A More Practical Way To Recover Data From Ransomware

Ransomware is scary. It’s a computer virus you’d want to stay away from. If your computer isn’t protected, it’s going to be pretty hard to stay away from it.

Sad to say, the most common remedy to this particular virus is to pay an exorbitant fee to get back your data. That’s ridiculous! Why should you have to pay for your very own data?

Unfortunately, that’s the way it goes. Once your computer is infected by ransomware, everything in it is held hostage. If you think that’s totally surreal and it can’t happen to you, well, think again.

Every 14 seconds, a new business is targeted by ransomware — a virus that holds its software systems or data hostage until a ransom is paid for their safe return.

(Via: https://thehustle.co/hackers-ransomware-cybersecurity-ethics/)

The last thing your business needs is to be in the mercy of hackers. You simply cannot afford to have all your confidential data turned over to a bunch of crooks.

If your computers have not been infected by ransomware, then good for you. However, that does not mean that you’re going to be spared from it at all times. Your computers can still get infected. You just don’t know when.

It’s just very unfortunate that businesses have to pay to get back their data. They don’t really have much of a choice, do they?

Once businesses are hit, they have 2 options: Pay hackers to return the data, or pay ransom-busting startups to recover it.

(Via: https://thehustle.co/hackers-ransomware-cybersecurity-ethics/)

Even if you don’t resort to paying the hacker, you’re bound to spend a lot as well.

But, according to a new ProPublica report, those 2 options are often the same: Most “high-tech” data recovery startups merely pay the hackers behind the scenes — and then pocket the extra fees.

(Via: https://thehustle.co/hackers-ransomware-cybersecurity-ethics/)

While ransomware recovery companies offer a valuable service to help you in times of trouble, you would still have to pay. In most cases, you would have to pay a lot.

The business model is simple: Ransomware recovery companies charge their clients fees that are far higher than the ransom amounts, so they make money no matter

Ubuntu Linux Gets Intel MDS Mitigations for Intel Sandy Bridge CPUs, Update Now

Canonical released another update for the intel-microcode firmware for all supported Ubuntu Linux operating systems to address recent Intel MDS (Microarchitectural Data Sampling) security vulnerabilities.

Last month on May 14th, Intel published details about four new security vulnerabilities affecting several of its Intel microprocessor families. The company released updated microcode firmware to mitigate these hardware flaws, which quickly landed in the software repositories of all supported Ubuntu releases, but only some of the processor families were supported.

Last week, intel-microcode firmware updates arrived in Ubuntu’s repositories to mitigate these new security vulnerabilities on systems using read more)

from Softpedia News / Linux https://news.softpedia.com/news/ubuntu-linux-gets-intel-mds-mitigations-for-intel-sandy-bridge-cpus-update-now-526488.shtml…

GNOME Asia Summit 2019 Announced for GNOME 3.36 “Gresik” Desktop in Indonesia

The GNOME Foundation announced the official dates for their summer developer and user conference, GNOME Asia Summit 2019, which will take place later this fall in Indonesia.

Every year, the GNOME developers and contributors gather together for the GUADEC (GNOME Users And Developers European Conference) and GNOME Asia Summit events to plan the next major release of their beloved, open-source desktop environment for Linux-based operating systems.

While the GUADEC 2019 conference will kick off this summer between August 23rd and 28th, in Thessaloniki, Greece, for the upcoming GNOME 3.34 “Thessaloniki” desktop environment, the GNOME Asia Summit 2019 event will take place between October 11th and 13th, 2019, in Gresik, Indonesia.

The GNOME Asia Summit 2019 conference will be held at the Universitas Muhammadiyah Gresik (UMG) for the GNOME 3.36 desktop environment, whi… (read more)

from Softpedia News / Linux https://news.softpedia.com/news/gnome-asia-summit-2019-announced-for-gnome-3-34-gresik-desktop-in-indonesia-526487.shtml…

CentOS 7 and RHEL 7 Get Important Linux Kernel Update to Patch SACK Panic Flaws

The Red Hat Enterprise Linux and CentOS Linux operating systems have received new Linux kernel security updates that are marked as important and address the recently disclosed TCP vulnerabilities affecting all GNU/Linux distributions.

The new Linux kernel security updates patch an integer overflow flaw (CVE-2019-11477) discovered by Jonathan Looney in Linux kernel’s networking subsystem processed TCP Selective Acknowledgment (SACK) segments, which could allow a remote attacker to cause a so-called SACK Panic attack (denial of service) by sending malicious sequences of SACK segments on a TCP connection that has a small TCP MSS value.

