Tag Archive for 2020

10 More Times McAfee Was in the Spotlight

Updated – 06/24/2021 – John McAfee was found dead in a Spanish jail on 06/23/2021 from an apparent suicide. The Guardian reports his body was found hours after Spain’s highest court approved his extradition to the United States. Mr. McAfee faced federal criminal charges for tax evasion. The charges carried a prison sentence of up to 30 years.

Updated – 10/26/2020McAfee’s second IPO did not go as planned. IPO shares of MCFE were pegged to open at $20.00 per share. It was only able to hit a high of $19.50 per share. Barron’s called the McAfee IPO “a broken deal.”

10 More Times McAfee Was in the SpotlightFollowers of the Bach Seat still recognize the name, McAfee. John McAfee founded the anti-malware company McAfee Associates in 1987. By 1994, he’d been forced out after telling everyone that the Michelangelo Virus was going to smash up the world’s computers on March 6, 1992. It didn’t. He looked stupid.  McAfee Associates debuted on Nasdaq in October 1992. Even today, McAfee anti-malware still protects 500 million people’s computers. 

McAfee anti malwareMcAfee was bought by Intel in August 2010 for $7.6 billion. Intel (INTC) had hoped to integrate security into the company’s chips. Intel renamed McAfee – Intel Security in January 2014. Intel lost interest in running the cybersecurity company and in September 2016 sold 51% of the security firm for $4.2 billion to VC’s TPG Global, LLC, and Thoma Bravo. The VCs resurrected the McAfee brand and filed to go public in September 2020.

Now Mr. McAfee is back in the news too. The former 2016 and 2020 Libertarian Party candidate for U.S. president was arrested at the Barcelona airport, boarding a flight to Istanbul with a British passport. He is awaiting extradition to the U.S. on federal charges, including anti-fraud provisions and tax evasion.

Uncle Sam wants youThe U.S. Department of Justice and the Securities and Exchange Commission filed criminal charges against him. The DOJ has charged with tax evasion they claim Mr. McAfee did not file tax returns between 2014 and 2018. McAfee was said to have received up to $23 million in compensation in the form of tokens, ethereum, and bitcoin. The SEC has accused McAfee and his bodyguard, Jimmy Watson Jr., of “illegally promoting initial coin offerings (ICOs).

The SEC maintains that “McAfee promoted multiple ICOs on Twitter, allegedly pretending to be impartial and independent even though he was paid more than $23 million in digital assets … denied receiving any compensation from the issuers … McAfee made other false and misleading statements … he had personally invested in some of the ICOs and that he was advising certain issuers.

CryptocurrencyThe SEC complaint against Mr. Watson alleges that he, “assisted Mr. McAfee by negotiating the promotion deals with the ICO issuers, helping Mr. McAfee cash out the digital asset payments for the promotions and … having his then-spouse tweet interest in the ICO. Mr. Watson was allegedly paid at least $316,000 for his role .. investors were left holding digital assets that are now essentially worthless.

This is not McAfee’s first time in the spotlight.

1 – April 2012 – Mr. McAfee’s compound in Belize, was raided by the Belize Police Gang Suppression Unit on suspicion it was a front for making meth. Police discovered an arsenal of weapons and a drug lab that he apparently used in an attempt to purify MDPV, a drug that’s said to enhance sexual pleasure.

John McAfee2 – November 2012 –  Mr. McAfee was wanted by Belize Police for questioning in the murder of his neighbor, American expatriate Gregory Faull, 52. He refused to speak with authorities about the case, making him a fugitive in the eyes of Belize authorities. He disappeared for a month.

3 – December 2012 –  Mr. McAfee was arrested in Guatemala for illegally crossing the border from Belize in an attempt to find asylum from police in Belize. He was about to be deported back to Belize when he faked a heart attack, telling ABC News “Sure, I faked it … What would you have done?” His attorney was able to obtain a stay of deportation to Belize for him and Guatemalan authorities deported him to Miami.

4 – June 2013 – Mr. McAfee released an NSFW video on YouTube slamming the McAfee product.

