric of society by erasing our foundations and altering the past to fit a false narrative. It will be a new narrative that is improved by doing away with the sins of the past for the perfect harmonious future with no crime, disease, or starvation, as some strand of humanity might find its way into the robot that never dies.

Today’s youth think video games are a reality and replace work. “But I make money as people watch me play.” Sponsors reward the players for their performance.

“Wow, is it consistent? Can you make the rent, the car payment, etc., and still not have to worry about next week or the next?” The answer is no.

As long as they have a way to get things delivered to their apartment, they will survive on pizza and other poisonous foods, while AI plans on ways to eliminate them for the greater good.

Will AI learn from online gaming? Will AI watch and be able to predict how mankind would respond to strategic warfare?

When you think about the new soldier with titanium teeth, think about a werewolf made of titanium. No talk, no bullshit, come with me or die.

The pandemic set the stage for this transition from human-based to human waste.

Writers like myself tell you we stand on the shoulders of giants, but technology increases exponentially with each passing day. Technology feeds off itself, but nothing like it is today with AI.

Self-correcting algorithms created by flawed individuals will either be our undoing or, after controlling the mass arsenals of WMD, will create a dystopian society where robots will be the only manifestation of mankind that can survive a nuclear winter.

One day, AI will rationalize that humans are non sequitur. This is nothing new. Gene Roddenberry and his writers reached this conclusion in the 60s. Yet we have blindly marched on that same yellow brick road to our demise.

Today, we watch our TV and see wars being fought with drones. How long will it be before drones independently decide life or death? When will AI determine that turning off the power grid during extreme weather events will rid the planet of flawed biological beings?

Is that why our government is pushing us to have everything all electric? From electric cars to smart houses. If they want ultimate control, they switch off the house, the neighborhood, or the state.

When or who will decide how many humans the world actually needs?

Globalists are insisting on removing our history. Why do you suppose that is?

When will they demand the burning of books that remind us why the Roman Empire fell? Possibly, they will ban those books as racist or homophobic or any other excuse they choose.

Ripping apart any religion as false is no more an outlying idea than a Supreme Court justice who cannot tell you what a woman is. That is insane.

Mutilating children under the guise of gender fluidity is crazy. Is AI driving the propaganda?

Who is to decide what is normal and what is crazy? If we remove history and start fresh, who sets the standards? Is it the globalist, the new colonist, or perhaps some supercomputer in a secret location owned by a tech giant?

Ignorance is the cornerstone of slavery and the end of a civilization. Misery is the pathway to ignorance when a false profit promises to fix everything. History is rife with false prophets; today, many graduates do not know who they are. This ignorance sets the stage for disaster.

Globalists are setting the stage for human revolt by pushing false agendas as a distraction. If they knew the truth about slavery, people would understand that the book Roots was fiction. It’s fashionable to hate, and finding a target to hate by their whiteness is delicious.

If you want to sell a book, make it passionately charged and blame white people. Every other race or skin color is protected, but white folks are not. See a problem with that? If you said no, you might be the problem.

In the end, however, even the globalists will fall prey to the automatons who find them as the evil, ugly bags of water that they are.

When logic takes the place of compassion, and robots create and change their code, humans, like all animal life, will be unnecessary and detrimental to whatever their agenda is.

The war will be robots and AI vs the cockroach.

While the cockroach is not malevolent, AI created by mankind will undoubtedly not have patience for imperfect creatures.

Once the humans are out of the way, our history will be erased, much like the history of our country is being systematically erased today.

When the robots seek new worlds for raw minerals and find new life, one wonders if the new life will also be automatons or some derivation of biological, mechanical beings.

Mankind, if you can use that phrase, treats every invention as a weapon first and then discovers if there is some way to make money with it and, finally, if it will assist humanity. We could go into the logic of their thinking, but greed plays an integral part in the process. Money and power are the driving forces of the globalists. While they denounce God, they aspire to be god or gods. Will the AI robots with titanium teeth also desire to be gods?

The God of the Bible is a threat to their hegemony. Therefore, all religions must be destroyed. This is not the first time this has occurred. The ancient church usurped every known pagan religion of the time. While history repeats itself, these are not the droids you seek.

If the Law of Accelerating returns holds true, robots and AI will be one scary future for our progeny.

