MIAMI — The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take matters into their own hands or hire others to do so?
Archive for November 2, 2012
National cybersecurity effort launched to strengthen software infrastructure
Scientists at the Morgridge Institute for Research, the University of Wisconsin-Madison, Indiana University, and the University of Illinois at Urbana-Champaign have received a $23.6 million grant as part of a Broad Agency Announcement (BAA 11-02) by … | University of Wisconsin-Madison |
Category: cybersecurity, news /
Schemes that freeze computers turn fake emails into cash
This is a computer virus affecting consumers in the metro area and around the region. The fake message (not really from the FBI) goes on to explain that the user’s Internet address was associated with an illegal online activity. It claims the computer …
If you get infected with this type of “Ransomware”, shutdown your computer and call your favorite Computer Guy. Or if you know how to do a system recovery and do that and restore your computer to the most recent date prior to the infection, yesterday for example.
Practice Safe Computing!
Joe