|
Post by ferris1248 on Jul 13, 2024 9:23:17 GMT -5
Instead of stupid hearings that go nowhere, endless votes on stupid bills that have have no chance of passing and constant attacks and name calling like 1st graders. "Thousands of state health department files in Florida has been leaked on the dark web by an international hacker group last week, including local resident's recent HIV test results, doctors' notes, and immunization and virus testing records." "Among the leaked data include more than 20,000 files containing some of the most potentially sensitive data on Florida residents, incluiding lab results, workers compensation records and COVID-19 diagnoses." "Some of the files also include scanned image of a person's passport, mammography screening results of women patients, and health insurance information." "More than 20,000 files of sensitive data on Floridians were leaked by Ransom Hub, a hacker group." "This come a week after an international hacker group called Ransom Hub claimed to have breached the Florida Department of Health and gained access to 100 gigabytes worth of potentially sensitive data on Floridians." "The sensitive data included both Floridians' personally identifiable information containing a person's identity such as full name or social security information, and protected health information containing medical records." "The hacker group have reportedly demanded the state agency to pay an undisclosed sum in exchange for not releasing the stolen data last weekend, according to the Tampa Bay Times." "But the state agency have missed the deadline the hacker group had set because of a Florida law prohibiting state agencies experiencing a ransomware incident from paying or complying a ransom demand." FBI director issues code red warning that China wants to 'wreak havoc' on US Russian hackers attacking US water systems as cybersecurity firm issues warning China hacking plot threatens security of million of Americans's online accounts www.msn.com/en-us/health/other/florida-hiv-results-and-social-security-numbers-leaked-online-in-huge-data-breach/ar-BB1pTl4H?ocid=msedgdhp&pc=u531&cvid=6fa6d28712ef4335b7831ab3feb0cf62&ei=17
|
|
|
Post by bullfrog on Jul 13, 2024 9:41:15 GMT -5
The only way to proactively stop it is to assassinate the hackers on foreign soil. For example, if there’s a room in a government building in China where 2 dozen hackers are sitting and so hacking, the building needs to be blown up while they’re in it with a stealth missile or bomb for which the origin cannot be traced (no doubt we have such weapons). They’ll know it was us, but won’t be able to prove it so conclusively as to be willing to go to war over it. And if there is any movement towards retaliation on their part, we preemptively nuke everything they have.
The West wants to be Rome without the brutality. Life doesn’t work that way. Either crush the barbarians where they stand, or let them crush you. There is no compromise or peace with them that they’ll ever honor unless they utterly fear your wrath. Destroy them, or be content to let them destroy you. There’s no other way.
|
|
|
Post by tonyroma on Jul 13, 2024 9:45:50 GMT -5
Well that escalated quickly.
|
|
|
Post by ferris1248 on Jul 13, 2024 9:55:27 GMT -5
The only way to proactively stop it is to assassinate the hackers on foreign soil. For example, if there’s a room in a government building in China where 2 dozen hackers are sitting and so hacking, the building needs to be blown up while they’re in it with a stealth missile or bomb for which the origin cannot be traced (no doubt we have such weapons). They’ll know it was us, but won’t be able to prove it so conclusively as to be willing to go to war over it. And if there is any movement towards retaliation on their part, we preemptively nuke everything they have. The West wants to be Rome without the brutality. Life doesn’t work that way. Either crush the barbarians where they stand, or let them crush you. There is no compromise or peace with them that they’ll ever honor unless they utterly fear your wrath. Destroy them, or be content to let them destroy you. There’s no other way. Drastic but obviously effective although you probably need to discuss it with luapnor first. I was thinking more along the lines of investing more dollars into our cyber infrastructure and educating folks on third party ID, security precautions and awareness. Of all our participants here, I wonder how many practice good security? Periodically changing passwords, IDs, using VPNs, third party verification, etc.? How many check their banking info, investment info daily or several times a week?
|
|
|
Post by Tarponator on Jul 13, 2024 10:09:25 GMT -5
The only way to proactively stop it is to assassinate the hackers on foreign soil. For example, if there’s a room in a government building in China where 2 dozen hackers are sitting and so hacking, the building needs to be blown up while they’re in it with a stealth missile or bomb for which the origin cannot be traced (no doubt we have such weapons). They’ll know it was us, but won’t be able to prove it so conclusively as to be willing to go to war over it. And if there is any movement towards retaliation on their part, we preemptively nuke everything they have. The West wants to be Rome without the brutality. Life doesn’t work that way. Either crush the barbarians where they stand, or let them crush you. There is no compromise or peace with them that they’ll ever honor unless they utterly fear your wrath. Destroy them, or be content to let them destroy you. There’s no other way. Sure, let's attack a sovereign nation and potentially start a war because Florida has poor data security, and there is no other way.
