The Craziest Virus Ever

0705_imela_5

Let us face it cyber boys and girls, most of the so-called visionariness and IT entrepreneurs out-of-this-world, you admire discreetly,  would bored you to death in less than five minutes. Can you imagine Steve Jobs with a beer in his hand, or Bill Gates smoking marijuana on a presentation?

Our point is simple. These, and so many other more or less known cyber guys have shaped and reshaped our world. Nevertheless, despite their contributions, we are not going to make a movie about them. We have tried that with Steve Jobs, and we know how that one ended up in flames or criticism and poor box office results.

On the other hand, we have John McAfee, who can nowadays probably earn more from selling his story to the Hollywood, than selling his antivirus solutions. It would be ridiculous to even try describing his turbulent life in one post. Right?

He was high on the ladders of business success, and also high on you know what, when he helped us to fight back some of the notorious viruses during the 1980s and 1990s. He should definitely write a book, or help some Hollywood producer make a movie about his life. Oh boy, that would have been something.

The Living Room Pirates

0705_imela_4

It is nice thing to fight piracy from the Hollywood’s perspective. However, there is this question, we need to ask. Can you exaggerate a little bit, from time to time? We dare to say, this is exactly what has happened in the UK cyber and law field. Have you heard about their piracy laws?

The UK lawmakers have adopted one of the most rigorous no-copy policies in the entire cyber history and world. Even if you are the rightful owner of a certain video or music CD or similar, you cannot make a copy for yourself. Under any circumstances. Seriously?

Not so long ago, this strange law, at least to say, had a reasonable limitation. You can get yourself in trouble, if you make copies in order to share them with your friends, or earn money by doing so. This make sense, but what is with this no-copy zero tolerance?

How they are going to prove that the UK users have done something wrong, in the first place? They are going to chase or spy people in their living or bedrooms? It just does not make any sense. So, what should we do? Leave your CDs at home when you are planning to travel to London. Right?

Hacking MS Team

0705_imela_3

What is your very fist impression, when you hear a name for a group – the Hacking Team? Probably, not such a positive one. Right? Who is to blame us, for our cyber prejudices? However, in this particular case, the busy little bees in the Hacking Team helped both Microsoft and us, a lot.

The Hacking Team has identified a security bug associated with the specific font’s driver. On the other side, grandpa Microsoft has delivered a security update, silently and efficiently. This is how it is supposed to be done. I tell you that something is wrong or broken. You fix it.

The end of potentially dangerous cyber story. As simple and as complicated as that. We have to say that we area dying to hear, what grandpa Microsoft sent to the Hacking Team as a sign of its gratitude. This is something we would like to hear and share with you.

It seems that every time your hear words, such as hacking or a hacker, this does not necessarily mean that something bad is going to happen. Just ask grandpa Microsoft, we are quite sure, it has so much to tell you about it. Good job, Hacking Team!

Samsung Pay Doesn’t Like The Rooted Play

wpid-wp-1426031398096.jpeg

Samsung Pay was introduced almost hand-in-hand with its latest flagships Galaxy S6 and Galaxy S6 Edge. However, the latest announcement has it that Samsung is not going to allow you to use this mobile payment service, if you are planning to run it on the so-called rooted devices.

Why? Is that a fair thing to do? Well, from the Samsung’s point of view, it certainly is. If you want to succeed in the cyber world, you just have to follow the money flow, as simple and as complicated as that. All eyes, ears, and especially fingers are on the mobile money.

Apple Pay is already fully operational. Google wants to improve its Wallet service even further. And, the list goes on and on. Every major IT players nowadays has its own mobile payment service. It is not a matter of prestige, but the basic business survival, under the new circumstances.

That is why, Samsung simply cannot afford itself a luxury of compromising its golden goose called Samsung Pay. What you are going to do with your rooted phone is your own thing, but you can forget about payment operations with it. Fair or not fair, Samsung has made up its mind in this situation.

Why Does My Email Heart Feel So Bad?

wpid-wp-1432409199574.jpg

The busy little bees in Symantec have some good news for all of us. It turns out that the number of spam has reached its critical minimal point in the last ten years. This can mean only one thing. The web and email service providers are doing their homework properly.

Or, we can put it in this way. One in two emails is a spam. According to Symantec this is great. Actually, this is the best thing, which happened in this field, during the last cyber decade. Are we supposed to be happy or relieved about it? Symantec has a nice reminder.

Not so long ago, three out of four emails you are supposed to get were with a spam purpose. Yes, this is a great change. No, we are not supposed to be thrilled about it. Is there something we can do to decrease spams to a harmless level of a statistical error?

If you are happy with the current situation, they you are not very likely to change it. Right? This is a moral we strongly recommend for this story. Otherwise, the spam-masters can say, great news, business will be as usual, for us.

