Ransomware Authors Agreed to $400,000
Officials in Jackson County, Georgia, paid $400,000 to cybercriminals last month. That was the extortion fee to get an encryption key for a ransomware infection and regain access to their IT systems. The County hired a cyber-security consultant to negotiate a ransom fee with the hacker group. Jackson County officials have not yet confirmed how hackers breached their network.
The infection forced most of the local government's IT systems offline, with the exception of its website and 911 emergency system.
"Everything we have is down," Sheriff Janis Mangum told StateScoop in an interview. "We are doing our bookings the way we used to do it before computers. We're operating by paper in terms of reports and arrest bookings. We've continued to function. It's just more ... Read More
Traditional intellectual property thinking no longer applies
In the era of rapidly advancing artificial intelligence, the concept of intellectual property (IP) faces unprecedented challenges. As AI systems become increasingly capable of generating creative works and innovations, the traditional notions of IP become obsolete.
Here are three reasons why I think intellectual property no longer exists in its current form in the AI era:
Blurred lines of authorship and inventorship in intellectual property
AI systems can now create content and develop solutions that rival human-generated works. This capability blurs the lines between human and machine-generated content, creating significant challenges to traditional concepts of authorship and inventorship. When an AI system creates a piece of art or develops a new formula, determining ownership becomes complex. Is it the AI itself, the ... Read More
February 7, 2025Mark Anthony Germanos
Extortionists demand money even though no agreement made
Anyone who depends upon good public opinion can be vulnerable to orchestrated bad word-of-mouth, especially in the form of online reviews.
Podcasters are being targeted by extortionists who threaten to swamp their shows with negative reviews, according to Mark Asquith at Rebel Base Media. Asquith cites one recent case in which a scammer reached out to a podcaster on social media and offered to promote their show.
When the podcaster expressed interest, the scammer didn’t respond for several days. After that, the scammer sent a message informing the target that they’d been promoting the target’s podcast for the past few days. The scammer then demanded hundreds of dollars in payment for this supposed service. “No agreement had even been discussed, ... Read More
February 7, 2025Mark Anthony Germanos
New Cybersecurity best practices
In December 2018, the Department of Health and Human Services (HHS) published the “Health Industry Cybersecurity Practices (HICP): Managing Threats and Protecting Patients” publication. This new directive offers cybersecurity best practices that healthcare organizations of any size can implement. Originally posted by Fred Langston CISSP, CCSK at CI.Security.
I’ve been doing health industry cybersecurity for a long time, which has led to my involvement in helping to craft cybersecurity policy for the healthcare industry. One of my first experiences was back in 1996, when I was part of the working group that provided guidance on the proposed HIPAA Security Rule. That rule established certain standards for security moving forward. The resulting risk-based approach was meant to allow the vastly different types and sizes ... Read More
February 7, 2025Mark Anthony Germanos
Water utilities are popular targets
It wasn't the first time the Fort Collins-Loveland Water District and its wastewater counterpart had been hit by "ransomware," a type of malware that encrypts victims' computer files and demands online payment to unlock them.While operations weren't harmed, the infection prompted the water district to switch out its information technology service provider and call in the FBI. The case, first reported by the Coloradoan, remains under active investigation. FCLWD and the South Fort Collins Sanitation District treat and distribute water to 45,000 customers in northern Colorado.Colorado water officials aren't alone in their cybersecurity woes. The nation's nearly 70,000 water and wastewater utilities are struggling to keep their heads above a rising tide of online threats, based on interviews with security experts ... Read More
February 7, 2025Mark Anthony Germanos
Social engineering led to potential kidnapping
Social engineering and impersonation attacks can lead to far more dangerous consequences than monetary losses, according to Matt Devost from OODA LLC. Devost appeared on the CyberWire’s Hacking Humans Podcast last week, where he described the attacks he’s seen involving cybercriminals with fraudulent personas.
Devost described one case in which an attacker impersonated a broker and an investor to target a successful entrepreneur who was looking for funding for a new startup. Under the guise of the broker, the attacker introduced the target to the supposed investor. Now posing as the investor, the attacker conversed with the target about the company, and eventually asked the entrepreneur to fly to South America so they could meet.
“That individual is very, very close to ... Read More
February 7, 2025Mark Anthony Germanos
Malicious links on otherwise honest web pages
Webroot revealed the results of their 2019 Threat Report, showing that tried-and-true attack methods are still going strong, but new threats emerge daily, and cybercrime is highly innovative. This includes adding malicious URLs (web page addresses) as links on legitimate sites.
Hal Lonas, Webroot's CTO said: “We wax poetic about innovation in the cybersecurity field, but you only have to take one look at the stats in this year’s report to know that the true innovators are the cybercriminals. They continue to find new ways to combine attack methods or compromise new and existing vectors for maximum results. My call to businesses today is to be aware, assess your risk, create a layered approach that protects multiple threat vectors and, ... Read More
February 7, 2025Mark Anthony Germanos
Oprah to interview AI greats on September 12
Oprah Winfrey will be discussing Artificial Intelligence with Bill Gates and Sam Altman later this month. AI and the Future of Us airs on ABC on September 12, 2024, at 8 p.m. ET. See Oprah Interview for more. In case you’re wondering, they will explore AI’s impact on our lives. If you were writing Oprah’s questions, what would you ask?
Need some prompts?
Here are the questions perplexity suggested. These began at a 6th-grade reading level before I polished them:
How do you think robots and computers will change our everyday lives in the next 10 years?
What are some big problems that companies developing AI face, and how are they fixing them?
Can you tell us about a time when ... Read More
February 7, 2025Mark Anthony Germanos
Robocall scams more prolific than ever
Robocall spam has surged to 12 billion calls per month globally. Bank account, credit card and extortion are common scams, according to Hiya, a company that makes apps to fend off unwanted calls.
According to Hiya's first Global Robocall Radar Report, global spam calls grew 325 percent from a year ago to 85 billion. Hiya's estimate is based on an analysis of 12 billion calls per month globally.
UK, Spain, Italy, France and Argentina were the countries with the most robocalls. Like spam, robocalls have proliferated because scammers get just enough victims to rake in profits. The Federal Communications Commission and Federal Trade Commission have been looking at ways to curb robocalls, which are one of the top consumer complaints in the U.S.
The ... Read More
February 7, 2025Mark Anthony Germanos
Cyber attacks are dirt cheap
Deloitte says the cost of committing a cyber attack is so surprisingly low that anyone can afford to be a bad guy. When you picture a cybercriminal organization today, you should be thinking about a group of individuals who run their operations like a business; concerned with profit and loss, looking for ways to execute as inexpensively as possible, while yielding the largest return. But what you don’t necessarily need to have in that vision is an organization with a large cash reserve.
According to Deloitte’s newest report, Black-market ecosystem: Estimating the cost of “Pwnership”, the cost of running a campaign is so low, it’s downright reasonable as a business model for even the smallest cybercriminal business.
Some cyber attack examples from the report ... Read More
February 7, 2025Mark Anthony Germanos