VISUALIZED: Map of Ransomware Attacks Since 2018

VISUALIZED: Map of Ransomware Attacks Since 2018

 

Each dot represents the location of a ransomware attack, with the size of the dot depicting the number of records impacted. 

This map updates weekly and pinpoints the locations of each ransomware attack in the US, from 2018 to present day. Where available, it includes the ransom amount, whether or not the ransom was paid, the entity and industry that was targeted, and the strain of ransomware used. Our researchers search through state reports, industry news, and cybersecurity databases to find the latest ransomware attacks on US businesses, healthcare organizations, educational institutions, and government agencies.

In our industry-specific reports, we found:

Weaponized Drones: The Spread of Commercial Grade Flying IED’S

Weaponized Drones: The Spread of Commercial Grade Flying IED’S

 

A look at how civilian quad-copters are being utilized by paramilitary groups, drug cartels and terrorist.

This is the future of Asymmetrical Warfare.

Prepare Accordingly.

 

A Safe and Secure Way to Decommission a Hard Drive | (ISC)² Article

Survival Homestead

Pay particular attention to damaging the platters inside the hard drives where data is magnetically recorded” says UMich.edu.

Hard drives will typically have several platters mounted on the same spindle. See featured image. Be thorough.

Hard disk with platter

Physical destruction is generally considered the most secure and permanent type of data destruction, but this must be done to a provable level, as even a small piece of a disk may contain data. Typical techniques include grinding, shredding, incineration, applying corrosive chemicals, or applying extremely high voltage.

(ISC)² Article

View original post

Secret Messages – A Guide To Covert Communication

Secret Messages – A Guide To Covert Communication

 

Nothing ground breaking here, just some “secret comm” fundamentals.

Remember, having a Security mindset in today’s cyber-snooping world is just good common sense.

 

The Surveillance State: Metaverse Is the Ultimate Surveillance Tool

The Metaverse Is the Ultimate Surveillance Tool

 

Really well done podcast about Metaverse and it’s application for global surveillance the likes of which you have never imagined!