SSD 2.5 to 3.5 Passive Heat dissipation Hard Drive Adapter
- 2.5 to 3.5 Hard Drive Adapter: Turns your 2.5in SATA HDD / SSD into 3.5in so you can install it into your desktop PC for Passive Heat Cooling
- High Speed, Excellent Performance: SATA III supports a theoretical maximum speed of 6Gbps, also backward compatible with SATA I/II
- Good Heat Dissipation: The side slots and open design greatly improves heat dissipation and protects your hard drive
- Superb Quality: Made of ABS plastic material; compatible with Windows, Mac OS, Linux Desktops; Hot-swap plug and play, no driver needed
- Screws in box: 4 x M3*5 screws to install the 2.5″ hard drive, and 6 x screws to mount the 1125SS
Point-Of-Sale Malware Found at 102 Checkers Restaurants
Checkers Restaurants suffered a cyber security breach according to a report by ZD Net, the company found Point-Of-Sale malware in 102 Checkers and Rally’s locations.
The Checkers released statement emphasizes that “not all Checkers and Rally’s restaurants were affected by this issue.” The business also announced that the Point-Of-Sale malware did not affect all the guests who visited the restaurant chain. To clarify, only those who paid during the said periods remain susceptible to security attacks.
The list of affected states includes Alabama, California, Delaware, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Michigan, and West Virginia. The list also includes the following states as well. Nevada, New Jersey, New York, North Carolina, Ohio, Pennsylvania, Tennessee, and Virginia.
… Read the rest“We also are working with federal law enforcement authorities and coordinating with the payment card companies in their efforts to protect cardholders,” Checkers said. “We encourage you to review your account statements and contact
File Server Migration While Keeping OLD and NEW HostName
Here is a complete guide on how to migrate Windows File Server 2008 or 2012 and 2016 while keeping the OLD and New HostName destinations on the new server.
Step 1 : Stand up your new file server, mine is called FS2.
Step 2 : Make sure to keep the same folder structure if possible as you see in your old server, in my case it is called FS1.
Step 3 : I like to use software called SyncFolders , it can be used to transfer all your files with NTFS permissions from Source (FS1) to Detestation (FS2)
Step 4 : In my case I configured the SyncFolders Software to Point my FS1 D:\ drive TO \\FS2\D$ or you can just share the D drive from FS2. You can also schedule this software to run hourly or nightly it will sync the files recently changed.
Step 5: Go to old … Read the rest
Since 2005 some Google G Suite passwords were stored in plaintext
Google says that there were a number of its enterprise customers since 2005 have had their Google G Suite passwords stored in plaintext.
G Suite, Google’s brand of cloud computing, software, productivity and collaboration tools has more than 5 million users as of February. Google said that it recently discovered the passwords for a “subset of enterprise G Suite customers” stored in plain text since 2005.
“This practice did not live up to our standards,” Suzanne Frey, VP of engineering for Google Cloud Trust, said in a post. “To be clear, these passwords remained in our secure encrypted infrastructure. This issue has been fixed and we have seen no evidence of improper access to or misuse of the affected passwords.”
Google said they also discovered a second security lapse earlier this month as they were troubleshooting new G Suite customer sign-ups. The company said since January it was … Read the rest
Patch That WhatsApp Zero-Day Exploit
Facebook has recently patched a critical zero-day exploit in WhatsApp, WhatsApp is urging users to update as soon as possible because hackers are able to exploit you remotely to install spyware on phones by calling the targeted device.
WhatsApp did not name the threat actor exploiting the CVE-2019-3568, it described the attackers as an “advanced cyber actor” that targeted “a select number of users.”
A WhatsApp advisory confirmed Monday that the flaw – now patched – is a
WhatsApp buffer overflow vulnerability in WhatsApp’s VOIP stack, which allows remote code execution via specially crafted series of SRTCP [Secure Real Time Transport Protocol] packets sent to a target phone number.
“A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number.” details provided by Facebook.