Million Miles Away From Hacker’s Home

wpid-wp-1413765967231.jpeg

When there is a will, there has to be a way of improving our extremely compromised cyber security. Even if you do not have or do not want to pay money for cyber security services, you can always compensate. Just ask United Airlines, because they certainly have a lot to tell you all about it.

For what is worth, the busy little bees in the United Airlines have launched a genuine bug bounty program. So, what is so special about it? Well, if you knock them off their feet, your reward is not going to be a financial one. Surprised?

How about a one million miles of free flights reward, for a change? The United Airlines has decided that it is worth of every mile. What for? Well, thanks to the cyber bug bounty hunters, their website is bulletproof, when it comes to potential hacker’s attacks.

That is not all. One of the biggest worries for every airline company is a serious threat of a cyber hijack of a plane. In this worst case scenario, no price is too high to pay for a proper safety measure. Our hats off to this brilliant move. We should follow United Airlines’ example.

Who Will Guard The Guardians?

wpid-wp-1415098377104.jpeg

One National Guard member has exposed sensitive and private data of more than 850,000 of his fellows. How could this be? This is how, we have ended up in a vicious circle of game to blame. Really, who is to blame? The system or an individual, who has wrongfully used it?

Well, if the system works flawlessly with all of its security features, then there is nothing to worry about the potential misuse. However, if there is a flaw, then someone will take an advantage of it, sooner or later, this way or another. So, we have to blame the system. Right?

Maybe, the basic presumption that our own staff cannot do anything wrong is to be blamed. We are focused all the time to the threats coming from outside that we have completely forgotten about the cyber hazards working from inside. Which brings us back to our question.

Who and how will guard our cyber guardians? There should not be exceptions from our safety procedures and standards. On the contrary, we should apply special and additional standards for our guardians, because they are in a favorable position of taking an advantage over the system. Right?

The Call of The Dark Cyber Side

wpid-wp-1423350122242.jpeg

The most recent scandal in the IT security community has raised quite a few eyebrows, while making us to examine one more time the unsustainable claim that hacking can sometimes be an ethical thing to do. So, what happened actually, and why it is so important for us?

It turns out that one young and promising IT security consultant had an “intriguing” hobby and a part time job. The “hero” of our story was creating malicious software solutions. In addition, he was selling them online. You can imagine the surprise of his colleagues at work.

To make the situation even more interesting and even funnier, this consultant was working on his own “case”. During his regular working hours, he was solving problems he created the nights before. This modern time Dr. Jekyll and Mr. Hyde did not have a happy ending.

It is hard to say what is the proper moral of this unusual story. It seems that the call of the dark-cyber-side can be quite a strong one. This does not necessarily mean that we should play spy games with our friends and colleagues. However, we should be aware of the true power of the dark cyber side.

Deadly Cyber Games

wpid-wp-1421541961907.jpeg

One South Korean intelligence officer committed a suicide as a result of the unprecedented cyber spy scandal, which has deeply disturbed this country. It turns out that South Korea was importing some software “solutions” from Italy, which are supposed to be used against the North Korea.

With all due respect, the North Korean IT infrastructure is rather a modest one. Therefore, you really do not have to bother yourself with the state of the art spy technology in this field. In addition, someone among South Korean intelligence officers has figured out that this thing can be used in the home field.

This is how, we have ended up with one of the biggest cyber scandals in the recent South Korean IT history. Someone has been spying on his or her own fellow citizens. The pressure was so strong that one man took his own life, rather than to be a part of this scandal.

So, what is the moral of this sad story? One thing obviously comes without saying. Cyber actions derived from the virtual world can have the serious real life consequences. You just cannot play with other people’s privacy with no consequences, this way or another. RIP you poor man.

iPhone 6 vs AK-74

0703_imela_7

How many iPhones you need to stop a bullet fired from an AK-74? Well, according to the crazy and creative guys from a YouTube channel, who enjoy themselves in destroying the top smartphones, you need at least five models. If you have a soft heart for smartphones, then you should not read this post.

Believe it or not, these guys put a dozen iPhones in a line. Then, with no mercy at all, they shot through them with an AK-74. The fifth smartphone was able to stop the bullet. So, what’s is the moral of this merciless and heartless experiment? If you are going to a dangerous zone, make sure you have five iPhones with you.

Or maybe, there is one more not so obvious moral discretely attached to this story. We’re so in love with our smartphones that we tend to assign them all kinds of super-powers and special features. In most of the cases, we are easily caught in the endless loop of exaggerations.

We sure hope that these heartless brainiacs have had more than enough of fun. We don’t need any more of these heartbreaking “experiments”, do we? Who knows what more can cross their “creative” minds? Please, don’t suggest them anything crazy and painful for our dear cyber-pets. Please.