CryptoLocker look-alike searches for and encrypts PC game files

Crypto-based “ransomware” has become a lucrative business for cybercriminals. Since the arrival of CryptoLocker on the scene last year, a number of copycat malware packages have appeared to compete in the cyber-extortion market, encrypting victims’ photos and other personal files with a key that will be destroyed if they don’t contact the malware’s operators and pay up. Recently, a new variant has emerged that seeks to raise the stakes with a particular class of victim by specifically seeking out files related to a number of popular PC games, as well as Valve’s Steam gaming platform. The malware, which is a variant of the crypt-ransomware called TeslaCrypt, superficially looks like CryptoLocker. But according to a number of security researchers who have analyzed the malware, it shares little code with CryptoLocker or its more well-known successor CryptoWall. And while it will also will target photos and documents, as well as iTunes-related files, as Bromium security researcher Vadim Kotov noted in an analysis on Bromium Labs’ blog , TeslaCrypt also includes code that specifically looks for files related to more than 40 specific PC games, gaming platforms, and game developer tools. The games include both single player and multiplayer games, though it isn’t clear how targeting some of the multiplayer games would affect users other than requiring a re-install. The games targeted include a mix of older and newer titles— for example, Blizzard’s StarCraft II and WarCraft III real-time strategy games and its World of Warcraft online game are targeted. Also on TeslaCrypt’s hit list: Bioshock 2, Call of Duty, DayZ, Diablo, Fallout 3, League of Legends, F.E.A.R, S.T.A.L.K.E.R, Minecraft, Metro 2033, Half-Life 2, Dragon Age: Origins, Resident Evil 4, World of Tanks, Metin 2, and The Elder Scrolls (specifically, Skyrim-related files), as well as Star Wars: The Knights Of The Old Republic. There’s also code that searches for files associated with games from specific companies that affect a wide range of titles, including a variety of games from EA Sports, Valve, and Bethesda, and Valve’s Steam gaming platform. And the game development tools RPG Maker, Unity3D and Unreal Engine are targeted as well. Read 4 remaining paragraphs | Comments

See the original article here:
CryptoLocker look-alike searches for and encrypts PC game files

Internet providers ordered to stop hiding the true size of monthly bills

New rules for home Internet providers and wireless carriers require them to be truthful about how much their service actually costs. As part of the transparency requirements in the Federal Communications Commission’s net neutrality order , Internet providers have to clearly detail all charges, such as modem rental and installation fees, and disclose the full monthly price that will go into effect after any promotional pricing expires. The new disclosure rule is more specific than a previous one, the FCC said. Read 7 remaining paragraphs | Comments

Read More:
Internet providers ordered to stop hiding the true size of monthly bills

The Ambassador who worked from Nairobi bathroom to avoid State Dept. IT

The current scandal roiling over the use of a private e-mail server by former Secretary of State Hillary Clinton is just the latest in a series of scandals surrounding government e-mails. And it’s not the first public airing of problems with the State Department’s IT operations—and executives’ efforts to bypass or work around them. At least she didn’t set up an office in a restroom just to bypass State Department network restrictions and do everything over Gmail. However, another Obama administration appointee—the former ambassador to Kenya—did do that, essentially refusing to use any of the Nairobi embassy’s internal IT. He worked out of a bathroom because it was the only place in the embassy where he could use an unsecured network and his personal computer, using Gmail to conduct official business. And he did all this during a time when Chinese hackers were penetrating the personal Gmail inboxes of a number of US diplomats. Why would such high-profile members of the administration’s foreign policy team so flagrantly bypass federal and agency regulations to use their own personal e-mail to conduct business? Was it that they had something they wanted to keep out of State’s servers and away from Congressional oversight? Was it that State’s IT was so bad that they needed to take matters into their own hands? Or was it because the department’s IT staff wasn’t responsive enough to what they saw as their personal needs, and they decided to show just how take-charge they were by ignoring all those stuffy policies? Read 19 remaining paragraphs | Comments

Visit link:
The Ambassador who worked from Nairobi bathroom to avoid State Dept. IT