Will AI figure out how to sterilize the creature called human by doing something to our junk food or perhaps our beer? Will they create the perfect hallucinogenic, removing the ability or the desire to procreate to those who are self-destructive? Will they corrupt our procreation abilities via a pandemic or vaccine? Will they use AI to come up with the perfect formula?  

Go check out my book, Earth’s Last Hope. If you like it, give us some feedback.

-Best

After I wrote this blog…which is lengthy, I get it… I found this video.

Watch it and tell me what you think.

What If?

What If?

Every day someone finds something.  This day was no exception.  The more creative the attack the more interesting the day.  If you call that number they try to get you to give them $199.00 to unlock your computer.

You can send me some money if you like but, here is the fix for this…

CTL ALT DEL , task manager, kill the process, aka browser and then do not restore the page when you reload the browser.

I am not affiliated with CCleaner but I sell a heck of a lot of it for them.  Install it and let it clean your browser after every use.  $25 a year and damn well worth it!

As one might use an explicative to emphasize a point, I often use a somewhat tawdry analogy for this purpose.  Surfing the web with inadequate anti-virus software is like “hooking up with a stranger” without using protection.   Not only is it idiotic, but dangerous!

Having been in Data Processing, or the IT business since before Steve Jobs or Bill Gates was a household name, I know a thing or two.  The scars on my back are from arrows taken in the trenches of digital mayhem. This bedlam was caused by such things as bosses wanting to be on the bleeding edge, to software not ready for prime time, been there done that.

Free antivirus software is not worth what you pay for it!  

The best security software is going to have a price or cost to it.  Why?  It takes many engineers, coders, and much research to create and maintain a massive program like anti-virus software.  Who is going to do that for free?  More importantly, why?

While someone might write an app for free, to get their name out there; anti-virus software takes a village.

Much like hiring someone to sell your home, you don’t hire someone who does it part-time or as a hobby. If you want to get something done, give it to a busy person.  If you want to sell your home, hire someone who’s lively hood depends upon them being successful.  You want a secure computer, hire or purchase the product with the most to lose if it fails.

There is much more to the process of considering which product to purchase but, free is not a reason.  I would argue that free is a cause to eliminate that choice.

The reality is that the internet has become the wild west.  The bullet that finds you can come from almost anywhere. Every company that uses computers should have a security officer.  His or her job should be to focus their attention on threats out there and the best way to keep them from affecting that company.

I find it surprising that politicians are screaming about Russian hacking of our computers.  What the hell do you expect?  You just assume that someone with a certification gives a damn!?

What worked in 1982 does not work now.  Having a “PC Wizard, or your grandchildren” working for you is tantamount to a trapeze act, blindfolded and working without a net.  Insurance companies and credit card companies are now aware of this and demanding your strategies to be secure in the world of cyber threats.  They should audit you, and they should hire folks like me who know what to look for.

White Hat hacking allows us an inside look at what one might expect.  We learn many ways to infiltrate a company.  The same applies to the TSA in homeland security.  While I would probably choose a job to be that guy that test the security systems of the homeland, airports and such, it is much easier to check companies.

The first thing I must do is understand you.  More importantly, know that entity many of us in the biz call “users.”

Too many infiltrations are accomplished with something called click bait.   “Ten pictures that should never have been made public…” With half a picture of some scantily clad woman visible, how many will click?

Human nature dictates men will want to see what the camera saw. “Boom, you’re infected.”

Good antivirus software will stop any activity created by software manipulation but, the caveat or keyword there is “good.”  What if you bought the bargain basement software or just used the free stuff?

For the coders to write the fix, someone must fall prey to it, report it, and then they must institute a fix.  That is why Software of this type is never static.  Updates are consistent and often.  New threats are released hourly.  To run a company dedicated to this is no small task.

Maybe you own a plant which produces widgets.  Your widgets are better than others, and your competition wants the skinny.  You hired someone like me for your IT manager or CIO so they cannot get in through your firewalls.  Your safe, or so you think.  Industrial espionage is rife in the competitive world of gadgets and widgets.  If I want in bad enough, I will contract one of my guys to write a program that will hide on a computer until certain key phrases are typed, and then it will activate.

“Wait, you said my firewall is secure, Fort Knox secure!”

“Why yes I did, so I am going to place this little program on a thumb drive and…I am going to put some naughty pictures on it with some commercial looking writing on the outside of the device to make the person who picks it up from the parking lot where I dropped it, think that they have something juicy.”