5 – November 2013 – Mr. Faull’s family filed a wrongful death suit against Mr. McAfee. In June 2018 a Florida court issued a default ruling against (PDF). The court ordered Mr. McAfee to pay the Faull family more than $25 million.

under the influence.6 – August 2015 – Mr. McAfee was arrested by the Tennessee Highway Patrol. He was arrested for DUI and possession of a handgun while under the influence. McAfee blamed Xanax. He told CNBC, “I had just that morning received a prescription for Xanax from a doctor, I’d never taken them before.” 

7 – May 2016 – He was appointed chief executive chairman of MGT Capital Investments. The penny stock mobile gaming company became a “technology company” under McAfee. MGT surged more than 1,200% after the announcement it would transform into a cybersecurity company led by John McAfee. MGT changed its name to John McAfee Global Technologies, Inc.  

Bitcoin miningIt was then when McAfee decided to move to the mining of bitcoin and cryptocurrencies. He said that this would help MGT to increase their funds as well as their expertise in dealing with blockchains. Resulting in an SEC subpoena and stock crash and delisting from the NYSE.

8 – July 2017 – Mr. McAfee in full cryptocurrency hucksterism mode tweeted about how cryptocurrencies like Tron (TRX), Verge (XVG) and Reddcoin (RDD) could revolutionize the world. He even promised to do something NSFW to himself if cryptocoin Bitcoin (BTC) didn’t hit $500K within three years.

9 – Mr. McAfee taunted U.S. regulators – January 2019 he tweeted he hasn’t filed a tax return for eight years because “taxation is illegal.” June 2019  – He tweeted from Cuba –  promoting BeatzCoin (BTZC) – “Yes SEC, I’m promoting. Fucking come and get me.

10 – July 2019 –  The Dominican Republic military arrested Mr. McAfee and associates in Puerto Plata after they found several large-caliber weapons without proper documentation. He was deported to London. After landing in London he asked his Twitter followers whether he should also campaign to be British prime minister.

rb-

John McAfee had $100 million when he left McAfee. Now he broke, paranoid, and a tax dodger. Sound like a good candidate for U.S. President.

What next? Prison? Up to 30 years if DOJ has its way. The SEC, wants him to pay back his profits and to ban him from serving as an officer or director to any company that sells securities.  Let’s see if he can worm his way out of this.

 

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Smart Backpacks

Smart BackpacksI first wrote about Google’s Project Jacquard which weaves conductive threads to create touch-responsive clothing in 2015. Since then COVID has changed the world. As a result of the pandemic, Gartner found that 88% of businesses mandated or encouraged all their employees to work from home as COVID-19 spread and 97% of the firms canceled all work-related travel.

Despite the growth in WFH, Google’s Project Jacquard has announced its latest innovation: two new smart backpacks developed with luggage maker Samsonite. Unlike the previous Jacquard backpack co-created with Yves Saint Lauren with a stupid $995 price tag, The Samsonite version has prices low enough for normal people to actually consider buying one.

The new Google Jacquard “Konnect-i Slim” smart backpack begins at $199.99. The slightly larger “Konnect-i Standard” will run you $219.99. Both available are through Samsonite’s webshop. Both are also water-repellent, and they have the same materials and feature list.

Besides smart backpacks, Google has partnered with Levi to make the Trucker jacket with Jacquard and Adidas to create the GMR insoles that use Jacquard.

Connect the smart backpacks

Jacquard controlsTo connect the smartbackpack to your iOS or Android phone, you’ll have to stuff a thumb-sized dongle into the backpack’s strap. According to Engadget, the module syncs with your phone via Bluetooth. The functionality seems pretty limited. Through the Jacquard app, you can define what brushing up and down or double-tapping the strap does. You can skip or pause your music, ask Assistant a question or drop pins to remember places you’ve been, or take a selfie. An LED on the strap will light up to alert you to notifications.

Jacquard relies on a small Micro-USB-charged Bluetooth puck which contains most of the electronic components. Google reduced the physical footprint from a large USB drive to something roughly the size of an SD card. It’s charged using magnetic pins, and data transfer is possible with a microUSB connector. The removable Jacquard Tag lasts up to two weeks on a charge and is separately rechargeable. The Jacquard Tag module still needs to be removed before washing.

The Samsonite Jacquard backpacks require an internet connection, a compatible Android or iOS phone, the Jacquard app, and a Google account for access to Jacquard features. For Android, you need a supported phone running Android 6.0.1 or newer. For iOS, you need an iPhone 6 or newer running iOS 11 or newer.  Data usage fees may apply. 

rb-

Ambient computingAs a product still don’t get it – as wearable tech – it seems to me that the $200 iWatch can do more than the backpacks. But as another way to invade our lives and steal our data – it makes sense.

