Computer program that modifies other programs to replicate itself and spread
POPULARITY
Our Toy Show , A Mouse In The Car , Out Out , The Computer Virus , Marrying Your Cousins , Santa Letters , Most Googled Words , The Sycamore Tree , A Very Generous Taylor Swift , Haircuts , New Phrases , Worst Joke Wednesday and more ...
The recently released "2024 Cybersecurity Almanac" has a section on historic viruses including the 'Brain virus,' which found its way onto at least 100,000 floppy disks, sometimes with data-destroying impact. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com
In this episode, we delve into the recent CrowdStrike software update issue that caused a global shutdown and widespread "blue screen of death" incidents. We'll explore the difference between this software glitch and a computer hack or virus, and examine the extensive impact on businesses, hospitals, and organizations worldwide. Special guest George Rosenthal will share his insight.
Kerry speaks with computer scientist Dr. Jen Golbeck about all things data. She expounds on ways to secure your digital presence in an ever-online world, to ways society may react if digital infrastructures were eliminated in the blink of an eye. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Rich Zeoli Show- Hour 2: 4:05pm- The Wall Street Journal's Corinne Ramey and Erin Mulvaney write of Stormy Daniels's Thursday testimony in the Donald Trump “hush money” trial: “[Trump's attorney Susan] Necheles also pointed jurors to Daniels's work as a medium and self-described paranormal investigator. Daniels has said that while living in a New Orleans house that she thought to be haunted, spirits attacked her boyfriend and held him underwater. Daniels told jurors that some indications of paranormal activity at the house were later attributed to a giant opossum.” You can read the full article here: https://www.wsj.com/us-news/stormy-daniels-testimony-hush-money-trial-7edc4ed5?mod=hp_lead_pos4 4:25pm- Rich foolishly clicks a link on Stormy Daniels's social media page—his computer probably has a virus now… 4:35pm- Dr. Victoria Coates—Former Deputy National Security Advisor & the Vice President of the Davis Institute for National Security and Foreign Policy at The Heritage Foundation—joins The Rich Zeoli Show to discuss President Joe Biden withholding Congressionally appropriated military assistance to Israel. In response, Congressman Cory Mills (R-FL) introduced articles of impeachment in the House of Representatives on Friday—citing an “abuse of power.” Dr. Coates is the author of “David's Sling: A History of Democracy in Ten Works of Art.” You can find her book here: https://www.amazon.com/Davids-Sling-History-Democracy-Works/dp/1594037213. 4:55pm- Rich reads hilarious social media messages but runs out of time for the segment.
Let's hack cybersecurity in 2024 with Melanie Rieback, Co-founder & CEO of Radically Open Security, the world's first not-for-profit cybersecurity consultancy with a focus on PenTesting
#JoinTheTalk as Bailey and Ty dive into the paranoia and history of one of the 20th centuries most infamous looming threats; the Y2K bug!From the dawn of the computer age to the dreaded moment the clock struck midnight on December 31st 1999 and the aftermath that followed #QuestionEverything around threatening computer bug that looked to collapse our world as we knew it. Explore the collection of dozens of books written to warn of the Y2K bug:https://www.computersincrisis.com/infoY2K the Movie (1999):https://youtu.be/PETzibC-PNU?si=Q9jGBwZNJdIiQ9P_Support the showMake sure to follow @CultTalkNet on Instagram, Twitter, Facebook, and YouTube for more Groovy content!Check out Cult of Campbell every other Monday for a groovy dose of Bruce Campbell!#QuestionEverything every other Tuesday with Cult Talks: Conspiracy! where we dive deep into the dark corners of the fringe. Explore the vast worlds of Fantasy and Sci-Fi with our long-form exploration podcast, Cult of Lore! You can find FULL videos of Cult of Lore as well at youtube.com/CultTalkNet.#JoinTheTalk
In his book, Recovery Mind Training Dr. Paul Earley cites the statistic that addiction is a devastating brain disease affecting over 23 million individuals including their loved ones in the U.S. alone. He says that the single biggest driver around addiction is genetics and that there is a strong genetic link with addiction in families. Dr. Earley describes how powerful and insidious the Addict Brain is as it hijacks our brains without us being aware. The Addict Brain is like a computer virus running autonomously in the background virtually undetectable overwhelming an individual's conscious control by reorganizing life goals and ensuring its survival. Once the addict recognizes this and begins to realize the Addict Brain's power as negative consequences occur, it is possible to implement new skills and recovery practices and place the addiction in remission. In his Recovery Mind Training method of recovery, he employs six domains including addiction containment, basic recovery skills, and emotional awareness and resilience. The RMT method helps unwind and repair damages to the individual as well as his or her family and social network caused by the Addict Brain. Dr. Earley recommends recovering addicts develop a set of skills and life responses to handle life situations blocking the primitive drive to use the addictive substance. He integrates a 12-step recovery program as part of his model and says when we recover and our behaviors are in alignment with our morals and values we find the feeling of freedom, joy, peace and serenity. He cites the strong connection between successful sustained recovery and those individuals developing a spiritual side. What an outstanding podcast episode as we host Dr. Paul Earley outlining the problem...and the solution! Amazon Link to Recovery Mind Training: https://www.amazon.com/s?k=Recovery+mind+training&i=stripbooks&crid=2FV9H3E4BREK6&sprefix=recovery+mind+training%2Cstripbooks%2C97&ref=nb_sb_noss_1
On this episode we talk about the First Computer Virus, a little fella called Creeper that just creeped from one computer to another on a network in 1971... Plus, we discuss other viruses, virus protection, memetic/viral ideas, and AI... perhaps the ultimate self-driven, self-propagating program that's gonna do more than just creep. Then we dig into the Mouthgarf Report, play some more I See What You Did There, and laugh nervously as we're knowingly observed by our data-collecting overlords-to-be.Have a comment? Maybe you want to be a guest on the show? Email us at debutbuddies@gmail.comListen to Kelly and Chelsea's awesome horror movie podcast, Never Show the Monster.Get some sci-fi from Spaceboy Books.Get down with Michael J. O'Connor's music!Next time: First Festivus / Kelly's First Seinfeld
Download the Volley.FM app for more short daily shows!
