Be careful your mouse might be infected.
RDL2004
Posts: 2,554
Be careful your mouse might be infected.
http://www.foxnews.com/politics/2013/07/10/us-agency-destroys-computers/
Sometimes I have trouble believing this kind of thing can really happen.
In an almost cartoonish response to a relatively minor problem, employees at the obscure Economic Development Administration took a hammer to their computers, keyboards and mice in an effort to destroy all of the agencys tech-related hardware after incorrectly believing their network had been hacked.
http://www.foxnews.com/politics/2013/07/10/us-agency-destroys-computers/
Sometimes I have trouble believing this kind of thing can really happen.
Comments
It would be funny if they only hit the outside of the computers and the hard drives were perfectly intact.
http://www.oig.doc.gov/OIGPublications/OIG-13-027-A.pdf
Just curious: is it possible for a mouse to harbor a virus? There are wireless mice, for example, so I'm guessing there are chips in there that might store data of some sort. Anybody know for sure that all mice are, by their very nature, unhackable?
I recently read where an iPhone could be hacked through a modified charger.
http://gizmodo.com/your-iphone-can-be-hacked-with-a-modified-charger-510988017
I hate to sound paranoid, but...
eeewwww...
http://www.bleepingcomputer.com/virus-removal/remove-united-states-courts-ransomware
Nothing worked on her computer, it booted direct to the ransom page. After numerous "fixes" failed, I just installed her HD in my Vista computer as a slave and ran Malwarebytes, SuperAntispyware, CCleaner, and my newly updated Security Essentials. All good now, just a time-consuming PITA.
They used mice for other activities.
If you don't pay, they will break your legs ... LOL
Yeah but if someone could hack a mouse over USB for whatever reason, physical destruction? I'd frame them; "1st Malware Hacked Mouse Evar July 2013" and sell them on eBay. Who wouldn't want a hacked mouse?
At the time of Y2K concerns, one of our clients insisted we audit the computers we supplied them for compliance. An engineering firm was sent around to do this. And for sure, one of the things on the checklist was the plugin power cord. Go figure !
I wonder what the whole non-event cost us. Billions for sure.
Cheers,
Peter (pjv)
Did your web cam turn itself on? that is so creepy when you see yourself in the little web cam window...
The FBI virus-ransomware started at $100 dollars and quickly moved to $300 dollars,
What a great time a group of us had, not sending the money... Some pretty funny stuff..
-Tommy
I can't help but wonder how these morons get management positions in organizations like that. Don't they have a minimum IQ requirement? Perhaps all employees should be required to pass an IQ and TQ (Technical Quotient) test for the position they aspire to.
"
The Peter Principle is a proposition that states that the members of an organization where promotion is based on achievement, success and merit will eventually be promoted beyond their level of ability. The principle is commonly phrased, "Employees tend to rise to their level of incompetence." In more formal parlance, the effect could be stated as: employees tend to be given more authority until they cannot continue to work competently.
"
I worked in a government job (County level, but in FL, which has it's own alternate Universe as SOP) for 31 years and the IT people were, well, interesting. The network was so locked down that very little useful work could be performed unless it was in the form of an Excel worksheet. So we had Excel memos, todo lists, scheduling sheets, you name it. AFAIK, they're still forcing that very square peg into a round hole. You should see what kind of documents that can be created when Excel is used as the word processor of mandate.
People in Taiwan were quite fearful of Y2K downing the country's banks and government, but all the data is kept in years since the founding of R.O.C. not Christian era. We were at R.O.C era year 89 ( this year I have to data my bank withdrawals in Year 102) with 11 years after Y2K to solve Taiwan's century rollover problem.
And Thailand has yet another era based on Buddha.
But that didn't stop the histeria and media buzz about Y2K. Most people use Windows and have no idea how to manage their computer.
These days to be employable you need a high IQ, a high EQ, and a high CQ.. and a degree helps too.
The date was entered and stored as a text string, used only for printouts or to indicate the date some data or setting was manually changed, never for calculations.
It is possible to hardware hack a USB mouse to spread malware. You need to cram a micro-USB hub and USB thumb drive board into the mouse enclosure. The thumb drive runs the malware by autorun. I've seen this done somewhere as a proof of concept but it's an exotic labor-intensive method of attack.
Thanks for answering that.
I could imagine a less harmful hack where the mouse starts to roam around a screen and maybe guess where to point and click to launch a browser or something, just to freak people out.