Google told CNet it could add gestures on top of voice into Google Assistant – “… as a new direction for Google’s AI … Bringing these nonverbal cues into the conversation with technology is a key opportunity …” 

Combining AI with Google’s security and privacy problems makes me uneasy. In this uber-google world, will they give us the best result or the one that is paid for? 

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Seven Social Engineering Classics

Seven Social Engineering ClassicsSocial engineering describes various non-technical attack techniques cybercriminals use to manipulate users. The attackers hope the user will bypass security or other business process protocols, perform harmful actions, or disclose sensitive information. Beware of these social engineering classics.

Business Email Compromise

Business Email CompromiseDon’t get fooled by official-looking emails even though the email appears to be work-related. Subject lines such as “Invoice Attached” or “Here’s the file you needed” might be a social engineering classic. To be sure, you should hover your cursor over email addresses and links before clicking to see if the sender and type of file are legitimate. BEC is the most costly form of cybercrime. It stems from faked emails called “Business Email Compromise” or BEC scams. A typical BEC scam involves phony emails in which the attacker spoofs a message from an executive at a company and tricks someone into wiring funds to the fraudsters.

VishingVishing

Corporate phone systems are often set up to forward voice mail audio files to employees’ inboxes. While this is convenient, forwarding the files can be risky. It makes it harder to determine if the email is phony or legit. Since 2014, scammers have been installing malicious software through emails designed to look like internal voicemail messages, making vishing a social engineering classic.

With vishing, cybercriminals use an urgent or alarming voicemail message to try to get potential victims to call back with their personal information. Fake caller ID information is often used to make the calls appear to be from a legitimate organization or business.

Free Stuff, a social engineering classic

Free pizzaFree Stuff is one of the oldest social engineering classics. Most people can’t resist free Stuff, from pizza to software downloads, and they will click just about any link to get it. Of course, nothing is truly free. Sophisticated attackers might send a link to genuine free software, but they’re sending you through their website, which means you may get infected or compromised.

Baiting

Baiting is a variant of “Free Stuff.” The attacker hopes to trick their victims into executing code by piquing their curiosity or convincing them to run hardware or software with hidden malware. For example, innocent-looking USB sticks handed out at a conference or casually “dropped” in the parking could contain malware. They then detonate when the curious user plugs it into their PC. This is how Stuxnet attacked the Iranian nuclear program.

Quid pro quo social engineering classic

Seven Social Engineering ClassicsAnother version of “Free Stuff.” In Latin, Quid pro quo means “something for something.” In exchange, the attacker offers something of genuine worth to the victim and will work their way into the target’s network. An example: The attacker poses as tech support and solves a problem for you, then convinces you to type in a line of code that serves as a “backdoor.” On the other hand, it may be as simple as trading a candy bar in exchange for a password!

Waterholing

This attack plants malware on a website you and your colleagues frequently visit. The next time you surf the site, the malware—such as a remote-access Trojan or RAT—is downloaded to your computer. And just like that, the attacker can begin exfiltrating data from your employer’s network.

Pretexting

Pretexting is another form of social engineering in which attackers focus on creating a fabricated scenario that they can use to try to steal their information. It is a true con game. It relies on the crook fostering a sense of trust in the victim.

Pretexting

Pretexting can also impersonate co-workers, police, banks, or tax authorities. It pretends to be any individual who could have perceived authority or right-to-know in the targeted victim’s mind. In some cases, all that is needed is an authoritative voice, an earnest tone, and an ability to think on one’s feet to create a pretext scenario.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Why Do We Call Them Uppercase?

Why Do We Call Them Upper Case?The typical U.S. user can have up to 130 online accounts and hopefully, they have 130 different passwords on these accounts. When setting up the 130 different passwords on these 130 accounts – you have undoubtedly seen the hate message

Password must include at least one upper case letter, one lower case letter, a number, and a special character.

Why is it called an uppercase or lowercase letter?

