Ransom is not requested via traceable currency-transactions but via cyber currency. If cyber currencies were made illegal, ransomware would be severely slowed if not completely eliminated.
Microsoft will only support Windows 7 with security patches until January 14, 2020. That’s the “end of support” or “end of life” (EOL) date. After this date, Windows 7 will technically leave “extended support.” Businesses [and Pro licensee's] can pay for additional support, but average consumer PCs will be stuck without security patches.
... the free Windows 10 upgrade offer is over—although there’s still an official but kind-of-secret way to upgrade to Windows 10 for free.
I wouldn't bother turning off this particular "nag."
Voova CEO, Mark Bond, admitted to the court that the company could have implemented two-factor authentication (2FA):
There was no multi-factor authentication, a means of confirming the user ID which requires a user to verify their identification by something they know or possess.
2FA would have made it much harder for Needham to traipse through Voova’s AWS account posing as “Speedy.”
Of course, you also have to lock the door after employees leave by shutting down their accounts.
Make sure you have a plan in place for when employees leave that covers everything from physical access to your property and hardware like laptops, phones and access tokens, to email and call forwarding, and logins for all the company software and services they had access to.
I saw this next issue quite a few times over the last few days but didn't think readers here would necessarily be very interested if interested at all. Then, I considered that so many websites run on WordPress that it would be good for them to know about it even if they've never thought about WordPress or websites or what have you: Zero-Day WordPress Plugin Vulnerability Used to Add Malicious Redirects
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments and companies and rich individuals
... there is the reality that American laws governing this new age of digital warfare are murky, outdated, and ill-equipped to address rapid technological advances. The rules governing what American intelligence and military personnel can and cannot provide to foreign governments were meant to keep a leash on 20th-century warfare — selling missiles or planes overseas or training foreign forces on Army tactics.
But they do not address hacking skills that can be honed in front of a laptop, or at the world’s most advanced intelligence agencies, and sold to the highest bidder.
“The worst part of it is the weapons are easier to get,” said Brian Bartholomew, the principal security researcher at Kaspersky Lab, a digital security company.
“You’ve got a lot of people entering the arena that are new and don’t play by the same rules,” he said. “It’s like putting a military-grade weapon in the hands of someone off the street.”
Is there enough memory in the devices to update the firmware to encrypted?: Critical flaw lets hackers control lifesaving devices implanted inside patients