Facebook however did fix the issue with the release of WhatsApp … Read the rest
Amazon Alexa has some new HIPAA enabled Skills
Amazon Alexa has some new HIPAA Compliant enabled Skills Kit. Covered Entities and their Business Associates, subject to the U.S. Health Insurance Portability and Accountability Act of 1996 (HIPAA), to build Alexa skills that transmit and receive protected health information as part of an invite-only program. There are six new Alexa healthcare skills from industry-leading healthcare providers, payors, pharmacy benefit managers, and digital health coaching companies are now operating in the HIPAA-eligible environment. If you are interested in getting updates, click here.
New Healthcare Skills
The new skills are designed to help customers manage a variety of healthcare needs at home simply using voice – whether it’s booking a medical appointment, accessing hospital post-discharge instructions, checking on the status of a prescription delivery, and more.
The new HIPAA compliant healthcare skills:
- Express Scripts (a leading Pharmacy Services Organization): Members can check the status of a home delivery prescription and
Everyone Needs To Patch 3 Nvidia Driver Flaws
If your a Business, Gamer or a regular awesome person using the Nivida Chipset you definitely need to patch the Nvidia driver as soon as possible because of the following 3 flaws.
“[The driver] contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where the product does not properly synchronize shared data, such as static variables across threads, which can lead to undefined behavior and unpredictable data changes, which may lead to denial of service, escalation of privileges or information disclosure.”
The most severe of the flaws is the CVE‑2019‑5675. This flaw could be used to launch DoS attacks that could cripple the system, as well as give the hackers escalation privileges and disclose system information, from what was said on a Thursday advisory released by Nvidia.
The second flaw, CVE‑2019‑5676, exists in the driver’s software install package and is also rated high-severity. The software actually … Read the rest
A Free decryptor tool for ZQ Ransomware
Victims affected by the ZQ Ransomware can have a breathe of relief due to researchers developing a free decryptor tool to decrypt files encrypted by the ZQ Ransomware.
About The ZQ Ransomware
Michael Gillespie Discovered this specific ransomware that adds a specific ZQ extension to encrypted files. The malware has infected users in the US, India, Poland, Brazil and the UK.
Once the ransomware is installed, it encrypts the victim’s files using the Salsa20 and RSA-1024 algorithms and then it will add the “.w_decrypt24@qq[.]com.zq” extension to the encrypted files.
When the encryption process is complete, the ransomware drops a ransom note named HELP_DECRYPT.txt. The ransom note includes instructions about the payment process. It also includes the contact address of the operators. Victims affected by the ransomware are required to send a message to the email address w_decrypt24@qq[.]com.
How does the decryptor work?
In order to decrypt the files, victims need … Read the rest
Malware Can Hide Within DICOM Medical Images
It has been found that malware can now hide within DICOM medical images. These are the type of images that doctors look at when they do XRay, CT or MRI scans.
The analysis named Markel Picado Ortiz was able to take advantage of the DICOM flaw which allows the “128-byte section at the beginning of the file, called the preamble” to be injected with malware.
“By mixing in with protected health information malware can effectivelyexploit the data’s clinical and regulatory implications to evade detection and derail remediation attempts while creating a host of new concerns for security teams, healthcare organizations, and antivirus companies in the process,” Ortiz wrote.
“This vulnerability stands apart as one whose technical potency is derived from not just a software design flaw, but from the clinical and regulatory environment as well,” he added.
If hackers were to exploit the design flaw in DICOM, they’d be able … Read the rest
Horrible Call Quality With Samsung Galaxy s10 Lineup
The Samsung Galaxy s10 lineup of phones are great machines, the specs are great and the hard within them are amazing. However what in the world is going on with the call quality of these phones? I have been doing some research and many other people are ranting and raving on the Samsung forums and on Reddit about having the same issues with horrible phone call quality.
People have mentioned that it could be a carrier issue with ATT, however others like myself have Version and are experiencing the same issue.
Troubleshooting the issue:
What I have experienced during phone calls with people and they make some sort of high pitched tone the phone would magnify and focus on that high pitched sound, background noise would also be enhanced with ear piercing sounds which would cause me move my phone away from my ear. After some research I have found … Read the rest