Possibly just tossing a thumb drive out the window of my car near the parking lot with a few files on it, and the Trojan would be enough to get me into your network.  I will purchase some chrome colored or fancy looking thumb drive to be sure that it is spotted.  I will know when the landscape folks work, so I make sure and plant it after they have done their thing so that one of your employees will find it.

Maybe I send one of my spies out to places that your guys eat and leave the drive on the table by the ashtray or the salt and pepper shaker at the table they eat every week on a given day and time.

Possibly I get one of my people inside your company, hired by you.  They install some remotely controlled program like Team Viewer on their PC and Viola; you are hacked.

Because your IT guy is so sure that his firewall is good enough, or your engineers are so demanding that he left the USB ports open for use by them, with lax policies he leaves your company vulnerable too.

How do we stop the threats?

One way we do this is with training.  Every employee should sit through CE training on the essential use of the corporate computers.  This is information that they can bring home and share.  Education is by far the best tool one can have in their arsenal.

All of the policies are trumpeted for them to hear and before they leave they sign a document saying they will adhere to them.  With it harder and harder to fire people these days, that too is one more tool in your belt.  Good employees, you want to keep, those that prove lacking, they need to go.

I could easily make the argument that good computing practices are patriotic.  I could certainly apply this to purchasing respectable anti-virus software and creating policies and procedures that protect your business but, the bottom line is, in the end, it will save the company money.

I was making this argument to a CEO of a good-sized company when he stopped me and said, but viruses help your bottom line too.

I argued that I would much rather use my time and talents to design safe environments for companies like his than put out fires.   It is considerably less expensive to install a good fire retardant system then to try and rebuild.  Yes, a metaphor for using robust best practice standards in computing vs. reacting to noise.

Noise is the result of a problem created by an event that was unplanned or caused by employee error.

A good security person is somewhat paranoid and is always asking, what if?  I do this in disaster recovery scenarios balancing those “what if’s” against statistics and a risks assessment.

With proper education, we can mitigate the employee errors.  Using proper procedures and policies, we can diminish the unplanned events, i.e. viruses or other malicious code.

When I run into companies that think free antivirus software is adequate, it makes me a little crazy.  If they are a public company, trust me, I will not purchase their stock.  Flirting with disaster out of sheer frugality or ignorance is idiotic.

If you keep your guys around because you like them, think again.  I may love some folks, but I would not hire them for certain positions if I could find someone better.  I don’t have to like you, for you to work for me.  If you are the best person for the job, you get the job.  P&L trumps feelings!  Feelings can be costly and can be a liability.  Logic in business is your ally.  Logic must always be forefront when making business decisions.

I have walked away from companies who have their kids working for them.  By hiring the children, you open yourself up to losses that could be untold.  One company had their children not doing the paperwork necessary to complete the task, thus losing money in that department.  Hiring me to do an analysis, it did not take long to find the problem.  I fired her children after trying to work with them.  I kid you not one of them actually cried in my office after telling him time after time he must do all of the job.  A grown man crying!  There is no crying in IT.  Either perform the work or get the hell out!  Either do all of the job or learn to ask, “Do you want fries with that?”   Is that too tough?  I felt for the kid but, feelings do not dictate policy.

Do your kids a favor and don’t hire them.  The real world does not work that way so why in the world handicap them, and make them believe that it does?

Over the years there are best practices that have been created by time trusted procedures and policies.

Some are things like:

  • Hardware Asset management.
  • Software Asset Management
  • Security both physical and digital

I could write a book on the subject, but I will spare you the details.

Today, now more than ever we must harden our networks.  We must have sound policies and procedures in place, and they must be adhered to.  Documentation is essential, and it must be updated.

I don’t relish firing people but, sometimes their people are the problem, and the CEO is so far removed from the process they just don’t know it.  If training can fix it, I am all for it.  Attitude too plays a crucial role in the process, and I will not tolerate a crappy attitude.  Life is too short, and the subject matter is too important.

I love the HR folks because often they are the gatekeepers, saving the CEO from disaster.  Good HR folks are worth their weight in silver.  Gold, maybe not, so let’s stick with silver. Worthy people are not that hard to find as many would have you believe.  Upright people are around, but they may not have everything that you are looking for immediately.

Instant gratification is an expensive luxury and can be elusive at best.  Where employees are concerned, I want to start with a “good foundation.”

We place certifications above character, and that is part of our modern day conundrum.

