We illegally scarfed your data
So here's a coffee and a bun to compensate? Seems a light punishment...
Canadian fast food chain Tim Hortons is settling multiple data privacy class-action lawsuits against it by offering something it knows it's good for: a donut and coffee. The Canadian Broadcasting Corporation (CBC) said Friday that Timmies' agreement still requires approval from the courts, but if given the go ahead, Tim …
From earlier article:
"The app debuted in 2017 and by July 2020 had been downloaded almost 10 million times, though it was only used actively by about 1,600,000 people that month."
So that is ten million times a buck fiddy - assuming that everyone with the app takes up the offer. Although I'm guessing that fifteen million dollars still isn't much of a deterrent.
"So that is ten million times a buck fiddy - assuming that everyone with the app takes up the offer. Although I'm guessing that fifteen million dollars still isn't much of a deterrent."
Then subtract the cost value from the retail value for all those who go "oooohhhh....FREEEE!!!" and take that as an extra rather than just the usual purchase. Those are not "lost" sales and so only a "loss" of the cost price.
Visited relatives in Canada many years ago - they raved about their favourite coffee at Tim Horton's.
My godfathers! The "cappucino" came pre-sweetened with some sort of muck that nearly made me bring it back up after a couple of swigs - couldn't finish it.
Don't think that Tim Horton's will dare to open up in Italy any time soon.
Confessing ignorance here, but how does that work?
I get an unexpected email with an ISO attached, so I immediately save the attachment to a local drive, right-click and mount it as a new drive letter, open a file browser to that drive and start double-clicking on everything in sight? And never question why the purported sender of the email has suddenly chosen to do things this way when they normally have trouble attaching just one JPEG?
Even if your box automounts the ISO (mine doesn't and I don't recall telling Win10 not to - maybe I broke something?) isn't this still odd enough to warn people?
Yours, possibly with excessive in humanity, etc
has a fun reply to someone asking if they can have a copy of an infected file to examine: the answer was basically "No, not ours to distribute" and cheerfully followed by "If you want to research the corrupt DXE driver, you are welcome to search your own telemetry for similar samples".
In other words, "Here is what the turd looks like, now go look through your own dungheap, you'll probably find one like it."
But glad to hear that the likely infection route is the "evil maid attack scenario" so I'm not likely to have this malware. Oh, a cuppa? Very thoughtful, Mai Ling, let me hold that duster.
Likely the same as happened with buying non-crispy, no actual cream, doughnuts from Krispy Kreme in the UK. People, especially the 20-30 age group, will go "Ooooh...Americain[1], must be good"
[1] Most Brits will neither know no care that Hortens is actually Canadian,
That can either go to a URL or to a local application, including arguments. It's likely that's either a way to launch a shell with a small script that pulls down other data or a way to send someone to a webpage without having a link in the email text. Don't click on one.
I think .zip files are almost always the first archive format to be decompressed by scanning or blocked outright. I know some email systems simply won't accept any .zip attachments at all. I don't know why .rar wins out in the other format wars, as I can say from experience that I've never found a mail system that rejects .7z files. Maybe because the format's not open source, attackers think scanning tools are less likely to implement decompression for it than for the other formats that are open, but I think the code to decompress has been written already, so I don't think that would be well-placed confidence if that's their reason.
> Is there something about RAR that makes it particularly suitable?
Apparently there is, unless they are just haxx0r cool. For as long as I remember, malware and pirated content always came as .rar files (with the few .7z files, when that format was brand new and thus cool).