Apple becomes part of the Dow Jones Industrial Average, AT&T gets the boot

Dow Jones has issued a press release this morning announcing that as of March 19, there will be a change to the list of companies that make up the Dow Jones Industrial Average: AT&T is out, and Apple is in. According to the press release, the change is due in part to Visa’s upcoming 4:1 stock split, which will effectively lower Visa’s stock price and its effect on the index. To balance this reduction in Visa’s price—which the press release says can have “a material impact on sector representation”—Apple is being added to the index. The DJIA membership is fixed at thirty stocks , and so in order to add a company to it, one must be removed. The Dow has chosen to drop AT&T, leaving telecommunications to be represented on the index by AT&T’s rival Verizon—which, the release explains, is very similar to AT&T but has a higher market capitalization. The last time any membership changes were made to the DJIA was in September 2013, when Goldman Sachs, Nike, and Visa were added. AT&T has been a member of the DJIA since November 1999. Read 2 remaining paragraphs | Comments

Follow this link:
Apple becomes part of the Dow Jones Industrial Average, AT&T gets the boot

Enormous Martian ocean evaporated into space

NASA scientists have published details of a huge ocean that once covered half of Mars’ northern hemisphere but was lost to space over millennia. Writing in the journal Science, the astronomers explained how they used the ratio of two different kinds of water to estimate how wet the red planet was 4.5 billion years ago. “Early Mars (4.5 billion years ago) had a global equivalent water layer at least 137 meters deep,” they say. Martian water molecules are just like those on Earth—they’re made of one oxygen and two hydrogen atoms. But there are two kinds of hydrogen—the normal type, and one that’s a little heavier, called deuterium. Read 9 remaining paragraphs | Comments

View original post here:
Enormous Martian ocean evaporated into space

Office for Mac 2016 hands-on: A vital upgrade, with some kinks to work out

The starting point when you open the new Word for Mac looks a lot more like the Windows version than it used to. 14 more images in gallery Office for Mac has often played second fiddle to the flagship Windows version that powers Microsoft’s productivity software empire, but it’s important for plenty of computer users nonetheless. It’s thus good to see Microsoft nearly finished with a long-awaited update that brings the OS X and Windows versions of Office closer together in style, while adding integrations with Microsoft’s OneDrive cloud storage. A preview version of Office for Mac 2016 was released today , and there’s enough to give Mac users reason to look forward to the final bits and reminders of bugginess that can afflict Microsoft software for the Mac. The preview for OS X Yosemite is free to download and use  until its official release in the second half of 2015. It includes Word, Excel, PowerPoint, Outlook, and OneNote. We’ve already covered the Outlook and OneNote  redesigns, so we’ll just focus on Word, Excel, and PowerPoint in this brief hands-on. Read 4 remaining paragraphs | Comments

Read More:
Office for Mac 2016 hands-on: A vital upgrade, with some kinks to work out

New Error Correction Take Us a Step Closer to Quantum Computing

Quantum computing could make complex calculations trivial in the future, but right now it’s fraught with problems . Consider one of them solved, though, in the shape of a new quantum error correction technique. Read more…

Excerpt from:
New Error Correction Take Us a Step Closer to Quantum Computing

Tech support scammer threatened to kill man when scam call backfired

Tech support scammers should probably just hang up the phone when a scam call goes wrong. But one scammer took things to a new level by threatening to kill a man who pointed out that the scammer was trying to steal money. As we’ve reported numerous times , scammers pretending to work for Microsoft tech support call potential victims, tell them their computers are infected, convince them to provide remote access, and then charge them hundreds of dollars to fix imaginary problems. Read 6 remaining paragraphs | Comments

View the original here:
Tech support scammer threatened to kill man when scam call backfired

Nvidia Announces The Shield Set-Top Box

 At a post-GDC keynote at the Nob Hill Masonic Center, Nvidia co-founder and CEO Jen-Hsun Huang just took to the stage for a series of big announcements. The video processing technology company today unveiled its plan to further its push into user hardware with a new device aimed at the Apple TV and Roku, which it’s calling the Shield. The new game console isn’t too far of a… Read More

More:
Nvidia Announces The Shield Set-Top Box