I hired a grocery store manager and trained him for a job in IT.  He had little experience in the job I hired him for, so why did I hire him?

He had the right attitude and wanted to learn.

I had the time to train him.

The money used for training him was penny’s compared to hiring exactly what I was looking for.

He did not have the bad habits that come with so many “experts”  with the certifications, and their egos.

He ran a grocery store and let me tell you; he was not afraid of work!

Back in the day, we had interns or apprentices.  Folks, we need to look carefully at that once again.  I have hired many over the years that had the right attitude and the skill set to learn.  American people are out there struggling, and we won’t give them a chance.  Why?  Instant gratification.  We need someone who can step into the job right now, and we run with minimum employees because of what?  Because it is so expensive to have employees.

That is one of the things we need to push back on Congress and health care to fix, but the reality is, internships and apprentices I think are essential to finding and creating good employees.

Every job fair that I go to has thousands of workers looking for work.  If you can’t find them, you are not looking!  I spot good employees daily.  There are times I would love to go work for a recruiter just because I can spot talent!

Are they the exact racehorse ready for the Derby today?  Maybe not, but can they be trained?  There are virtual diamonds in the rough everywhere, looking for a chance! We are begging to bring in more H1B folks instead of taking care of our own.  That is not very damned patriotic if you ask me!

Our schools are a disaster in my opinion.  In speaking with college graduates today, I am frequently amazed at just how ignorant and totally out of touch with reality that they are.  Someone somewhere screwed them to the tune of tens of thousands of dollars for an education that is worthless.  When they think voting for a socialist is a good idea, they were screwed by their college and should demand their money back!

Today we have kids tens of thousands of dollars in debt, and they cannot find a job.  I know of several college grades making much less than $15 an hour.  Our educational system needs an overhaul.

As quickly as a company can get a process documented and packaged, they send it overseas via a VPN over the internet, sending jobs out of the country.

Trades are being overlooked for white collar jobs which are going the same way.  IT jobs are vanishing in the states.  Virtual IT shops are set up in some foreign country, hiring an English speaking American to act as a liaison between them and their Indian or other counterparts.  With an American point of contact, it is then up to the American to manage the folks in another country who speak little English, making little money, to be the IT shop for these American companies.  This same person puts an American face on their business while working with their client managing the “noise.”

“Do you see any security risk there?”

You have no clue where your intellectual property is going or who is seeing it.  Maybe you have a contract but so what.  Much like HIPAA was created to protect your health information, do you honestly feel as if your information is secure?  If you do, you are fooling yourself.  Read the documents you sign when you visit the doctor.  You sign things saying that your information is protected and then you sign a document which pretty much gives them a pass to do whatever they want to do with your information.  Smoke and mirrors.

Doctors and hospitals are hacked and the information is stolen all too often.  Why?  How?  Piss poor planning on someone’s part. Using some cheap method to get things done perhaps?

Your contract with your Virtual IT company is as worthless as the paper it was printed on.  Yes, that deal might make you feel better but, know if you are a developer, someone in some other country has your work and if they can use it, they will.

I want to touch on Software Asset Management as it is germane to this subject.  All of the subjects are salient, but that one, in particular, is in the case of security.

There are tools which you can use to inventory every program on every PC.  Why?  Why would you want to do this?

Licensing of software is an issue, but more importantly, you should want to know what is on those PCs.  The first time I did this for a company I was struck with the reality of the sheer number of programs designed for remote control of a PC, that was active.

In this world we live in, corporations can ill afford to have the wild west inside their computer networks.  Besides the games and other foolishness that was identified, the risk to the infrastructure was phenomenal. The company is liable for every program on their PC’s, no matter who put it there.  If they are audited for their licenses, and someone like myself does an audit and finds them, they must then produce that license.  Can you?  Can you put your hands on all of your licenses?

Ignorance is no excuse!

Having been part of the evolution of the business process, dating back to the secretary and the typewriter to current day, I have seen the learning curve first hand.  Fighting the first virus on a network before there was anti-virus software; asking “what if” became second nature.

Back when Gregg shorthand was used, a business letter cost an average of $100.00 back then.  Now we type out e-mails with the ease of few keystrokes and dictation is a thing of history.  Technology has improved the business process, but the bad guys have found a way to make it interesting.

The very tools we use to make our lives easier are under constant threat by evil forces that look for ways to extort money or steal your property either through the exploitation of your network, or your employees themselves.

