A bit of a short news recap this week, not a ton going on but still some worth while stuff for you. Hope you enjoy it!
- First, a privacy related story hot on the heels of the big Apple vs FBI encryption debate.Well, a newly drafted Senate bill would go as far as to prohibit unbreakable encryption and even go as far as force companies to comply with similar government requests. Move like this is hardly surprising, but let’s just hope it doesn’t go anywhere as it seems like another bill drafted by someone with utter lack of knowledge on technology.
- Read More @ http://hosted.ap.org/dynamic/stories/U/US_CONGRESS_ENCRYPTION?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2016-04-08-14-11-09
- Seattle police woke up a couple of privacy activists at 6:15AM in order to examine their equipment supposedly searching for child porn. In reality, it seems they were targets because they run a TOR Exit Node. Feds lack of love for TOR is hardly a secret, but this seems a bit much. Running an exit node is hardly proof of any wrongdoing.
- Read More @ https://yro.slashdot.org/story/16/04/10/2155217/seattle-police-raid-tor-using-privacy-activists
- There is some good news on the ransomware front. Looks like the “Petya” ransomware has been cracked, and a decryption method is available. This will surely be patched in the next release of “Petya” but at least for those affected by the current version, there is a way out
- Read More @ https://it.slashdot.org/story/16/04/11/1835227/experts-crack-petya-ransomware-enable-hard-drive-decryption-for-free
- Next, another ransomware “Jigsaw” has had a decryption tool created as well. Though this one is a bit less known than “Petya” still good news.
- Read More @ https://threatpost.com/decryption-tool-stifles-jigsaw-ransomware/117387/
- QBot, malware active since 2009 looks to have come back with some new tricks up it’s sleeve. Mainly it has employed several polymorphic techniques that help it avoid detection. It does rely on having a connection to a C2 server in order to do this, but it does make it a troublesome piece of malware to deal with if it can actively connect to its C2.
- Read More @ https://threatpost.com/qbot-malware-morphs-quickly-to-evade-detection/117377/