IBM Put Customers At Risk With Malware-Infested Flash Drives, Here’s What To Do
IBM has put its customers, particularly their devices, at risk after they admittedly shipped USB Flash drives infected with a Trojan malware by accident. The infected drives were sent to some of IBM's storage hardware customers and some Lenovo devices.
The USB flash drives in question are infected with a Reconyc Trojan malware. IBM did not divulge the exact number of infected flash drives it has sent out. It did, however, say that the drives contain Storewize initialisation tool for V3500 (2071 models 02A and 10A), V3700 (2072 models 12C, 24C and 2DC) and V5000 Gen 1 systems (both 2077 and 2078 models 12C and 24C). Those who got the Storewize system with a serial number beginning in 78D2 need not worry as this does not contain the malicious file.
The malicious code is copied to a temporary file on a Mac, Windows or Linux system as the Storewize tool is being launched. As ZDNet noted, the copied file doesn't actually do anything as the code is not executed during the initialization process. However, the thought that there is some form of malware living inside one's system is not good for business, particularly on IBM's side. The said malware is common in Russia and India but has been detected in other parts of the world as well.
IBM specified that the shipping number of the infected USB drives is 01AC585. Images of the said drives are posted in this report. Those who have received the infected flash drives have a little option on how to deal with the brouhaha. The most logical action, which is something IBM strongly recommends, is to get rid of the flash drive in a safe manner. The company suggests that the owner destroys the malware-infected USB drives completely to prevent them from falling into the hands of other people unaware of the bug. Another option is to delete the InitTool folder on the infected flash drive. Once the folder is erased, users can download a new initialization tool. They can get one from FixCentral.
Petya Ransomware: How It Works And How To Beat It
A new strain of Petya malware was used to execute a global cyber attack but experts have already made the necessary actions to prevent it from spreading further.
Mac Computers Aren’t Secure As We Thought, Ransomware Has Been A Creeping Problem
Mac users are being warned about new variants of malware that have been created specifically to target Apple computers.
Microsoft Officially Releases Visual Studio 2017 For Mac Computers
Visual Studio has been a Windows-only app until November last year when Microsoft released the first preview of Visual Studio for Mac. Interested developers can now get all of the core Visual Studio downloads for free from Microsoft.
Microsoft Windows 10 S Won't Let You Use Google Search
Microsoft unveils its new Windows 10 S aimed to cater to students' needs and inspire creativity. However, it won't let you use Google as your default browser.
A New Mac Malware Could Nastily Take Over Your Computer
The nasty malware is being spread through a targeted phishing campaign which has so far primarily targeted European users. Many of the emails containing the malicious software have baited users into downloading OSX/Dok.
MORE IN ITECHPOST
A simple, Yet Versatile, New Design for Chaotic Oscillating Circuitry Inspired by Prime Numbers
Researchers at Tokyo Institute of Technology have found a simple, yet highly versatile, way to generate "chaotic signals" with various features. The technique consists of interconnecting three "ring oscillators," effectively making them compete against each other while controlling their respective strengths and their linkages. The resulting device is rather small and efficient, thus suitable for emerging applications such as realizing wireless networks of sensors.
Tip Sheet: Recent Research on How DNA is Read and Copied
Two scientists at the Johns Hopkins University School of Medicine have unraveled aspects of how DNA organizes and preserves genetic information. Newly published research by Cynthia Wolberger, Ph.D., and James Berger, Ph.D., whose labs sit side by side, takes a closer look at how the puzzle pieces of DNA machinery fit together.