It is Gutenberg’s fault

Printing pressThe story goes back to Gutenberg‘s innovation of moveable type and the printing press (1450 A.D.). With Gutenberg’s printing press the compositor (“person who sets the type or text for printing”) stored the individual pieces of metal type in boxes called cases. The smaller letters (along with the type for punctuation and spaces), which were used most often, were kept in a lower case that was easier to reach. Capital letters, which were used less frequently, were kept in an upper case. Because of this old storage convention, we still refer to small letters as lowercase and capital letters as uppercase.

Upper print type case

Lower  print type case

Notice the uppercase letters had slots of equal size, while the lowercase letters (more often used) had slots proportional to their frequency of use (in English). 

The terms quickly became convention, because then a typesetter from one press could quickly adapt to another press. Now the terms are so generic that they are used even in handwriting instruction.

 

No more uppercase in passwords

use longer passwords or passphrases of 15 or more characters without requiring uppercase, lowercase or special charactersFortunately, the tide against using case as a password complexity factor has turned. The National Institute of Standards and Technology (NIST) now recommends everyone use longer passwords or passphrases of 15 or more characters without requiring uppercase, lowercase or special characters. NIST 800-63B says enforcing unnecessary password complexity requiring a mix of special characters, numbers and uppercase letters is a practice that can stop.

rb-

The distinction between uppercase and lowercase letters doesn’t exist in all languages, though. Certain Eastern and Asian writing systems, including certain Indian, Chinese, and Japanese alphabets, do not distinguish between uppercase and lowercase letters.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Under Water Data Center Resurfaces

Under Water Data Center Resurfaces– Updated – 07/07/2024 – Microsoft has discontinued its efforts to build a data center on  the sea floor. “I’m not building subsea data centers anywhere in the world,” Noelle Walsh, the head of Microsoft’s Cloud Operations and Innovation division, told DatacenterDynamics.

Two years ago, Microsoft sank a data center half a mile off Scotland’s Orkney Islands under 117 feet of North Sea water. Earlier this week, they dredged the shipping container-size data center of 864 servers and 27.6 petabytes of storage back to the surface. Now that it has resurfacedMicrosoft (MSFT) researchers are studying how it survived its trip into Davy Jone’s locker and the trip can tell us about land-loving data centers.

Lower failure rate

Microsoft logoTheir first conclusion is that the cylinder with servers packed in like sardines had a lower failure rate than a conventional data center. Only eight out of the 855 servers on board had failed. Ben Cutler, a project manager in Microsoft’s Special Projects research group who leads Project Natick, said in a presser,

Our failure rate in the water is one-eighth of what we see on land.

The MSFT team is speculating that the greater reliability may be connected to the fact that there were no humans on board.  Microsoft’s John Roach explained:

people bump and jostle components,The team hypothesizes that the atmosphere of nitrogen, which is less corrosive than oxygen, and the absence of people to bump and jostle components, are the primary reasons for the difference. If the analysis proves this correct, the team may be able to translate the findings to land data centers.”They believe that land-loving data centers often run into issues like corrosion from oxygen, humidity and temperature fluctuations. and bumps and jostles from people who replace broken components.

Microsoft "Northern Isles"

Alternate power sources for data centers

Project Natick is also about addressing the huge energy demands of data centers as more and more of our data is stored in the cloud. All of Orkney’s electricity comes from alternate power sources, wind and solar power, which was not a problem for the underwater data center “Northern Isles.” Spencer Fowers, Microsoft’s Special Projects research group principal member of technical staff,

We have been able to run really well on what most land-based data centers consider an unreliable grid.

Not only can data centers run on alternative power, but they may not need the huge investment in dedicated buildings, rooms of batteries, and racks of UPS’s. Microsoft’s Fowers speculates;

We are hopeful that we can look at our findings and say maybe we don’t need to have quite as much infrastructure focused on power and reliability.

Underwater data center availability

Microsoft has clammed up about the availability of an underwater data center SKU, but MSFT’s Cutler is confident that it has proved the idea has value;

We think that we’re past the point where this is a science experiment … Now it’s simply a question of what do we want to engineer – would it be a little one, or would it be a large one?

rb-

The drive to autonomous vehicles is just one case that explains MSFT’s idea of micro-self-contained data centers vs. mega-data centers. Even with 5G –  computing power will have to move closer to the user, to the edge of the network. How much latency do you want as your autonomous Tesla, traveling 70 MPH tries to figure out where it is?

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.