In dieser besonderen Folge mit der Zahl 42, haben wir euch einige Fun Facts aus der Welt der IT mitgebracht. Taucht ein in eine neue Episode voller skurriler Fakten und Geschichten! Wir stolpern in unserer Podcast-Episode über einen Teekessel und erfahren, warum er einen "418 Status Code" hat. Wir kramen in den Tiefen des WWW, um die allererste Website auszugraben. Spoiler: Sie war nicht besonders glamourös! Und wolltet ihr schon immer wissen, warum Google "Google" heißt? Dodo auch! Wir drehen mit euch die Zeit zurück und gehen auf eine Zeitreise in die Anfänge der digitalen Welt. Wir fragen uns, was das allererste YouTube-Video war. Wir finden heraus, wie der erste Computer-Virus hieß, wie viel Prozent der täglichen E-Mails in den USA Spam sind und was die Bezeichnung für eine weibliche Hackerin ist. Ausserdem verraten wir euch, wonach die Programmiersprache Python benannt ist. Überraschung: Es ist nicht die Schlange. Zum Schluss haben wir noch ein paar nützliche Git-Befehle für euch, die Ellen und Dodo davor auch noch nicht kannten. Mehr zum Staunen und Schmunzeln in dieser kurzweiligen Episode. Hört rein! #Podcast #Schmunzeln #Fakten #Teekessel Links: https://de.wikipedia.org/wiki/Haeckse https://medium.com/@kumar111aakash.in/the-hilarious-chronicles-of-programming-languages-from-weird-beginnings-to-global-dominance-257acb17f2dc https://libraryofbabel.info/ https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/ https://en.wikipedia.org/wiki/GitHub#Mascot https://de.wikipedia.org/wiki/Christine_Darden https://www.elektronikpraxis.de/1956-die-erste-festplatte-kommt-auf-den-markt-a-5fc05f333c1990287d3f713272eb2439/ https://economictimes.indiatimes.com/tech/internet/world-wide-web-here-are-some-early-facts/deep-dark-web/slideshow/65278302.cms https://www.upwithtech.com/post/15-fun-facts-about-technology https://youtu.be/jNQXAC9IVRw?si=iQtlkVgyB8GWhA1H https://de.wikipedia.org/wiki/Bernd_Fix https://www.forbes.com/sites/bernardmarr/2018/05/21/how-much-data-do-we-create-every-day-the-mind-blowing-stats-everyone-should-read/ https://www.bbc.com/news/technology-20439301 https://www.computercpr.com/computer-facts/ https://www.demandsage.com/how-many-emails-are-sent-per-day https://www.nachhaltiger-warenkorb.de/klimabilanz-e-mail-vs-brief
Ah-CHOO! We know viruses make us sick, but what happens when a virus infects your computer? This episode, go digital with Molly and co-host Chloe as they track down a pesky computer virus infecting Brains On Headquarters. Catch our special guests, podcasting viruses Kara and Gilly, and meet a mysterious hacker named Shark Manchez. Plus, a brand new mystery sound!This episode is sponsored by:Indeed (Indeed.com/BRAINS) - Claim your $75 sponsored job credit to upgrade your job post. Terms and conditions apply.Factor (Factormeals.com/brainson50) to get 50% off.IXL (IXL.COM/FIELDTRIP) to get a 20% off an IXL membership.Greenlight (Greenlight.com) The banking and investing app for kids and teens.
As cyberspace grows, cyber crimes have also increased in number and variety. In this episode of Police Chowki, Shrikrishna Upadhyaya quizzes Javeed Ahmad (ex-IPS & ex-DGP of Uttar Pradesh) and Dr. Aravind Chaturvedi (IPS & SP, Vigilance, Uttar Pradesh) on how to classify cyber crimes, aspects of cyber security, how should individuals and organisations protect themselves in the cyber world, and the police organisational structure and investigative methods in solving cyber crime. They also reflect on how cyber crimes are not merely a law & order matters, but a reflection of more significant socioeconomic reasons, in the context of the emergence of cybercrime hubs like Jamtara, Alwar, Nuh, and others. Do follow IVM Podcasts on social media. We are @IVMPodcasts on Facebook, Twitter, & Instagram. https://twitter.com/IVMPodcasts https://www.instagram.com/ivmpodcasts/?hl=en https://www.facebook.com/ivmpodcasts/ You can check out our website at https://shows.ivmpodcasts.com/featured Follow the show across platforms: Spotify, Google Podcasts, Apple Podcasts, JioSaavn, Gaana, Amazon Music Do share the word with your folks! See omnystudio.com/listener for privacy information.