“While processing SACK segments, the Linux kernel’s socket buffer (SKB) data structure becomes fragmented,” reads Red Hat’s security advisory. “Each fragment is about TCP maximum segment size (MSS) byt… (read more)

from Softpedia News / Linux https://news.softpedia.com/news/centos-7-and-rhel-7-get-important-linux-kernel-update-to-patch-sack-panic-flaws-526486.shtml…

Debian’s Intel MDS Mitigations Are Available for Sandy Bridge Server/Core-X CPUs

The Debian Project recently announced the general availability of a new security update for the intel-microcode firmware to patch the recently disclosed Intel MDS (Microarchitectural Data Sampling) vulnerabilities on more Intel CPUs.

Last month, on May 14th, Intel disclosed four new security vulnerabilities affecting many of its Intel microprocessor families. The tech giant was quick to release updated microcode firmware to mitigate these flaws, but not all the processor families were patched.

Therefore, the Debian Project has now released a new version of the intel-microcode firmware to mitigate the Intel MDS (Microarchitectural Data Sampling) hardware vulnerabilities, including (CVE-2018-12126 (MSBDS), read more)

from Softpedia News / Linux https://news.softpedia.com/news/debian-s-intel-mds-mitigations-are-available-for-sandy-bridge-server-core-x-cpus-526469.shtml…

Security-Oriented Alpine Linux Receives Serial & Ethernet Support for ARM Boards

Natanael Copa’s security-oriented Alpine Linux operating system has been updated to version 3.10.0, a major release that brings several new features, various improvements and bug fixes, as well as lots of updated components.

Alpine Linux 3.10.0 has been released and it is now available as the latest and most advanced stable version of the security-oriented operating system based on the musl libc libraries, and using the powerful and open-source BusyBox utility for general system administration.

It brings the cross-desktop LightDM display manager, the Ceph distributed object store and file system, and iwd (iNet wireless daemon) as a replacement for wpa_supplicant, though Extensible Authentication Protocol (EAP) support isn’t working in this release. It also adds serial and Ethernet support for ARM boards.

Now powered by Linux kernel 4.19 and GCC 8.3

Powered by the Linux 4…. (read more)

from Softpedia News / Linux https://news.softpedia.com/news/security-oriented-alpine-linux-receives-serial-ethernet-support-for-arm-boards-526468.shtml…

Canonical Outs New Linux Kernel Live Patch for Ubuntu 18.04 LTS and 16.04 LTS

Canonical released a new Linux kernel live patch for the Ubuntu 18.04 LTS (Bionic Beaver) and Ubuntu 16.04 LTS (Xenial Xerus) operating system series to address the recently disclosed TCP Denial of Service (DoS) vulnerabilities.

Coming hot on the heels of the recent Linux kernel security updates published earlier this week for all supported Ubuntu releases, the new Linux kernel live patch is only targeted at Ubuntu versions that support the kernel live patch and are long-term supported, including Ubuntu 18.04 LTS (Bionic Beaver) and Ubuntu 16.04 LTS (Xenial Xerus).

And it’s here to address the same two security vulnerabilities (CVE-2019-11477 and read more)

from Softpedia News / Linux https://news.softpedia.com/news/canonical-outs-new-linux-kernel-live-patch-for-ubuntu-18-04-lts-and-16-04-lts-526466.shtml…

KDE Plasma 5.16 Desktop Environment Gets First Point Release, Update Now

The KDE Project released today the first maintenance update to the recently released KDE Plasma 5.16 desktop environment for Linux-based operating systems.

KDE Plasma 5.16.1 is now available only one week after the release of the KDE Plasma 5.16 desktop environment series, a major version that adds numerous new features and improvements, including a totally revamped notifications system, new look and feel for the login, lock, and logout screens, better Wayland support, as well as numerous other desktop enhancements.

Consisting of a total of 21 bug fixes, the KDE Plasma 5.16.1 maintenance update is here to make the KDE Plasma 5.16 desktop environment more stable and reliable by addressing various issues reported by users lately, including an issue that broke the Sleep/Suspend command, and the ability for the Plasma Dis… (read more)

from Softpedia News / Linux https://news.softpedia.com/news/kde-plasma-5-16-desktop-environment-gets-first-point-release-update-now-526455.shtml…