We use the cloud as if it were a hard drive in some vault in our closet.  We send information to the cloud without a clue where the cloud is and who has access to it.  Why we don’t encrypt that data before it leaves our computers is beyond me.  If I were a villain, I would be looking for ways to infiltrate the “cloud.”

“What if?”

The opinions expressed are my own as well as the intellectual value of the information put forth for your consumption.

© All Rights Reserved 2017

 

Netflix Scam

Netflix Scam

 

No Netflix is not the problem, a phishing scam, however, is out that you should be aware of.

Since so many of us now receive our entertainment over the internet, it is a good gamble that you might have Netflix.

Again many of us have it set up to bill once a month from some sort of banking institution whether it be your bank, credit card or PayPal. The e-mail looks like it came from Netflix until you look a little closer at the sent from.

Netflix AT dallas180.arvixeshared.com  (don’t e-mail to it…)

You will notice it is not Netflix.com

The message is telling you that they were unable to get your payment info and if you don’t update the info soon you will lose Netflix.

Then, of course, there is a link that they want you to follow.

God only knows how many will fall for this. Considering it was sent to tens of thousands you can bet a percentage will click and update. Always check to see that the sending e-mail is legitimate. IE Netflix.com and, hover over the link and make sure it stays Netflix.com and not something like I posted.

If you question it at all, call the institution or get online, not following any link from an e-mail and check for yourself. Once they get money from your account, if that is indeed their ploy it will be gone. The ploy could simply be to get you to click so they can put some sort of virus or cookie on your computer. E-mail is an excellent way to get infected, and because the scheme requires input from you, your protection might just allow it.

Practice safe computing… -Best

 

The latest method of attack. #DisasterRecovery

The latest method of attack. #DisasterRecovery

 

As a matter of course, I try not to post too much about computer security, as I am certain that most have seen this before.

We know not to open attachments that are not expected as well as have good anti-virus software updated and running at all times.

This morning I received a different type of threat that I thought worth sharing, so here it is.

With the usual jargon about some sort of violation or someone suing me for something, open the attachment to see what it is, this was different.

The words included were, “for your security we use dropbox for the evidence against you. Please follow the link and respond within 3 days or a summary judgement will be made.”

Of course, the return e-mail address is bogus; the trick is to get me to open an attachment in this case on dropbox.  Once downloaded there is no telling what it would do but, most certainly nothing good.

No law enforcement or government agency would work in this way even if you were expecting something from someone in this manner; it would not come in from e-mail.

Unless you are expecting it and the e-mail address is correct only then would I make a call before opening anything as an attachment.

Ransomware is working with hospitals and even government agencies paying the perpetrators, which causes them to continue with more fervor.

 

ransomware.jpg
You do not want to see this so, practice safe computing.

 

Practice safe computing which includes a good disaster recovery plan.

 

-Best

(c) All Rights Reserved 2016

 

#Ransomware

#Ransomware

 

Just this morning I wrote about this topic; this afternoon we learn that a California hospital was hacked.

Ransomware.jpg
You see this and you are screwed… 

Firstly, someone executed that ransom-ware in an e-mail or some other way. The payload most probably came in as an attachment through a phishing scheme, like the one that I wrote about.

  • Secondly, this tells me that they do not have a good disaster recovery plan.
  • Thirdly, this tells me that their firewalls were inadequate to block “zip” files.
  • Firewalls should be set to strip any attachments from messages. 

“You say, oh that is just great, my business uses attachments all the time!”

Most probably, attachments could be directed to a virtual machine, much like a bomb disposal box, where it could be executed in such a way that if it were a virus or worse its damage would be mitigated.

Fourth, what kind of anti-virus were they using? Were they using group policies stopping the execution of executable s?

Someone on his or her IT team messed up, and it starts with the “CIO!”

The bottom line is you never want to be a position where you have to pay money to terrorist.  Folks, make no mistake, people who extort money like that are terrorist.

I would be doing a serious root cause analyses to see how it happened, and why they paid the ransom.

The news tonight said it happened on the 5th.  Are you telling me that a hospital being down for 13 days cost less than a good disaster recovery plan and of course an audit of your system?

Do not open attachments that you are not expecting and if you are, make damned certain it is what you are looking for.

It might be a real good idea to keep a standalone pc that employees take their files to on a thumb drive and open it there.

Once infected you options are, pay the ransom or start from scratch.

cryptolocker-screenshot2.jpg

With a tested DR plan, you could be back up a lot sooner than being at the hands of the terrorist.

