5 episodes

This is the HUB for the Latest Tech News and Trends, IOT and Cybersecurity information around the Globe, Entertainment News and Fight game Breakdowns is been discussed and dissect.

Femiantech femian

    • News

This is the HUB for the Latest Tech News and Trends, IOT and Cybersecurity information around the Globe, Entertainment News and Fight game Breakdowns is been discussed and dissect.

    UFC 263 Isreal Adesanya VS Marvin Vittori

    UFC 263 Isreal Adesanya VS Marvin Vittori

    ufc 263 preview

    isreal adesanbya vs marvin vittori 2

    davinson figuorado vs brando moreno 2

    nate diaz vs leon edward

    main card

    Event: UFC 263: Adesanya vs. Vettori 2

    Date: Sat., Jun. 12, 2021

    Start time: 10:00 PM ET (Main card)

    8:00 PM ET (Prelims card)

    Total Fights: 13

    Main Event: Israel Adesanya vs. Marvin Vettori

    Venue: Gila River Arena

    Location: Glendale, Arizona, USA

    The Ultimate Fighting Championship returns to the Gila River Arena for UFC 263 in Glendale, Arizona, USA. 

    A middleweight match between Israel Adesanya and Marvin Vettori is set to headline this event. “Adesanya vs. Vettori 2” 

    will take place on Saturday, Jun. 12, in 22 days.



    On Saturday night, we’ll also watch Deiveson Figueiredo taking on Brandon Moreno in an great match. 

    Leon Edwards vs. Nate Diaz are targeted for a massive clash that’s also slated to take place at UFC 263. 

    Other announced fights include Demian Maia vs. Belal Muhammad; and Paul Craig vs. Jamahal Hill.



    So who is fighting on UFC 263 on June 12th? Let’s take a look!

    • 38 min
    Part 2 - NOTPETYA...THE DEVERSTATING EFFECT OF CYBER ATTACK ON A GLOBAL LEVEL - EP.4

    Part 2 - NOTPETYA...THE DEVERSTATING EFFECT OF CYBER ATTACK ON A GLOBAL LEVEL - EP.4

    Petya and NotPetya are two related pieces of malware that affected thousands of computers worldwide in 2016 and 2017. Both Petya and NotPetya aim to encrypt the hard drive of infected computers, and there are enough common features between the two that NotPetya was originally seen as just a variation on a theme. But NotPetya has many more potential tools to help it spread and infect computers, and while Petya is a standard piece of ransomware that aims to make few quick Bitcoin from victims, NotPetya is widely viewed as a state-sponsored Russian cyberattack masquerading as ransomware.



    We talked about what petya ransomware is, what it does and how we can better mitigate against it.

    NotPetya virus

    The NotPetya virus superficially resembles Petya in several ways: it encrypts the master file table and flashes up a screen requesting a Bitcoin ransom to restore access to the files. But there are a number of important ways in which it's different, and much more dangerous:


    NotPetya spreads on its own. The original Petya required the victim to download it from a spam email, launch it, and give it admin permissions. 
    NotPetya exploits several different methods to spread without human intervention. The original infection vector appears to be via a backdoor planted in M.E.Doc, an accounting software package that's used by almost every company Ukraine.  Having infected computers from Medoc’s servers, NotPetya used a variety of techniques to spread to other computers, including EternalBlue and EternalRomance, two exploits developed by the United States NSA to take advantage a flaw in the Windows implementation of the SMB protocol. It can also take advantage of a tool called Mimi Katz to find network administration credentials in the infected machine's memory, and then use the PsExec and WMIC tools built into Windows to remotely access other computers on the local network and infect them as well. 
    NotPetya encrypts everything. The NotPetya malware goes far beyond the original Petya trick of encrypting the master boot record, going after a number of other files to seriously screw up your hard drive. 
    NotPetya isn't ransomware. This is in fact the most shocking — and important — thing about NotPetya. It looks like ransomware, complete with a screen informing the victim that they can decrypt their files if they send Bitcoin to a specified wallet. For Petya, this screen includes an identifying that they're supposed to send along with the ransom; the attackers use this code to figure out which victim just paid up. But on computers infected with NotPetya, this number is just randomly generated and would be of no help in identifying anything. And it turns out that in the process of encrypting the data, NotPetya damages it beyond repair.

