Ransomware Victims Urged to Report Infections to Federal Law Enforcement
The FBI urges victims to report ransomware incidents to federal law enforcement to help us gain a more comprehensive view of the current threat and its impact on U.S. victims.
What Is Ransomware?
Ransomware is a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified ransom is paid. Ransomware is typically installed when a user clicks on a malicious link, opens a file in an e-mail that installs the malware, or through drive-by downloads (which does not require user-initiation) from a compromised Web site.
Q.I have been getting spam invitations to my iOS calendar recently. They come from Chinese accounts and their subjects are for super-discounted Ray-Bans and the like. Is there any solution to this?
A. Many iCloud users have recently reported an influx of spam in the form of iOS calendar events and iCloud Photo Sharing invitations. While the delivery mechanism is different, the calendar and photo-sharing invitations traffic in the same old suspect offers for cheap goods as the junk mail and text messages that came before. Unlike those older forms of spam, which can be filtered, blocked or deleted, invitation spam usually offers Accept, Decline (or Maybe) as your options — all of which notify the spammer that your account is live and ready for more unsolicited offers.
iPhone aficionados at iDeviceHelp and EverythingApplePro have discovered yet another way for someone who has physical access to your phone to access your messages, photos, and contacts, even if the phone is locked with both a passcode and properly configured TouchID.
The demonstration shows the bypass on an iPhone 7 using the iOS 10.2 beta 3, as well as an iPhone 4 using iOS 8 and even on an iPad, showing that this flaw affects any iDevice that can receive Facetime or phone calls.
There is a growing desire to keep one’s messages private. Some users are concerned about hackers, or worry about foreign or domestic government surveillance, but most people just agree with the general principle that what you say in your chat conversations ought to stay between you and the people you chat with.
It’s not a pleasant idea to think that your messages could be archived for perpetuity on a large company’s server or analyzed by some algorithm. The quest for privacy has birthed a whole generation of apps that promise to give you exactly that. Services like Telegram and Signal have turned the phrase “end-to-end encryption” into a popular discussion. We’re here to help you figure out what this is all about and which apps to try.
Panopto is used to capture Audio, Video, and screen content for live events, lectures, and student assignments throughout the law school. We recently started using the University Single User Sign-in Process. Which sounds more complicated than it really is.
In this short How-to webinar I demonstrate just how easy it is to sign into Panopto. Be sure to contact the IT department (firstname.lastname@example.org) for scheduled recordings and user access.
PollEverywhere has some features you may not know exist. The timer is a good example of a feature that could be really powerful in the classroom setting where students need to think fast in order to demonstrate their understanding of material.
In this Quick How-to Webinar I will demonstrate to you how to use the timer with various example questions.
iClicker is a dynamic solution for engaging, assessing, and keeping students involved in any classroom material. The law school has a department set of 80 clickers available for you to use in your class.
In this Quick How-to Webinar I will demonstrate to you how to get started using iClickers, how to request to use the Law School’s department set, how to submit iClicker as a course material to the bookstore, and how to make sure your Polls are up and running in anonymous mode.