'Welcome to the dungeon' was the message that flashed up on computer screens in 1986. This was thought to be the first virus for personal computers and became known as 'Brain'. 'Brain' spread around the world and became infamous when it was featured in newspapers and magazines. Amjad Farooq Alvi tells Gill Kearsley how he and his brother, Basit, came to develop this accidental virus from their shop in Lahore, Pakistan. (Photo: The 'Brain' computer virus. Credit: Amjad and Basit Alvi)
Entering the second half of the 80s, the PC was gaining prominence in our homes. But so too was an unwelcome guest... As homes and schools were being filled with IBMs and Commodore 64s, two brothers had created software that would take the world by storm--but in all the wrong ways. This is the story of the 'Brain' computer virus; a rude awakening to how vulnerable our technology really was. Bonus 1980s content: Patreon.com/80s
Entering the second half of the 80s, the PC was gaining prominence in our homes. But so too was an unwelcome guest... As homes and schools were being filled with IBMs and Commodore 64s, two brothers had created software that would take the world by storm--but in all the wrong ways. This is the story of the 'Brain' computer virus; a rude awakening to how vulnerable our technology really was. Bonus 1980s content: Patreon.com/80s Artwork: Janet Cordahi Learn more about your ad choices. Visit megaphone.fm/adchoices
Well. I did have a computer virus. Found it a couple hours before the show. I had quickly installed some bullshit anti-virus software to hopefully keep things running long enough to do the show. It worked, but it also decided that my program that records all the calls was suspicious and blocked it from recording my individual calls. As such, this is the only copy of the show. Enjoy the full mixlr showreel. I'm sorry. Hopefully this wont' happen again.
Coleen was just happy to have the chance to play the game. She did a fine job getting a couple right answers. You'll have to get more than 4 right answers to be Smarter Than Staci today.
Es ist die bis dahin grösste Computer-Viren-Attacke: Am 4. Mai 2000 verbreitet sich der hochansteckende «Loveletter»-Virus. Wer dahintersteckt, wird erst viele Jahre später bekannt.
Beypore Sultan, The Dark Majesty inside me; Tread into the path of him, The Mystic Vlogger. Once you are in, you cannot step back. He will enchant you with his conspiracy theories... Chill you to the bone with his horror stories... Haunt you through the night... Making you wonder about what is real or unreal and intrigue you in the world of the "Illuminati". Unleashing the power of truth to unhide the hidden. It may be worse, not worse than any evil; fears nothing, sees everything. Hunger for more! The mystery travels to the unseen world; retrieving the dark truth hidden within destruction. Wait! That's not all! He will use his magical spell to pull you closer to his kingdom. You cannot resist the temptation. So, are you game?
The Freehold Federation Council Meets, The College prepares for graduation, a new friend is found, Cassy goes to learn of the Wraiths, and Charley gets a Computer Virus... Learn more about your ad choices. Visit megaphone.fm/adchoices
The Freehold Federation Council Meets, The College prepares for graduation, a new friend is found, Cassy goes to learn of the Wraiths, and Charley gets a Computer Virus... Learn more about your ad choices. Visit megaphone.fm/adchoices
Unexpected news for Grumble and a computer virus for Santa?
In unserem Podcast aus der Rubrik „IT-Sicherheit (Informationssicherheit und Security Awareness)“ erhalten Sie wissenswerte Hintergrundinformationen sowie praktische Sicherheitstipps und Sicherheitsempfehlungen zum Thema „Schadprogramme (Schadsoftware)“. ▬▬▬ E-Learning: ▬▬▬
Download the Volley.FM app for more short daily shows!