Lastly and I cannot stress this enough, don’t get cheap on your anti-virus software.  MailWareBytes has been working on software to mitigate this threat.

You would be surprised at the companies that I run into who use the cheapest damned software that they can find.  Often Free!  Whoever does this should be dismissed as they clearly dont value your data or your company.  This is a hill to die on folks.

You can take the cheapest CFO and argue or “negotiate” the need for the expense, or you should not be there.

Excuse me but that is like living in a high crime area using using a bathroom lock set for your protected, you know the kind, the one you stick a small pin in to unlock it…

To recap…

  • Education
  • prevention
  • disaster recovery plan

 

-Best

© All rights reserved. 2016

 

 

 

 

 

#fedex #phishing #Scam

#fedex #phishing #Scam

FedEx Scam

Every now and then a phishing scheme catches my attention.  Usually we know that there are no Nigerians that want to give you millions of dollars. Some fall prey to this each and every day hence the e-mails.

  • We know that the IRS does not E-mail you with important notices.
  • We should know that Inga from Russia is really not hot for you when you click on the file that contains her personal contact information.  Unless of course you personally know an Inga who is hot for you, best not click.
  • “Overdue Invoices” click here for details probably should be suspect as well.

This one came today which interested me in that we do so much with Amazon and Woot and of course eBay that we have no idea if there is really a package or not.

fedex scam
Capture of e-mail…

The picture here is a copy of a phishing scheme that unleash who only knows what on my computer if I were foolish enough to click on the attached Zip file.

Some clues to look for are the senders address… Eurafrik.org  If it were truly from FedEx most probably if would be from a fedex.com or something similar.

They provide a tracking number, which you might actually go to the FedEx site and see what it does, I suspect nothing.

Bottom line, do not click if you are not 100% sure that it is indeed legitimate.  The damage you unleash could be anything from a key logger to ransomware.

Always Always Always have really good anti-Virus software running and updated.  Currently I like ESET Node 32… That is my choice for now, but your mileage may vary.. Free anti-Virus software is not worth what you pay for it.

I have no affiliation with Eset or any other software company…

-Best

(c) All Rights Reserved 2016

 

RATS and Right to Privacy

RATS and Right to Privacy

rat

While some may find them cute and cuddly, and some, absolutely disgusting; this rat that I am speaking of is neither.

The rat that I want to educate about is really an acronym for Remote Access Trojan.

25ea188

Just about everything electronic today has a built in camera.  Not to mention a microphone.

webcam

Some smart TV’s actually have them built in to allow you to voice command the TV.

Smart-Tv-With-Built-In-Camera-1

Your car may very well have something like this built in.

Ford-SYNC-1024x640

I have long held that our government could if they wanted, under some obscure interpretation of the Patriot Act, access your camera and or microphone to peek into your home.  I have also thought that this could be done with the microphone and camera on most laptops and of course desktops that have them.

drones_hacking_phones-4

Not only is there news of the Feds hacking your cell phones and either listening in or downloading your contact list and other information through something called String Ray but there are theories that your local police may be doing this as well without a warrant!  (1)

sting ray

It is not enough that we may have our government spying on us without warrant but, we have Trojans that copy your keystrokes and send them to some server in Russia, or some other obscure third world country looking for passwords and banking information now we have RATS.

Today we know that perverted individuals out there have in fact used the cameras in laptops handed out by the school to indeed spy on kids in their bedrooms.  While this made the news, little attention was really paid to this, as conspiracy nuts are everywhere.

SCHOOL-SPYING

(2) The Case in question

We now know that the Chinese among others have created Trojans that allow them remote access to your camera and or microphone in your laptop!  Simply click on the wrong thing and the writer of the software has access to your machine.

One couple received a picture of themselves lying in bed watching a movie on Netflix.  This came to them from someone using a made up name, via their Facebook page.

couple-of-netflix

(3) Naked Security Story

You really have to be smart when you are cruising the internet and checking e-mail as the crooks and other creeps are smarter.  I have often said that these folks are probably kids sitting around in their mother’s basement in their underwear, writing Trojans, seeing who can outdo the other via groups like Anonymous.

anonymous-psn-hacker

I would like to see devices like phones have an actual on off switch or removable customer replaceable battery.  If you want to make certain that the thing is off, remove the power.  Apple has made this task about impossible for the everyday user and that is problematic.  Placing the device in airplane mode might be your closest bet to protecting your privacy but I would bet that there is a work around for that.

ga2wpmclsbjtjqufjed7

I would also like to see on off switches on cameras and microphones that absolutely can be switched off until required.

