{"id":226633,"date":"2017-07-08T19:18:40","date_gmt":"2017-07-08T23:18:40","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/data-sheetsaturday-july-8-2017-fortune.php"},"modified":"2017-07-08T19:18:40","modified_gmt":"2017-07-08T23:18:40","slug":"data-sheetsaturday-july-8-2017-fortune","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nihilism\/data-sheetsaturday-july-8-2017-fortune.php","title":{"rendered":"Data SheetSaturday, July 8, 2017 &#8211; Fortune"},"content":{"rendered":"<p><p>    A great thing about hacking, if you're    Vladimir Putin, is it's so hard to prove. Just look at the    recent \"NotPetya\" attacks      that fried computers in the Ukraine    and around the world: It's two weeks later and     still      there's no    consensus among    security experts if responsibility lies with Russia, vigilante    hackers, or someone else.  <\/p>\n<p>    This attribution issue offers tactical    advantages for the Kremlin such as letting Russia use hacking    to make mischief in ways that are even more subtle than its    assassins' signature     polonium tea    . But hacking also lets Russia further    its strategic goal of spreading \"dezinformatsiya.\"      <\/p>\n<p>    As the New    York Times explained last    summer, \"The fundamental purpose of dezinformatsiya, or Russian    disinformation, experts said, is to undermine the official    version of events  even the very idea that there is a true    version of events  and foster a kind of policy paralysis.\"      <\/p>\n<p>    Hacking is an ideal vehicle for    \"dezinformatsiya\" because in many cases it really is hard to    establish a \"true version of events.\" And in a stroke of good    fortune for the Russians, the U.S. has elected a President who    seems to believe, when it comes to cyber attribution, that hard    is the same as impossible.  <\/p>\n<p>    \"Nobody really knows,\" President Trump     said    in Poland this    week, casting doubt on whether Russia had indeed meddled in the    U.S. electoral process. He made the statement despite stacks of    intelligence reports that the Kremlin did exactly that, and    even though Congressional leaders from both parties don't    dispute the meddling either.  <\/p>\n<p>    Trump's behavior amounts to a kind of    intellectual nihilism that holds that, if even a few people    deny a fact, it's impossible to say it's true. By this logic,    we should also respect those who say 9\/11 was an inside job,    the moon landing was staged and creationism is real. Except    that those people are flat-out wrongand so is Trump when it    comes to Russia's election hacking.  <\/p>\n<p>    But for Putin, the former KGB man,    Trump's eagerness to dive down Russia's rabbit holes of lies    and doubt (on display again in the     screwy statements     that followed    Trump and Putin's two-hour meeting) are a giant strategic    success. Russia's dezinformatsiya campaign couldn't be going    any better.  <\/p>\n<p>    Jeff John Roberts   <\/p>\n<p>    @jeffjohnroberts   <\/p>\n<p>    <a href=\"mailto:jeff.roberts@fortune.com\">jeff.roberts@fortune.com<\/a>       <\/p>\n<p>    Welcome to the Cyber Saturday edition of    Data Sheet, Fortune'     s      daily tech newsletter. You    may reach    Robert Hackett via     Twitter     , Cryptocat     ,         Jabber      (see OTR fingerprint on my     about.me     ), PGP encrypted email (see public key    on my Keybase.io     ),         Wickr     ,     Signal     , or however you (securely) prefer.     Feedback    welcome.  <\/p>\n<\/p>\n<p>        Apple's bug bounty a        bust: It turns out        $200,000 isn't enough. That's the top amount Apple offered        to pay hackers to disclose critical iOS exploits under the        iPhone maker's bug bounty program, yet no one is coming        forward to claim the reward. The likely explanations are        that iOS vulnerabilities can fetch more than $1 million on        the black market, and that Apple is unwilling to provide        white hat hackers with \"developer devices\" to tinker with.        (        Motherboard         )              <\/p>\n<p>        Power plants in peril!        A pair of reports suggest        hackers from a nation state (likely Russia) have breached        the computer systems of more than a dozen power stations,        including nuclear facilities, across the U.S. The breaches        are believed to have been carried out with malware that        compromised engineers' passwords. All this raises the        specter of a major attack that could shut down portions of        the U.S. power grid and damage surrounding infrastructure.        (        Bloomberg         ,                 New York Times        )               <\/p>\n<p>        Android ad scam alert        : Why are bad guys so attracted to        the online ad industry? Presumably because there's good        money it. The latest example comes via reports of CopyCat,        a form of malware that spread to 14 million Android devices        last year. The criminals cashed out by installing the        malware and then pocketing revenue tied to millions of ad        displays and commissions for app installations. (        Fortune         )      <\/p>\n<p>        A cool scene & poor        hygiene: That's a very        short summary of an advice guide for women who plan to        attend DEF CON in Vegas (the advice could apply to this        month's other Vegas hacker convention, Black Hat). Key        phrase: \"How I, a woman, an engineer, and a hard introvert        with a low tolerance for dickheads, recommend approaching        DEF CON.\" (Breanne Boland blog)              <\/p>\n<p>        Share today's        Data Sheetwith a friend:      <\/p>\n<p>                <a href=\"http:\/\/fortune.com\/newsletter\/datasheet\/\" rel=\"nofollow\">http:\/\/fortune.com\/newsletter\/datasheet\/<\/a>              <\/p>\n<p>                Looking for previous Data Sheets?        Click here         .              <\/p>\n<\/p>\n<p>        So what         exactly          happened to all those computers        during Petya\/NotPetya's recent rampage? Fortune's Robert        Hackett has a nice summary of a cartographer's video that        shows just how the malware munches up the code of a victim        machine and then injects others nearby. It's kinda like the        Walking Dead - but with Windows machines.              <\/p>\n<p>        Within minutes of setting the        malware into motion on one of the machines, the infection        spreads across the network and runs its destructive course.        One by one, White's dummy files are encrypted, rendering        them into inaccessible, alphanumeric gobbledygook.                 Read more on                 Fortune.com        .      <\/p>\n<\/p>\n<p>        What School has the Best Cyber        Security Program?         Universities are revamping        curriculums to reflect the growing importance of cyber        skills in the world and the workplace. CSO has a nice        rundown of what Carnegie Mellon, Johns Hopkins and others        are offering. (CSO)              <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/fortune.com\/2017\/07\/08\/data-sheet-saturday-july-8-2017\/\" title=\"Data SheetSaturday, July 8, 2017 - Fortune\">Data SheetSaturday, July 8, 2017 - Fortune<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A great thing about hacking, if you're Vladimir Putin, is it's so hard to prove.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nihilism\/data-sheetsaturday-july-8-2017-fortune.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[431566],"tags":[],"class_list":["post-226633","post","type-post","status-publish","format-standard","hentry","category-nihilism"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/226633"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=226633"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/226633\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=226633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=226633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=226633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}