In recognition of the 19 annual National Cyber Security Awareness Month, The Outcomes Rocket Network has launched a 10-part podcast series to elevate Cyber Security Awareness in Healthcare on our main channel, the Outcomes Rocket Podcast. Partnering with leaders in healthcare cybersecurity in their capacity as members of the Health Sector Coordinating Council, the podcast aims to illuminate advances made in protecting critical healthcare infrastructure and patient safety, and areas that need further focus to put a stop to Cyber Crime. An ounce of prevention is worth a pound of cure. In this episode, Christian Dameff and Jeff Tully, cybersecurity researchers, physicians, and co-founders of the CyberMed Summit, talk about subjects to consider in terms of cybersecurity in healthcare preparedness and safety. One could draw an analogy between our immune system and how the healthcare cyber system should behave, and that's exactly what doctors Dameff and Tully do to illustrate the actions the healthcare industry should be taking. They talk about the CyberMed Summit and how they've created a dynamic space to share information about what to look out for and be up to date to prevent cyber attacks. Cybersecurity is a patient safety issue, and therefore, they discuss why doctors and many other healthcare stakeholders should chime into this topic and how they are working to overcome the challenges that may come up on the road. Tune in to this episode to learn more about cybersecurity in healthcare and how to be more active in protecting it! Click this link to the show notes, transcript, and resources: outcomesrocket.health
Star Trek: Age of Discovery is a fan podcast for the Star Trek Universe including Classic Trek as well as the Paramount + shows STAR TREK: DISCOVERY, STAR TREK: PICARD, STAR TREK: SHORT TREKS, STAR TREK: LOWER DECKS, STAR TREK: PRODIGY and STAR TREK: STRANGE NEW WORLDS.Subscribe to Star Trek: Age of Discovery in Apple Podcast, Amazon Music, Google Podcast, Spotify, Stitcher, TuneIn, or iHeartRADIO.Email the show at startrekaod@gmail.com. Follow us on Twitter and Instagram @StarTrekAoD and Facebook at https://www.facebook.com/StarTrekAoD/. Visit our website at http://startrekaod.net where we offer additional articles on Star Trek canon, interesting sidebar issues, and aspects of the show.www.facebook.com/StarTrekAoD/. Visit our website at http://startrekaod.net where we offer additional articles on Star Trek canon, interesting sidebar issues, and aspects of the show.2022 © Star Trek: Age of Discovery
Jay White and Jeremy Thompson take your calls, questions and what you're excited about this week, in the world of consumer technology. Wiltz Cutrer is an IT expert. Jeremy Thompson is a computer repair ace. Jay White is the show's host. All three guys love to tinker with the latest tech gadgets and answer your questions. Have a tech issue? Send them an email to: everydaytech@mpbonline.org. Hosted on Acast. See acast.com/privacy for more information.
About Lois Hollis: Lois Hollis, RN BSN REV, shifts our opinion on one of the most forbidden subjects: shame and guilt. Depression, anxiety, 30 years of migraine headaches, and pain were Lois' life until she learned the dangers of shameguilt (not shame and guilt.) She shares her 15 years' experience as a ShameGuilt Educator, Counselor, Filmmaker to offer health and spiritual maturity. Lois entered the health field as a Nurse's Aide at 12 and continues today at 78. As a trailblazer, she developed one of the first Kidney Hemodialysis centers in the USA. Today, she establishes shameguilt as an independent study. Lois' film Out of Discord Into Harmony teaches us HOW to communicate our emotions and inner critic. “IM Good Film” makes shameguilt visible to illustrate its trickery and how to kick it out. She is the author of three books and podcasts. “Now is The Time,” a collection of her soul readings, helps us stop the negative shameguilt energy. In this episode, Kim Andryc, Lora Solomon, and Lois Hollis discuss: Changing our relationship with the parasitic shameguilt energy. The connection between our emotional self, our spiritual self, and our physical self. Speaking directly to your emotions. The effort it takes to be sane in a world where insanity is the norm Key takeaways: Shameguilt energy turns our positive emotions to negative ones: our compassion to depression, intuition to anxiety, and passion to anger. We cannot stay in the state of shame and guilt. On the Hawkin's scale, the only energy lower than shame is death. It is impossible to make a good decision when you're feeling guilty. We have been in a space of insanity for so long, as a society, that we have started to call it normal. We can move out of insanity and into a sane space by escaping the shameguilt hold. "Shameguilt is not ours to own. We are all perfect creations." — Lois Hollis Connect with Lois Hollis: Website: https://truthissimple.com LinkedIn: https://www.linkedin.com/in/loishollis/ Facebook: https://www.facebook.com/lois3hollis Facebook: https://www.facebook.com/LoisAHollis Facebook Group: https://www.facebook.com/groups/1362596790752033 YouTube: https://youtube.com/user/ShameGuiltSurvival Instagram: https://www.instagram.com/shameguilt_ Twitter: https://twitter.com/loishollis3 CALL TO ACTION https://www.loishollis.com/call-to-action/ WEBSITE https://www.loishollis.com/ Free e-book “Now is the Times” Writings from Spirit to get out of the shameguilt dangers. Free 15 minute call Soulspeaks Healing information FILMS https://www.imgoodfilm.com/ ”Out of Discord Into Harmony” 20 minutes Communicating with your emotions and inner critic “IM Good Film” Shame Guilt becomes visible 15 min. IM Good Film Song 3 minutes. PODCASTS https://www.loishollis.com/podcasts-loishollis/ Full length FIVE-MINUTE GOLDEN NUGGET Podcasts Newsletter https://www.loishollis.com/ FREE e-book Five-Hundred Questions Have One Answer 500 examples of shame guilt behavior Receive important updates. Connect with Sacred Rebellion: Facebook: https://www.facebook.com/LoraAndKim Instagram: https://www.instagram.com/sacredrebellionpodcast/ Email Lora: connect@lorasolomon.com Email Kim: kim@kimandryc.com Show notes by Podcastologist Chelsea Taylor-Sturkie Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.
STUXNET. The virus that prevented; then started the next world war. Cyberwar is being waged right now in your name. No matter what country you call home, your government is engaged in highly dangerous combat on the Internet. Infrastructure around the world is under siege and everyone is at risk. Even you. In 2010, the Stuxnet virus was discovered in Natanz, Iran and thousands of control systems that operate factories, power plants and nuclear reactors around the world. It was 20 times more sophisticated than any malware ever recorded. It could halt oil pipelines, destroy water treatment plants and bring down entire power grids. Stuxnet is back, stronger than ever. And we should *all* be concerned. Cyber-security experts knew Stuxnet wasn't ordinary malware thrown together by some basement hacker. This was something different. Let's find out why.