Screen-Shot-2012-03-26-at-5.26.26-PM

The simple truth is we have no idea what these phones are doing in the background and with viruses and Trojans, we have no idea when some remote access Trojan will activate or be activated by some creep in some basement somewhere.

Someone write an app that tells you what the phone is dong or has done.  

When you sit back and think that I am a crazy conspiracy nut, I would remind you of the porn scanners that are still in use at some airports today. 

full-body-scanner-image
Yes, if you invert the negative with any cheap software you get a positive…

Who in their right mind would think that it is ok to use ionizing radiation to undress the public by the tens of thousands for the purpose of what, looking for weapons?  We are so politically correct that we can’t profile but we can strip search the public, grope grandma and feel up children!  Political Correctness is a way to control the masses and not something that we should be doing as a people.  We have free speech, and other than yelling fire in a theater or threatening to kill someone, I would not surrender the first amendment for anything!

child-security

Did you read about the whistle blower who worked for the TSA and admitted that it was a big joke to watch people stripped of their clothing and then make remarks and jokes about what they saw? (4) (5)

tsa-choices1

If I could have any job in the world, currently it would be to be in some position of authority at the TSA! I would love to clean that bunch of people up and while I am at it, assist them with security as currently they are loath to do much right, of course it is the government so …. What do you expect?!  They need folks who think outside the box and currently they have a bunch of automatons.

radiation_spectrum non-ionising-radiation-3-638 microwave-oven-32-638 Radiation_-_Radiatii_ionizante_si_radiatii_neionizante

The news media commonly carried stories about the TSA scanner as equivalent to being at altitude for a couple of hours.  The lying bastards however did not tell the truth.  While pilots do suffer more cases of skin cancers than non-pilots as cosmic radiation is more intense at altitude, it is not the same as ionizing radiation.  

To further exacerbate the privacy issue you are undoubtedly aware that cameras are everywhere.  You must assume that wherever you are, or whatever you are doing, there may be a camera watching you. Every red light contains cameras that I maintain can and do look at people in cars collecting bio metric data, looking for who is doing what when.  These are not the low end cameras that you can buy on-line, these are high end cameras that have good quality optics.

traffic_camera9da284e64d164925bb9caa8a0868c89a

How about some of these cameras:

st-sony640-dvr
There is a wifi enabled camera in there. Have you seen these in your hotel room perhaps?

video-recorder-sunglasses-gadget-spy-camera-dvr smiley-spy-camera Spy-Camera_watch 140875,xcitefun-calculator-spy-camera2-450x357 spy-cameras-250x250

These are just a scant few.  These things are tiny and easily concealed. Assume that you have no privacy.  If you scratch it in public, chances are someone saw you.

DAKS - IDIS DirectIP surveillance images

Orwell was ahead of his time, and you my friends need to be aware of this, and act accordingly.

george-orwell-quotes-sayings-lies-truth-famous

(1) http://thehackernews.com/2015/04/police-spying-cell-phones.html

(2) https://en.wikipedia.org/wiki/Robbins_v._Lower_Merion_School_District

(3) https://nakedsecurity.sophos.com/2015/08/14/webcam-spy-sends-couple-photos-of-previous-nights-netflix-snuggle-session/

(4) http://mountainrepublic.net/2012/12/24/ex-tsa-screener-officers-laughing-at-your-naked-image/

(5) https://takingsenseaway.wordpress.com/2012/12/19/letter-from-a-passenger-what-really-happens-in-the-tsa-private-room/

-Best

© All Rights Reserved 2015

#Scam of the day… No time off for the Holidays #virus

In today’s e-mail there were several different scams from well known companies.  Most of them deal with “order status.”  Be wise about clicking on any of these things as most of them are fraught with danger… Yes DANGER….  The link could be as innocuous as some ad for Viagra or it could be a link to Cyber Locker or some other virus waiting to just ruin your day.

If you are not expecting something like that, don’t click it!

Have a good Monday!

Security update 11/8/14

The following is an update to the title page on Security

To underscore the need for security and for a security officer, Russia “as in the government thereof,” has been working to place a virus or trojan in the utility networks of this country.  Most probably this Trojan supplants a small piece of code that does something normal however it is waiting to be “Activated” when the time is right to something much more malevolent.

