А тем временем в веникобритании назревает дечерчеллизация. Daily Mail: в Лондоне Черчилля «спрятали» от протестующих В Лондоне местные власти приняли решение защитить от участников антирасистских протестов памятники, пишет Daily Mail. Эта инициатива затронула, среди прочего, статую Уинстона Черчилля, на которой в прошлые выходные кто-то написал: «был расистом». Между тем движение Black Lives Matter отменило планировавшуюся ранее акцию протеста в Гайд-парке, опасаясь стычек с крайне правыми. https://russian.rt.com/inotv/2020-06-12/Daily-Mail-v-Londone-CHerchillya
Ютуб вторые сутки подряд настойчиво предлагает в рекомендациях клип группы "запрещенные барабанщики" - "убили негра". Я знаю текст наизусть, но ни разу в жизни на ютубе его не слушал и группой не интересовался. Ютуб, что ты хочешь этим сказать?
Городской совет американского Миннеаполиса единогласно принял решение о замене полицейского управления города "общественной системой безопасности". Почти 17% всех предложений о продаже недвижимости в Миннеаполисе появились за последние семь дней на завершающей стадии массовых беспорядков и появлении информации о расформировании полиции. _____ Вот так и появляются гетто #
Сегодня общался со знакомым с брайтон бич, говорит они даже не сунутся сюда, грабить нечего и отпор дадут.
Сыграем в нашу детскую игру - "Царь Горы" она зовётся? Блиц, скинет тебя с санок, на горе крутой. Да, такой он, милосердия неведующий нираз Жалуйся мамке и в Спортлото ))
А пока протестующие протестуя протестно демонстрируют протест, в сети стартовала тематическая рассылка троянов Spoiler: сабж A phishing email campaign asking you to vote anonymously about Black Lives Matter is spreading the TrickBot information-stealing malware. Started as a banking Trojan, the TrickBot has evolved to perform a variety of malicious behavior. This behavior includes spreading laterally through a network, stealing saved credentials in browsers, stealing Active Directory Services databases, stealing cookies and OpenSSH keys, stealing RDP, VNC, and PuTTY Credentials, and more. TrickBot also partners with ransomware operators, such as Ryuk, to give access to a compromised network to deploy ransomware. Capitalizing on the Black Lives Matter movement Threat actors commonly utilize current events as lures to trick people into opening their malicious emails. Such is the case with a new campaign discovered by cybersecurity organization Abuse.ch that pretends to be from "Country administration," asking recipients to 'Vote anonymous about "Black Lives Matter".' The email, shown below, states, "Leave a review confidentially about "Black Lives Matter" and then prompts recipients to fill out and return an attached document named 'e-vote_form_3438.doc.' Phishing email When a recipient opens the Word document, they will be greeted with a message stating that they need to click on the 'Enable Editing' and 'Enable Content' buttons to view the contents properly. Malicious word doc Once they click on these buttons, the Word document will run macros that download a malicious DLL to the computer and execute it. This DLL is the TrickBot trojan that, when executed, will download further modules to the infected computer to steal files, passwords, security keys, spread laterally throughout the network, and allow other threat actors to install ransomware. Due to this, a TrickBot trojan can be a devastating infection regardless of whether you are a corporate victim or a home user. It is important to remember that malware developers and distributors commonly become more active during significant moments in history and political unrest. This dramatic increase in phishing and cyberattacks related to COVID-19, and it is not surprising that we also see it now. Be extremely careful with any emails you received, especially those that are politically or socially motivated, as they could be malware in disguise. какой протест - такая и рассылка А в штатовском городке Knoxville положили городскую сеть Spoiler: Knoxville The City of Knoxville, Tennessee, was forced to shut down its entire computer network following a ransomware attack that took place overnight and targeted the city's offices. Knoxville has a population of over 180,000, it's Tennessee's third-largest city after Nashville and Memphis, and it's also part of the Knoxville Metropolitan Statistical Area, with a reported population of almost 870,000 in 2015. Full network shutdown Computers on Knoxville's network were encrypted overnight, with the attack being noticed by employees of the city's fire department around 4:30 AM, June 11, according to Chief Operations Officer David Brace. "Please be advised that our network has been attacked with ransomware," a notice sent to city employees on Thursday morning reads. "Information Systems is currently following recommended protocols. This includes shutting down servers, our internet connections, and PCs. Please do not log in to the network or use computer applications at this time." While the City of Knoxville official website was still down at the time this article was published, Knox County government computer operations have not been affected in the attack. City Court sessions have also been canceled after the ransomware attack and the computer network shut down, with court dates to be reset once the systems are restored. Knoxville network down The city's Fire Department and Police Department operations are not affected following the incident according to spokesmen D.J. Corcoran and Scott Erland, but personnel cannot access the city's network. Knox County Mayor also issued a statement on the city's ransomware attack on Twitter saying that "[c]yber attacks can happen to anyone or any government no matter how good the defense is. In a lot of cases it’s not a matter of if but a matter of when." No personal information was stolen "No credit card information is stored by the City, so individuals who have made any online reservations of City facilities are not believed to be at risk," Knoxville spokesman Eric Vreeland told WBIR. The city reported the ransomware attack o the Federal Bureau of Investigation (FBI) and is currently working with the Tennessee Bureau of Investigation as part of an ongoing incident investigation. "City offices and services are open and available as usual, though visitors to City offices may encounter some inconveniences," a city spokesperson told WATE 6. "City departments are adjusting accordingly to address the needs of residents and businesses.” Chief Operations Officer David Brace said that the threat actors behind this attack have also asked for a ransom to be paid per knox news, but he refused to give the exact amount. At the moment, the ransomware group responsible for this attack is still unknown but we will update the article as soon as we have more information. Knox County was affected by another cyberattack in May 2018 when the Knox County Government in Knoxville had some of its servers knocked offline during a local election following a distributed denial-of-service (DDoS) attack.