Stuxnet was probably one of the most sophisticated pieces of software ever built. I can easily imagine a Hollywood movie about it. A computer program that could change the course of history. Ironically, Stuxnet was a computer virus. A virus that infected 200 thousand machines. But activated and damaged only on a fraction of that. Read more: https://nurkiewicz.com/78 Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter
In this episode, the sons talk about Larry the Wonder Dog.
https://ivanteller.com/
Sign up to get free CPE for listening to this podcast:https://earmarkcpe.comDownload the Earmark CPE App: Apple: https://apps.apple.com/us/app/earmark-cpe/id1562599728Android: https://play.google.com/store/apps/details?id=com.earmarkcpe.appClient Data Security: Best Practices to Protect Your Firm from Serious Threats https://rb.gy/jh6guzConnect with Our Guest, Byron PatrickLinkedIn: https://www.linkedin.com/in/byronpatrick/Twitter: https://twitter.com/byron_cpaLearn more about BotkeeperWebsite: https://www.botkeeper.com/Connect with Blake Oliver, CPALinkedIn: https://www.linkedin.com/in/blaketoliverTwitter: https://twitter.com/blaketoliver/
In this episode we had the pleasure of talking to Melanie Rieback, the CEO of Radically Open Security. During the episode we talked with the award-winning computer scientist, about how she started the world's first non-profit computer security consultancy company, her involvement in the Human Genome Project at MIT, her world-renowned RFID publication "Is Your Cat Infected with a Computer Virus?" and many useful tips for all (future) founders. How to get in touch with Melanie Rieback: https://www.linkedin.com/in/mrieback/ More information about Radically Open Security https://www.radicallyopensecurity.com/ More Information on the Post Growth Incubator: https://nonprofit.ventures/
Data Science or Data Analytics? Which is right career choice for you? | Zubin Saini | #TGV182 Genre: Data Science, Career Development, Data Analytics We live in a world surrounded by data. Very few are aware how this data is literally a goldmine for all businesses. This is due to the vast amount of information these small chunks of data contain which can be transformed into big decisions. All modern companies need a data scientist and analyst for them to make decisions based on customer response and satisfaction. Tune in to hear inputs from an experienced data scientist who has worked through many companies and multiple roles. In the episode: Zubin's career journey and top 3 things that contributed towards his career. (2:33) Difference between Data Science and Data Analytics. (8:25) How can data science help businesses? (12:09) Technologies in Data Analytics and where to start? (19:23) Evolution of Data Science and Future trends. (24:14) Career opportunities in field of Data Science and Analytics (29:10) Rapid fire questions (34:10) What is your one advice for those aspiring to make big in their careers? (36:46) Trivia on Computer Virus (39:16) About Zubin: Zubin is currently helping start-ups in an external role to incubate Analytics and ML/AI in-house and providing analytical solutions. He has a B. Tech from IIT Delhi, and a Post Graduate Diploma in Management from IIM Calcutta. He started his professional journey with Absolutdata, right after engineering, which he left after a year to join IIM Calcutta. After his PGDM, he worked with Ernst and Young and then back to Absolutdata, where he worked for eight years. After a short stint with Oyo leading their Pricing algorithm, Zubin now works as an independent consultant in the field of Data Analytics. Connect with Zubin on LinkedIn: https://www.linkedin.com/in/zubin-saini-329870b/ Naveen Samala: https://www.linkedin.com/mwlite/in/naveensamala Sudhakar Nagandla: https://www.linkedin.com/in/nvsudhakar #datascience, #dataanlytics, #data, #data analyst, #career, #business, #db, #data management, #career development, #naveen samala, #tgv, #theguidingvoice, #sudhakarnagandla, #career guidance, #coaching, #mentoring
Dr. Cohen - "The Father of the Computer Virus" talks about understanding the risks in cybersecurity and dealing with what is important & when it matters! He discusses even though we think things have changed and there is more remote work, the nuts and bolts of the industry have not. Very little has changed in the strategy or tactics. Cyber Security may be a buzz word, but it is nothing to be afraid of. From a strategic and governance aspect things have remained the same for 25 years. Be reasonable and prudent, obviously. Fred shares the fundamental process he follows to make good cyber security or business decisions. They are rooted deeply in what is important to the business and the consequences of failures. If the consequences and rewards justify the risk, then do it! We take risks to get rewards. The question is what risks are worth taking. To make a good decision on that is understanding the nature of the risks you are taking. Connect with Fred: https://www.linkedin.com/in/dr-fred-cohen/ Check out his website: http://all.net/ Visit Short Arms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw/featured Twitter: https://twitter.com/ShortArmSAS
In today's Phone Tap, Jeffrey call a guy who recently dropped his laptop off at a repair shop and while he just wants his computer cleaned of viruses, the attendant behind the counter might be a little under the influence...
In today's Phone Tap, Jeffrey call a guy who recently dropped his laptop off at a repair shop and while he just wants his computer cleaned of viruses, the attendant behind the counter might be a little under the influence...
Download the Volley.FM app for more short daily shows!
