I doubt they would have done other than they admitted that they had a potential digital trail, so best to report it to prevent comeback.
299 posts • joined 15 Jan 2014
Not only is it crass, but you just know it will be set up like many actual scam emails that have gone before ... maybe they are just assuming that because they fell for a real scam, they will be just as likely to input details on a new 'non-scam' link.
Those that have had details compromised will hopefully have new accounts so although they have the scammed account information it may not be active. However, they still have other contact information. Maybe try with the banks they held the compromised account with so they can work out an automatic credit option.
Ransomware is different to DDOS though. In the one they potentially have something of real value to 'trade', that being the encryption key. In the other they are forcing you offline, but there are steps you can take to mitigate, prevent, circumvent.... etc etc.
We have had 1 bad ransomware attack, a user ran an infected payload on their laptop, which was connected to their home and team areas, everything was encrypted. Thankfully we have a decent backup system, so we simply restored everything from shortly before the incident (after blocking their laptop from the network till it could be cleaned). We have also been hit by a number of sophisticated DDOS attacks, once we analysed their attack vector we started putting steps into place to reduce it's impact and subsequently negate it entirely.
If we hadn't had any backups of those filestores though, I can quite imagine the CTO agreeing to pay the ransom on the chance we would get the data restored.
One of the main concerns of the very easy to hack smart meters is that you can easily tell a households habits, and hence when they are not in.
Security should be the number one concern of any IT appliance, unfortunately it generally feels to be last minute, rushed and under-appreciated.
I suspect that the weight/space is a big part of it. If you base it off flight time of 2-3 hours that would be fine. But if you then include in-air refuelling for longer flights .. how do you refill the tanks at the same time? So you would then need bigger tanks to cover long flight scenario ... at some point this just becomes unfeasible.
Always reminds me of independence day...
I completely agree. It is ridiculous to include these monopolistic companie as freebies if they don't offer the same to all social media platforms.
How will this be recorded?
Who has access to this data and what are the data sets?
How long will this data be kept for after the billing cycle is complete.
I would have thought it all comes down to the difficulty to acquire legally at a reasonable cost vs the difficulty of pirating. Services like netflix, amazon prime, spotify make it much simpler to say I want to watch/listen to that and I can stream it to my current location. It would be interesting to see what the level of piracy is on music/films available on a streaming service vs those that aren't.
You quite clearly demonstrate that you know absolutely nothing about how an AC unit works... nor indeed how a data centre is designed. If you have never utilised or understood either why post such drivel?
I know that if I knew sod all about something .. I would just keep my criticisms to myself rather than demonstrating to all and sundry my complete lack of knowledge. Of course if I wished to learn more about said topic, I would read up on data centre designs or even post a nice comment asking others to explain the mechanics of the situation.
This post has been deleted by a moderator
The problem isn't that they have a background in the sector or not, it is that they spend stupid amounts of money on 'consultations' with others who know nothing about the sector, yet they are quite happy to 'consult' and make spurious design recommendations that are completely insensible. But that's OK, as they have the right family/government connections.
Which just goes to show, yet again, that the weakest link is always the fleshy meatbags behind the keyboard. No matter how locked down your security is, no matter what policies you have in place, people will find a way around (either through supposed necessity or accidental ignorance) or just be unaware of the implications of what they are sharing. There are no plausible solutions (other than cyborg upgrades), that doesn't mean we don't keep trying of course. Just have to accept the inevitable and re-educate at regular intervals.
Biting the hand that feeds IT © 1998–2020