That is what you get for hiring low cost IT people who work for slave wages.
This is why you hire good people for a pretty penny!
South Korea's data wiping malware that knocked out PCs at TV stations and banks earlier this week may have been introduced through compromised corporate patching systems. Several South Korean financial institutions - Shinhan Bank, Nonghyup Bank and Jeju Bank - and TV broadcaster networks were impacted by a destructive virus ( …
I'm betting it was a WAMP platform, with a spear phishing attack on the administrator, who used the same username and password on a VPN connection to remote in to work.
Then, they used something like SCCM to push out malware that blew off the MBR.
Pity that an MBR error is so irreparable. They should invent something called fdisk and give if an /mbr switch.
It is with greatest humility and admiration that we find our patch systems to be highly useful at doing much more than just making our computers run slower and inevitably need to be replaced as they start crashing from the continuous stream of CYA patch code.
Our computers become ever more needful of having multi-core systems with appreciable memory to run security software in the hopes that at least 5% of their processing power be left for doing other mundane activities, usually the tasks for which we purchased them in the first place despite the reality that the systems are probably already secretly compromised despite the 95% devotion of processing power for the prevention thereof.
Let the patches freely flow!
Biting the hand that feeds IT © 1998–2019