This episode is also available as a blog post: Hardware: Computer Virus infect Background - Karate Coder
https://www.alaskasnewssource.com/content/news/What-happened-to-CeeCee-A-daughters-disappearance-her-murder-and-a-fathers-quest-for-answers--510897651.htmlhttps://www.mercurynews.com/2019/06/17/he-said-he-would-pay-9-million-for-a-murder-so-five-friends-plotted-to-kill-a-teenager-police-say/https://www.legacy.com/us/obituaries/adn/name/cynthia-hoffman-obituary?id=17951305https://www.alaskasnewssource.com/content/news/Murder-suspects-sister-speak-out-about-traumatic-childhood-511163002.htmlhttps://www.adn.com/alaska-news/crime-courts/2019/08/09/indiana-man-accused-of-plotting-cynthia-hoffman-killing-pleads-not-guilty-to-murder-charges/http://nixle.us/B4F3Ghttps://www.alaskasnewssource.com/content/news/Who-is-accused-killer-Darin-Schilmiller-Cynthia-Hoffman-murder-suspect-511444111.htmlhttps://allthatsinteresting.com/denali-brehmer-catfish-murderhttps://www.youtube.com/watch?v=EX3UnfUPmcIhttps://www.wave3.com/2019/06/18/mother-says-harrison-county-man-arrested-murder-child-porn-tried-get-videos-her-young-kids/https://usa.one/wp-content/uploads/2019/06/Schilmiller.pdfhttps://www.alaskasnewssource.com/content/news/Remembering-Cynthia-Hoffman-with-a-memorial-ride-570988921.htmlSupport the show
"People are going 'hog wild' over climate change." In this episode we discuss: • Climate Change • Inflation • Hot Coeds. Subscribe for a Computer Virus -> https://tinyurl.com/y5hc23dk @BMHpodcast
In this episode we discuss: • Taxes • Rockets • Really big holes Subscribe for a Computer Virus --> https://tinyurl.com/y5hc23dk @BMHpodcast
It's time to celebrate July 4th the right way with a Movie Defender analysis of Independence Day! On this show we review and analyze one of the best and most famous sci-fi disaster films in history. But before that, we play a fun game we call This or That and discuss which movie-related things we'd choose if forced to make a choice. Then, we start breaking down Independence Day in the only way the Movie Defenders can... by playing the best scenes and analyzing as much as we can. So make sure your satellites are still there, evacuate the cities, and make sure to bring your dogs... it's time for Independence Day! Click here to listen and connect from anywhere: https://linktr.ee/moviedefenders 00:00:00 Intro and Announcements 00:17:36 This or That 00:40:20 Independence Day Discussion Starts 01:10:37 Here They Come 01:30:02 Jimmy 01:42:38 Evacuation 02:00:40 Black Knights Attack 02:25:09 Area 51 02:33:12 David Studies Ship & Russell Fights for His Child (Extended) 02:54:39 Computer Virus 03:06:23 THE Speech 03:15:35 End Battle Special thanks to all of our amazing Patreon supporters! Brett Bowen Barrett Young Brev Tanner Kevin Athey Marcin Miduch Joshua Loy Josh Evans Mark Martin Richard Cree Nate Lesan Alexis Borchardt Mark Nattress Bart German Owen Payne Alex Kirby Michael Puckett Ena Haynes Daryl Ewry Sean Masters Randal Silver Attack of the Killer Podcast
this week we talk all about 2020, the high points, the not so high points and everything in between.
"What started out as a last minute replacement on a stakeout, ends in a bloody baptism into next level tech and madness for Special Agent Ryan "Jax" McGraw." - A H.A.P.P.Y. Corps Story Welcome to the Real-Time Storytime Show by Robert R. Ricks. This is an interactive story experience, where you the viewer can submit Keywords/Phrases and I will try to tell a story with those words as part of the story. Tonight's keywords/phrases: 01) Taekwondo 02) Computer Virus 03) Rum Punch 04) Extreme measures 05) Hurricane 06) Black Rider 07) Tasteless 08) Nose Picking 09) Payment 10) Ass Cream 11) Spludge http://www.realtimestorytime.com [Real-Time Storytime Official Website] https://anchor.fm/realtimestorytime [Real-Time Storytime Podcast] http://www.noveps.com [NovEps.com Website] http://www.robertrricks.com [Robert R Ricks - Author Website] https://www.tacticoolgeek.com [Tacticool Geek Online Store "Get your G33k On!"] --- Support this podcast: https://anchor.fm/realtimestorytime/support
Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we're able to be prepared for the innovations of the future! Todays episode is not about Fear, Uncertainty, and Death. Instead it's about viruses. As with many innovations in technology, early technology had security vulnerabilities. In fact, we still have them! Today there are a lot of types of malware. And most gets to devices over the Internet. But we had viruses long before the Internet; in fact we've had them about as long as we've had computers. The concept of the virus came from a paper published by a Hungarian Scientist in 1949 called “Theory of Self-reproducing automata.” The first virus though, didn't come until 1971 with Creeper. It copied between DEC PDP-10s running TENEX over the ARPANET, the predecessor to the Internet. It didn't hurt anything; it just output a simple little message to the teletype that read “I'm the creeper: catch me if you can.” The original was written by Bob Thomas but it was made self-replicating by Ray Tomlinson thus basically making him the father of the worm. He also happened to make the first email program. You know that @ symbol in an email address? He put it there. Luckily he didn't make that self replicating as well. The first antivirus software was written to, um, to catch Creeper. Also written by Ray Tomlinson in 1972 when his little haxie had gotten a bit out of control. This makes him the father of the worm, creator of the anti-virus industry, and the creator of phishing, I mean, um email. My kinda' guy. The first virus to rear its head in the wild came in 1981 when a 15 year old Mt Lebanon high school kid named Rich Skrenta wrote Elk Cloner. Rich went on to work at Sun, AOL, create Newhoo (now called the Open Directory