Are you serious, or is it just a bad Saturday morning?
|
|
|
Post by bullfrog on Jul 13, 2024 12:00:30 GMT -5
The only way to proactively stop it is to assassinate the hackers on foreign soil. For example, if there’s a room in a government building in China where 2 dozen hackers are sitting and so hacking, the building needs to be blown up while they’re in it with a stealth missile or bomb for which the origin cannot be traced (no doubt we have such weapons). They’ll know it was us, but won’t be able to prove it so conclusively as to be willing to go to war over it. And if there is any movement towards retaliation on their part, we preemptively nuke everything they have. The West wants to be Rome without the brutality. Life doesn’t work that way. Either crush the barbarians where they stand, or let them crush you. There is no compromise or peace with them that they’ll ever honor unless they utterly fear your wrath. Destroy them, or be content to let them destroy you. There’s no other way. Drastic but obviously effective although you probably need to discuss it with luapnor first. I was thinking more along the lines of investing more dollars into our cyber infrastructure and educating folks on third party ID, security precautions and awareness. Of all our participants here, I wonder how many practice good security? Periodically changing passwords, IDs, using VPNs, third party verification, etc.? How many check their banking info, investment info daily or several times a week? Government employees get lots of training in this regard. To the point of eye-rolling every time it comes up. I can’t speak to the private sector.
|
|
|
Post by bullfrog on Jul 13, 2024 12:03:12 GMT -5
The only way to proactively stop it is to assassinate the hackers on foreign soil. For example, if there’s a room in a government building in China where 2 dozen hackers are sitting and so hacking, the building needs to be blown up while they’re in it with a stealth missile or bomb for which the origin cannot be traced (no doubt we have such weapons). They’ll know it was us, but won’t be able to prove it so conclusively as to be willing to go to war over it. And if there is any movement towards retaliation on their part, we preemptively nuke everything they have. The West wants to be Rome without the brutality. Life doesn’t work that way. Either crush the barbarians where they stand, or let them crush you. There is no compromise or peace with them that they’ll ever honor unless they utterly fear your wrath. Destroy them, or be content to let them destroy you. There’s no other way. Sure, let's attack a sovereign nation and potentially start a war because Florida has poor data security, and there is no other way.
Are you serious, or is it just a bad Saturday morning?
They’re the ones attacking us first. A government-sponsored cyber attack is a hostile act of war the same as any others. “Good security” means nothing when it comes to enemy professional hackers. They have tools and techniques that don’t depend on civilians giving them information.
|
|
|
Post by toldya on Jul 13, 2024 12:06:27 GMT -5
If Trump were President he would be giving public warnings and then taking action .
|
|
|
Post by ferris1248 on Jul 13, 2024 12:08:51 GMT -5
Drastic but obviously effective although you probably need to discuss it with luapnor first. I was thinking more along the lines of investing more dollars into our cyber infrastructure and educating folks on third party ID, security precautions and awareness. Of all our participants here, I wonder how many practice good security? Periodically changing passwords, IDs, using VPNs, third party verification, etc.? How many check their banking info, investment info daily or several times a week? Government employees get lots of training in this regard. To the point of eye-rolling every time it comes up. I can’t speak to the private sector. I believe you but they can only work with what they given as the private sector does. I'm not fool enough to think we can stop it 100% but we should be able to pinch it down more.
|
|
|
Post by biminitwisted on Jul 13, 2024 13:14:06 GMT -5
Maybe we do need the FTC and their rule making authority after all.
|
|
|
Post by bullfrog on Jul 13, 2024 14:35:11 GMT -5
Well that escalated quickly. Fast and overwhelming escalation would go along way in teaching the Axis of Evil to leave us alone. They fear force being used on them, but generally operate under the assumption that serious force will never be used on them as long as they don’t openly attack us with lots of civilian causalities.
|
|
|
Post by PolarsStepdad on Jul 13, 2024 14:45:31 GMT -5
What is the purpose or reason to leak someones medical history? A woman's mammography result? That's just low down shitty human to do that. Is the desire to make pear their most personal matters coukd be leaked and avoid treatment? I just don't get it. I understand high profile people leaks but Suzy Q Public is senseless
|
|
|
Post by gardawg on Jul 13, 2024 14:54:30 GMT -5
What is the purpose or reason to leak someones medical history? A woman's mammography result? That's just low down shitty human to do that. Is the desire to make pear their most personal matters coukd be leaked and avoid treatment? I just don't get it. I understand high profile people leaks but Suzy Q Public is senseless practice ...
|
|
|
Post by cadman on Jul 13, 2024 15:47:25 GMT -5
What is the purpose or reason to leak someones medical history? A woman's mammography result? That's just low down shitty human to do that. Is the desire to make pear their most personal matters coukd be leaked and avoid treatment? I just don't get it. I understand high profile people leaks but Suzy Q Public is senseless You have to realize the people doing this are low down shitty humans.
|
|
|
Post by luapnor on Jul 13, 2024 16:38:43 GMT -5
Sure, let's attack a sovereign nation and potentially start a war because Florida has poor data security, and there is no other way.
Are you serious, or is it just a bad Saturday morning?
They’re the ones attacking us first. A government-sponsored cyber attack is a hostile act of war the same as any others. “Good security” means nothing when it comes to enemy professional hackers. They have tools and techniques that don’t depend on civilians giving them information. How do you post that with a straight face? Are you seriously that ignorant of the activities of the cia and nsa? If you are cool with a stealth missile taking out an NSA station in DC, then i guess we can do the same.
|
|