    So what's NotPetya's real purpose? The fact that it saw an abrupt and radical improvement in efficiency over its Petya ancestor implies a creator with a lot of resources — a state intelligence or cyberwarfare agency, say. 

    • 34 min
    Part - 1 NOTPETYA...THE DEVERSTATING EFFECT OF CYBER ATTACK ON A GLOBAL LEVEL - EP.3

    Part - 1 NOTPETYA...THE DEVERSTATING EFFECT OF CYBER ATTACK ON A GLOBAL LEVEL - EP.3

    Petya and NotPetya are two related pieces of malware that affected thousands of computers worldwide in 2016 and 2017. Both Petya and NotPetya aim to encrypt the hard drive of infected computers, and there are enough common features between the two that NotPetya was originally seen as just a variation on a theme. But NotPetya has many more potential tools to help it spread and infect computers, and while Petya is a standard piece of ransomware that aims to make few quick Bitcoin from victims, NotPetya is widely viewed as a state-sponsored Russian cyberattack masquerading as ransomware.

    We talked about what petya ransomware is, what it does and how we can better mitigate against it.

    NotPetya virus
    The NotPetya virus superficially resembles Petya in several ways: it encrypts the master file table and flashes up a screen requesting a Bitcoin ransom to restore access to the files. But there are a number of important ways in which it's different, and much more dangerous:


    NotPetya spreads on its own. The original Petya required the victim to download it from a spam email, launch it, and give it admin permissions. NotPetya exploits several different methods to spread without human intervention. The original infection vector appears to be via a backdoor planted in M.E.Doc, an accounting software package that's used by almost every company Ukraine.  Having infected computers from Medoc’s servers, NotPetya used a variety of techniques to spread to other computers, including EternalBlue and EternalRomance, two exploits developed by the United States NSA to take advantage a flaw in the Windows implementation of the SMB protocol. It can also take advantage of a tool called Mimi Katz to find network administration credentials in the infected machine's memory, and then use the PsExec and WMIC tools built into Windows to remotely access other computers on the local network and infect them as well.
    NotPetya encrypts everything. The NotPetya malware goes far beyond the original Petya trick of encrypting the master boot record, going after a number of other files to seriously screw up your hard drive.
    NotPetya isn't ransomware. This is in fact the most shocking — and important — thing about NotPetya. It looks like ransomware, complete with a screen informing the victim that they can decrypt their files if they send Bitcoin to a specified wallet. For Petya, this screen includes an identifying that they're supposed to send along with the ransom; the attackers use this code to figure out which victim just paid up. But on computers infected with NotPetya, this number is just randomly generated and would be of no help in identifying anything. And it turns out that in the process of encrypting the data, NotPetya damages it beyond repair.

    So what's NotPetya's real purpose? The fact that it saw an abrupt and radical improvement in efficiency over its Petya ancestor implies a creator with a lot of resources — a state intelligence or cyberwarfare agency, say. 

    • 30 min
    UFC vegas24 fight night EP.2

    UFC vegas24 fight night EP.2

    Oh boy, its another fight game this weekend for the lovers of MMA. We have Robert whittaher vs Kelvin Gastelum  in a five 5 round main event fight.

    Kelvin, its a shot at redemption and it could put him in a good position on the rankings moving forward. As for Robert, its not much of anything other than to take his claim to the next shot for the title. UFC tags it Unfinished business. But its gringy to me if i may say, But anyways lets enjoy the breakdown.

    • 23 min
    UFC 261 and UFC fight night preview...vittori vs holland EP.1

    UFC 261 and UFC fight night preview...vittori vs holland EP.1

    Here is the breakdown of the marvin vittori and kelvin holland fight....

    ufc 261 preview of champion kamaru usman and jorge masvida in the welterweight division.  

    • 43 min

Top Podcasts In News

The Rest Is Politics: US
Goalhanger
Serial
Serial Productions & The New York Times
The Indo Daily
Irish Independent
The Rest Is Politics
Goalhanger Podcasts
Path to Power
Matt Cooper & Ivan Yates
The David McWilliams Podcast
David McWilliams & John Davis