Project) and found Blekko, which became part of IBM Watson in 2015 (probably because of the syntax used in searching and indexes). But back to 1982. Because Blade Runner, E.T., and Tron were born that year. As was Elk Cloner, which that snotty little kid Rich wrote to mess with gamers. The virus would attach itself to a game running on version 3.3 of the Apple DOS operating system (the very idea of DOS on an Apple today is kinda' funny) and then activate on the 50th play of the game, displaying a poem about the virus on the screen. Let's look at the Whitman-esque prose: Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes, it's Cloner! It will stick to you like glue It will modify RAM too Send in the Cloner! This wasn't just a virus. It was a boot sector virus! I guess Apple's MASTER CREATE would then be the first anti-virus software. Maybe Rich sent one to Kurt Angle, Orin Hatch, Daya, or Mark Cuban. All from Mt Lebanon. Early viruses were mostly targeted at games and bulletin board services. Fred Cohen coined the term Computer Virus the next year, in 1983. The first PC virus came also to DOS, but this time to MS-DOS in 1986. Ashar, later called Brain, was the brainchild of Basit and Amjad Farooq Alvi, who supposedly were only trying to protect their own medical software from piracy. Back then people didn't pay for a lot of the software they used. As organizations have gotten bigger and software has gotten cheaper the pirate mentality seems to have subsided a bit. For nearly a decade there was a slow roll of viruses here and there, mainly spread by being promiscuous with how floppy disks were shared. A lot of the viruses were boot sector viruses and a lot of them weren't terribly harmful. After all, if they erased the computer they couldn't spread very far. The virus started “Welcome to the Dungeon.” The following year, the poor Alvi brothers realized if they'd of said Welcome to the Jungle they'd be rich, but Axl Rose beat them to it. The brothers still run a company called Brain Telecommunication Limited in Pakistan. We'll talk about zombies later. There's an obvious connection here. Brain was able to spread because people started sharing software over bulletin board systems. This was when trojan horses, or malware masked as a juicy piece of software, or embedded into other software started to become prolific. The Rootkits, or toolkits that an attacker could use to orchestrate various events on the targeted computer, began to get a bit more sophisticated, doing things like phoning home for further instructions. By the late 80s and early 90s, more and more valuable data was being stored on computers and so lax security created an easy way to get access to that data. Viruses started to go from just being pranks by kids to being something more. A few people saw the writing on the wall. Bernd Fix wrote a tool to remove a virus in 1987. Andreas Luning and Kai Figge released The Ultimate Virus Killer, an Antivirus for the Atari ST. NOD antivirus was released as well as Flushot Plus and Anti4us. But the one that is still a major force in the IT industry is McAfee VirusScan, founded by a former NASA programmer named John Mcafee. McAfee resigned in 1994. His personal life is… how do I put this… special. He currently claims to be on the run from the CIA. I'm not sure the CIA is aware of this. Other people saw the writing on the wall as well, but went… A different direction. This was when the first file-based viruses started to show up. They infected ini files, .exe files, and .com files. Places like command.com were ripe targets because operating systems didn't sign things yet. Jerusalem and Vienna were released in 1987. Maybe because he listened to too much Bad Medicine from Bon Jovi, but Robert Morris wrote the ARPANET worm in 1988, which reproduced until it filled up the memory of computers and shut down 6,000 devices. 1988 also saw Friday the 13th delete files and causing real damage. And Cascade came this year, the first known virus to be encrypted. The code and wittiness of the viruses were evolving. In 1989 we got the AIDS Trojan. This altered autoexec.bat and counted how many times a computer would boot. At 90 boots, the virus would hide the dos directories and encrypt the names of files on C:/ making the computer unusable unless the infected computer owner sent $189 a PO Box in Panama. This was the first known instance of ransomeware. 1990 gave us the first polymorphic virus. Symantec released Norton Antivirus in 1991, the same year the first polymorphic virus was found in the wild, called Tequila. Polymorphic viruses change as they spread, making it difficult to find by signature based antivirus detection products. In 1992 we got Michelangelo which John Mcafee said would hit 5 million computers. At this point, there were 1,000 viruses. 1993 Brough us Leandro and Freddy Krueger, 94 gave us OneHalf, and 1995 gave us Concept, the first known macro virus. 1994 gave us the first hoax with “Good Times” - I think of that email sometimes when I get messages of petitions online for things that will never happen. But then came the Internet as we know it today. By the mid 90s, Microsoft had become a force to be reckoned with. This provided two opportunities. The first was the ability for someone writing a virus to have a large attack surface. All of the computers on the Internet were easy targets, especially before network address translation started to somewhat hide devices behind gateways and firewalls. The second was that a lot of those computers were running the same software. This meant if you wrote a tool for Windows that you could get your tool on a lot of computers. One other thing was happening: Macros. Macros are automations that can run inside Microsoft Office that could be used to gain access to lower level functions in the early days. Macro viruses