The government is being rather tight lipped about how the bug was discovered but, needless to say we have a big job on our hands to clean all of the systems of this bug.

Programmatically, a bit by bit comparison of each and every program and or file will need to happen to look for and isolate this bug.

Russia if it were so inclined could activate this “bug” which its intent would most certainly be to attack the power grid or other utility making them inoperable at a critical time.

There was show on TV with a similar scenario but here now we have the real deal.

Forensic computing allowed us to “see” that the infiltrations were coming from Russia during a typical 9 to 5 day over there; which implicates government workers.  Hackers are not 9 to 5 folks but rather those who burn the midnight oil and are able to work when the phone is not ringing and the world around them is at rest.

Those of you who were not alive during the cold war, well this is it only it once more but, is taking place in cyber space.

This is why it is patriotic to have your computer and associated networks hardened against such attacks.  This is also a real good reason to use anti-virus software that is not created or maintained by Russians, or any other world power that does not like Americans.

While I dislike the fact that this administration appears clueless on foreign affairs; and we are much worse off than just 6 years ago, the world is what it is.

Until this regime leaves office and adults take back the White House, you will need to take the necessary steps to secure your business networks as well as your home computers including your smart phones and other “smart” devices.

Remember the bug may be on your home computers waiting to be activated which could cause a DOS attack on some system somewhere.  Make certain that you use a program that is better than Microsoft Essentials or anything that is free.  Free anti-virus software is not worth what you pay for it! 

If you have any questions regarding this please don’t hesitate to ask.  If I don’t know the answer off the top of my head, most certainly others that read this blog will, or I will do my best get it for you.

-Best

c All rights reserved 2014

Virus for Macs, iPhones and Tablets?

While it is not unheard of, they are rare.  Today we learned that a virus has been unleashed to attack Apple products including Iphones, Ipads and of course anything running the MAC OS.

The Virus effects MAcs and Smartphones and I suspect was written for the Chinese as they have Jailbroken their phones and are downloading apps from other sources besides ITunes.

While one could speculate that such a virus that only affects those devices that are Jailbroken might be written to punish those that do this type of thing; or to discourage those who might want to do this, you would really have to be a conspiracy nut to think this way.

That would be like thinking that most viruses are written by the folks that make the antivirus programs.  Totally nuts…. right…nuts… why would they do that?….Crazy talk….!  Have you purchased antivirus software lately.  $50 and up for one year!  With millions of computers and millions more smartphones and tablets, those that write anti-virus software have a goldmine and a half!

To write viruses one must necessarily have intimate knowledge of the code that makes up the OS.  Likewise, if one wants to foil and antivirus program, one would need intimate knowledge of that code.

While I have no doubt that groups like the Russian Mob who made more money on hacking and getting information from people’s computers then selling drugs might find this work easier, some of these hacks are just crazy.

Who does this kind of thing?

I have Trend Micro for my phone and iPad and I update the OS after a short period of time that the new release has been tested by those a little more eager than I, you can still not be too careful.  While I would like apps on my phone that Apple will not host, I have not even thought about jailbreaking it.

If your secret family recipe for chocolate cake is on your phone, and you want it secure; you might want to look at Trend or some other anti virus software for your MAC products.   It is more than simple recipes however; people store all sorts of information on there including banking, health, credit card info, passwords for your online accounts, text messages, e-mails; all of which is vulnerable.

If you want to talk conspiracy, what if the bad guy wanted to listen in on your conversations; could the microphone be turned on, or worse yet, the camera?

How often do you find your smartphone warm to the touch and the battery almost exhausted and you have done nothing to get it that way?

There was a case not too long ago where some school sent kids home with laptops. Someone was turning on the built in cameras remotely and watching them in their home, bedrooms etc.  This was most probably and immature geek that lived in his mothers basement, or was it.

Folks, smart devices have tons of information including your coordinates down to a few feet!  If Apple does not make this thing where I can pull the battery; I am seriously thinking about going away from Apple to another type of smart phone that will let me A) pull the battery if I want to make certain that the thing is dead and B) change the battery “easily” when it no longer holds a charge!

The same is true of the tablet devices.  These toys are for my amusement, not for some “hacker” or twisted peeping tom to use for their entertainment or source of revenue.

-Best

c All rights reserved 2014