All posts by admin

Samsung Pay launches in China and Singapore



SINGAPORE — Samsung has announced a spate of mobile payments services in Asia, with the most fanfare given to its tap-to-pay Samsung Pay service opening in China

At the same time, Singaporeans will get a more limited — but certainly crucial part of the mobile payment picture — deployment, allowing them to tap and pay in buses and subway trains here.

Samsung’s announcement is China is huge. It’s about a month-and-a-half later than arch rival, Apple, in the world’s largest smartphone market, and will allow users to pay at checkout counters that support China UnionPay, the country’s interbank network, that has a reported 5 million contactless point-of-sale terminals in China. Read more…

More about Unionpay, Ez Link, Mobile Payments, China, and Singapore


President Obama’s A-List Acquaintances

Over the years, President Barack Obama has built relationships with some of Hollywood’s biggest names. The commander in cheif is known to be close with Beyoncé and Jay Z – who says he texts with the POTUS – and at different events and rallies, Obama has joked around with everyone from David Beckham and Katy Perry to Prince William and Kate Middleton. Even before he became president, Obama counted Oprah Winfrey and Robert DeNiro among his acquaintances as they supported his campaign, and with his visits to The Tonight Show and interviews with Ellen DeGeneres, he’s become something of a celebrity himself. Keep reading for a look at some of Barack Obama’s best snaps with stars!


Arielle Kebbel Ashanti Ashlee Simpson Ashley Greene Ashley Olsen Ashley Scott


Next wave of ransomware could demand $millions



In February, Hollywood Presbyterian Medical Center (HPMC) was the victim of a ransomware attack that disabled access to its network, email, and patient data. The hospital was crippled. The Radiation Oncology department was shut down, CT scans and lab work were unavailable. What communication there was relied on fax machines, handwritten forms, and notes. Impacted patients were transferred to other facilities or simply turned away. After 10 days of this, the hospital surrendered and paid the required ransom to get its systems back up and running.

This kind of acquiescence is the norm in ransomware attacks where recovery is difficult or impossible. What makes the HPMC incident interesting is the head-turning size of the ransom demand as originally misreported — $ 3.6 million — and the very reasonable discussions that followed about why it actually was not a crazy amount to pay. The price of poker is going up.

Ransomware demands have usually been nuisance costs. While the aggregate payments are reportedly in the tens or even hundreds of millions, the formula for attackers has been high-volume, low-dollar crimes. The Economist reported in early 2015 that the demand prices were actually going down, since attackers had “found the sweet spot where their victims simply pay up” was in the hundreds of US dollars.

The attackers at HPMC must have a different GPS, because their sweet spot was about 30 times as large, with the hospital paying about $ 17,000 to get its systems back online. But then again, they’re charting new territory. There may be an average price to recover some files or a system, but what does it cost when an entire hospital is incapacitated?

To figure this out, I looked around for public information that would help me get a handle on the losses that HPMC was incurring while the ransomware attack was active. Published reports indicated that, among other hospital services, CT scanning was impacted. According to a 2014 California Department of Health Care Services report, the HPMC CT scanning charges had been in excess of $ 41 million a year. If we divide that by the maximum 365 days of use, the disruption of CT scans alone would account for losses of over $ 100,000 per day. If I’ve done this right, the loss of revenue from a 10-day hiatus of that one service alone was at least $ 1 million. That doesn’t account for the other ongoing losses for a hospital that (according to the same report) brings in over $ 2 million per day.

Considering the losses incurred by having the hospital’s services disrupted, $ 17,000 starts to look like a bargain.

Prices could rise

When HPMC was attacked, it joined a diverse group of ransomware victims, from police departments to businesses, schools, law firms, and other hospitals. The prevalence of these attacks underscores how big of a business ransomware has become, yet until recently the business model focused on keeping price points low. Low costs have made it easy for businesses to decide to simply pay the ransom, advice that even the FBI has offered.

This is very likely to change because the criminals will realize that the same ransomware that brings them many small-dollar bitcoin paydays can also be used against larger firms that can afford much larger payoffs. Ransoms in the five, six, and seven figures represent a significant departure from standard operating procedure, and they will make the decision about whether to pay up much more difficult.

If this happens, it is likely that attackers will make painful examples of organizations that cannot or will not pay to demonstrate the seriousness of their demands. Had the ransom at HPMC been the reported $ 3.6 million, and had the hospital been unable or unwilling to pay it, the recovery would likely have been painful, public, and costly.