often infected the .dot or template used when creating new Word documents, and so all new word documents would then be infected. As those documents were distributed over email, websites, or good old fashioned disks, they spread. An ecosystem with a homogenous distribution of the population that isn't inoculated against an antigen is a ripe hunting ground for a large-scale infection. And so the table was set. It's March, 1999. David Smith of Aberdeen Township was probably listening to Livin' La Vida Loca by Ricky Martin. Or Smash Mouth. Or Sugar Ray. Or watching the genie In A Bottle video from Christina Aguilera. Because MTV still had some music videos. Actually, David probably went to see American Pie, The Blair Witch Project, Fight Club, or the Matrix then came home and thought he needed more excitement in his life. So he started writing a little prank. This prank was called Melissa. As we've discussed, there had been viruses before, but nothing like Melissa. The 100,000 computers that were infected and 1 billion dollars of damage created doesn't seem like anything by todays standards, but consider this: about 100,000,000 PCs were being sold per year at that point, so that's roughly one tenth a percent of the units shipped. Melissa would email itself to the first 50 people in an Outlook database, a really witty approach for the time. Suddenly, it was everywhere; and it lasted for years. Because Office was being used on Windows and Mac, the Mac could be a carrier for the macro virus although the payload would do nothing. Most computer users by this time knew they “could” get a virus, but this was the first big outbreak and a wakeup call. Think about this, if there are supposed to be 24 billion computing devices by 2020, then next year this would mean a similar infection would hit 240 million devices. That would mean it hits ever person in Germany, the UK, France, and the Nordic countries. David was fined $5,000 and spent 20 months in jail. He now helps hunt down creators of malware. Macroviruses continued to increase over the coming years and while there aren't too many still running rampant, you do still see them today. Happy also showed up in 1999 but it just made fireworks. Who doesn't like fireworks? At this point, the wittiness of the viruses, well, it was mostly in the name and not the vulnerability. ILOVEYOU from 2000 was a vbscript virus and Pikachu from that year tried to get kids to let it infect computers. 2001 gave us Code Red, which attacked IIS and caused an estimated $2 Billion in damages. Other worms were Anna Kournikova, Sircam, Nimda and Klez. The pace of new viruses was going, as was how many devices were infected. Melissa started to look like a drop in the bucket. And Norton and other antivirus vendors had to release special tools, just to remove a specific virus. Attack of the Clones was released in 2002 - not about the clones of Melissa that started wreaking havoc on businesses. Mylife was one of these. We also got Beast, a trojan that deployed a remote administration tool. I'm not sure if that's what evolved into SCCM yet. In 2003 we got simile, the first metamorphic virus, blaster, sobbing, seem, graybeard, bolgimo, agobot, and then slammer, which was the fastest to spread at that time. This one hit a buffer overflow bug in Microsoft SQL and hit 75,000 devices in 10 minutes. 2004 gave us Bagle, which had its own email server, Sasser, and MyDoom, which dropped speeds for the whole internet by about 10 percent. MyDoom convinced users to open a nasty email attachment that said “Andy, I'm just doing my job, nothing personal.” You have to wonder what that meant… The witty worm wasn't super-witty, but Netsky, Vundo, bifrost, Santy, and Caribe were. 2005 gave us commwarrior (sent through texts), zotob, Zlob, but the best was that a rootlet ended up making it on CDs from Sony. 2006 brought us Starbucks, Nyxem, Leap, Brotox, stration. 2007 gave us Zeus and Storm. But then another biggee in 2008. Sure, Torpig, Mocmex, Koobface, Bohmini, and Rustock were a thing. But Conficker was a dictionary attack to get at admin passwords creating a botnet that was millions of computers strong and spread over hundreds of countries. At this point a lot of these were used to perform distributed denial of services attacks or to just send massive, and I mean massive amounts of spam. Since then we've had student and duqu, Flame, Daspy, ZeroAccess. But in 2013 we got CryptoLocker which made us much more concerned about ransomware. At this point, entire cities can be taken down with targeted, very specific attacks. The money made from Wannacry in 2017 might or might not have helped developed North Korean missiles. And this is how these things have evolved. First they were kids, then criminal organizations saw an opening. I remember seeing those types trying to recruit young hax0rs at DefCon 12. Then governments got into it and we get into our modern era of “cyberwarfare.” Today, people like Park Jin Hyok are responsible for targeted attacks causing billions of dollars worth of damage. Mobile attacks were up 54% year over year, another reason vendors like Apple and Google keep evolving the security features of their operating systems. Criminals will steal an estimated 33 billion records in 2023. 60 million Americans have been impacted by identity theft. India, Japan, and Taiwan are big targets as well. The cost of each breach at a company is now estimated to have an average cost of nearly 8 million dollars in the United States, making this about financial warfare. But it's not all doom and gloom. Wars in cyberspace between nation states, most of us don't really care about that. What we care about is keeping malware off our computers so the computers don't run like crap and so unsavory characters don't steal our crap. Luckily, that part has gotten easier than ever.