By Bob Pepalis, Izenda
Each month we take a look at recent technology news to spot the trends and advances in software and other industries. If you spot a piece of news that should be shared or have a comment, send it to me via email.
New Ransomware Forces Victims to Rant against Government
Don't underestimate the dangers of ransomware to your organization's data. Now a new version tries to force its victims to make incendiary statements. Criticizing a public official in the United States at most will get you into a flame war with others. But in countries like Saudi Arabia, submit to this extortion at your own peril. Criticizing the government or the royal family may result in jail time or physical punishment.
Unit 42 of Palo Alto Networks found the ransomware named RanRan on systems in Saudi Arabia and the Philippines, according to an article by Max Metzger in SC Magazine UK
. Before returning access to their data, the hackers demand that victims to create a "rebellious subdomain" that includes a protest against their government. They also have to put a ransomware.txt file on the subdomain.
The ransomware code wasn't considered to be very advanced, which should make it easier to combat.
They pointed out reasons including a lack of reliable vulnerability databases. Library vendors don't maintain security mailing lists. Release notes contain few details on security. Existing remediation strategies prove ineffective at mitigating the threats.
IBM Scientists Shrink Data Storage Down to the Atom
How small can data storage get? As of now, down to the atom. IBM researchers announced they stored data on a single atom, according to this article by Rebecca Linke of Computerworld.
A single bit takes about 100,000 atoms in a modern hard drive, making IBM's success significant.
IBM researchers managed to magnetize single atoms of holmium, a rare earth element. The poles of magnetism stand for the 1s and 0s in binary code. But you won't see this method used in smartphones or tablets. It's for research. The need for an ultra-high vacuum, low vibration and a super-low temperature make it impractical for commercial applications.
What might result is finding how to use a small number of atoms that can stay stable at room temperature for data storage. That would be a significant decrease in size from our old-fashioned hard drives that take up 100,000 atoms to store one bit.
Developers Don't Pass Go, They Prefer It
Google's Go open-source programming language continues to gain steam as more developers use it at work and outside of work.
The programming language team's 2016 survey showed
89% of respondents use Go. The results, just released by the team, also said 36% of those users also use Go at home and at work.
Most would recommend Go to other developers, according to Steve Francia, technical program manager for the team.
.NET Core Makes its Way to Different Hardware, Software Platforms
Microsoft's .NET Core is making its way to different hardware platforms. Work by the .NET community ports it to Internet of Things (IoT) platforms such as the Raspberry Pi 2 and 3.
The software giant says plenty about bringing its .NET Core to platforms in addition to Windows, such as macOS and Linux.
"We can confirm there is an ARM32 version of .NET Core out on GitHub," a Microsoft spokesman told IDG.
"It is an implementation of .NET Core that Samsung, Microsoft, and the community are working on. We are making it available to customers ... so they can use it on Raspberry Pis, IoT, etc."
Government Warning Against Using Leaked Info Called Reckless
WikiLeaks plans to release some information about hacking tools. But you might not want to use even if you need it, according to this story from IDG.
The organization says it plans to share information about CIA hacking tools to enable software fixes. The information comes from 8,700-plus documents WikiLeaks said they stole from the CIA. Even if released like this, possession of classified data is a crime. The White House press secretary told tech vendors to consider the consequences.
Organizations such as the ACLU and the Electronic Frontier Foundation cry foul at that pronouncement. Penalizing vendors or stopping them from fixing exposed vulnerabilities is reckless and a gross misuse of government power, attorneys with the organizations said.
At least one company revealed some good news on the security front. Intel Security released a tool to check for unauthorized code in a computer's low-level system firmware.
Intel Security created a module for CHIPSEC to detect rogue EFI binaries. Comparing a whitelist of binary files from a clean EFI image from their computer manufacturer to what CHIPSEC finds can reveal those rogue files.
Izenda recently announced the release of its 7 Series self-service business intelligence (Bl) and analytics platform, purpose-built for embedding for OEM use by software companies and solutions providers. This release further enhances lzenda's capabilities by empowering software companies to offer their end users intuitive real-time, self-service analytics inside their applications.