Smarter defense and recovering

The rise of ransomware is the result of two factors: 1) More criminals are finding it a lucrative new way to monetize attacks; and 2) There is a growing set of ransomware tools, kits, and services that make attacks simpler and more devastating. Stopping the evolution in tools is unlikely. That means we need to reduce the attractiveness of this crime by blunting ransomware success rates and decreasing their profitability. There are three ways to so this:

1. More intelligent recovery. When a ransomware attack happens, organizations first look to their backups to see if they can simply reload the machines and recover using their own sources. From the frequency and volume of ransoms paid, this is a primary area where organizations should apply some effort. Backup and recovery design should focus on the type of data that is stored on the various systems and should consider that these attacks can do more than scramble content. Ransomware can also be used to paralyze applications and functionality, so the recovery strategy needs to include reconstitution of any critical services.

2. Evaluating connections and sharing. Ransomware arrives through user interactions on their own systems. It is an uncommon user system that can bring a large organization to its knees, but advanced ransomware knows how to spread. Ransomware that can install itself on network drives or that looks for shared objects spreads quickly. It is more likely to infect multiple systems and meaningfully impact the operation of the business. Compartmentalization and access control are foundational concepts in security, but they need to be revitalized to mitigate the spread of these infections. Organizations should revisit the amount of sharing that they do, the permissions that users have to shared assets, and the monitoring that is done of those shared drives and objects.

3. Improved user and system protections

The best way to defend against the impact of ransomware is to keep it out of the organization entirely. Given the prevalence of users as the channel through which ransomware enters organizations, these users and their systems need to be strengthened. Attackers have become skilled in making their emails appear legitimate, and there has been real innovation in the techniques they’re using to get the ransomware past existing system defenses. Users need to be re-energized and reeducated to avoid activating the ransomware, and their systems need new protections that can stop infection when they make mistakes.

Avoiding Ransomworld

Given the ease of attack, the availability of tools, and the anonymous nature of the payoffs, it could be natural to view ransomware as an ongoing and rapidly multiplying tax on our interconnected lives. Unlike other threats, though, the opportunity to slow or stop its progression is not dependent on closing all the holes or arresting all the criminals.

Instead, we need to focus on doing three things:

  • making it less likely that the attacks will succeed by increasing our defenses and precautions
  • making it much more expensive for criminals to develop the tools that will break through our defenses
  • making it less expensive to repair the damage than to pay the ransom when infection does happen.

With the profit motive weakened or eliminated, the criminals will move on, and we can get back to worrying about the usual challenges of insider threats, external attackers, and nation-state sponsored attacks. The good old days.

Jack Danahy is cofounder and CTO of endpoint security company Barkly. A 25-year-veteran in the security industry, he was the founder and CEO of two successful security companies: Qiave Technologies, acquired by Watchguard Technologies in 2000, and Ounce Labs, acquired by IBM in 2009.

Get more stories like this:  twitter  facebook



IDG Contributor Network: Hive — another attempt to resolve the email conundrum


Apple Music for Android now has a widget, which leaves iOS users wanting

Apple Music for Android now has a widget, leaving iOS users swooning. It’s a simple addition; all you can do is control the playback. But the ability to pause, play and skip tracks without actually entering the app is a very Android feature. If you’re interested, here’s the full changelog: Add songs from the Apple Music catalog to playlists without having to add it to your library Redeem gift cards in Settings to renew your membership using iTunes credit See what’s playing on Beats 1 directly from the Radio tab — without having to tune in Tap the name of…

This story continues at The Next Web

All articles

CIOs Are Prioritizing Big Data Analytics, Cloud Computing And Security In 2016/2017 Budget Cycles

CIOs expect cloud consumption (private/public/hybrid) to rise from 31% consumption in 2014 to 58% in 2018. Public cloud adoption in predicted to attain the fastest growth rate, rising from 8% of consumption in 2014 to 19% in 2018. SaaS deployments are expected to increase from 33% of applications deployments today to 56% of deployments over the next five SaaS subscription spend is expected to be 15% greater than prior application software maintenance spend. Senior IT leaders predict that the percentage of IT consumption on their internal infrastructure will fall from 67% to 42% from 2104 to 2018 as cloud adoption accelerates.