Science Technology

NASA wants to probe Uranus in search of gas

Published by:

nasa - uranus

Image Source: NASA Goddard

We hear a lot about Mars, Jupiter, and Saturn, and that’s because we have extremely fancy hardware floating around and, in some cases, cruising on the surface of those planets. The planets that lie further away from the Sun don’t get nearly as much attention, but they may soon, as NASA is currently spitballing some missions that will give us a better look at Uranus than we’ve ever gotten.

Continue reading

Travel

Entering This Hidden Illinois Castle Will Make You Feel Like You’re In A Fairy Tale

Published by:

It’s not every day that you run across a castle in Illinois. They are a bit of a rarity. And it’s even more unusual if you can actually stay at one. But at the Ravenstone Castle in Harvard, Illinois, you can go on a tour or even stay the night. It’s a massive castle, and the inside is as cool as the outside. These pics preview what you will see at this awesome castle.

Illinois castle

This castle has the ambiance of a 16th century castle.

Continue reading

Technology

EsteemAudit RDP Exploit Remains Unpatched

Published by:

Esteem Audit

Although Microsoft released patches for SMB flaws for supported versions in March and unsupported versions immediately after the outbreak of the WannaCry ransomware, the company ignored to patch other three NSA hacking tools, dubbed “EnglishmanDentist,” “EsteemAudit,” and “ExplodingCan.”

Continue reading

Technology

WannaCry Ransomware

Published by:

As of this writing, the WannaCry ransomware outbreak infected 350,000 victims in more than 150 countries.

What makes WannaCry unique?
WannaCry is a unique ransomware strain that exploits a critical Microsoft Windows Server Message Block (SMB) vulnerability to spread like a worm, leading to its rapid propagation after just a few hours of initial detection. The SMB exploit spreads across network shares, so the effect of the attack was minimal to consumers.

The unique trifecta of a broadly available vulnerability with a working exploit and the ability for execution without human intervention created the perfect environment for a “wormable” ransomware attack. Since the WannaCry attack, another attack called Adylkuzz has surfaced that takes advantage of the same Windows vulnerability, emphasizing the need for action.