F-Secure and Kaspersky both got into the April Fools' Day spirit. F-Secure reported on a huge hack and Kaspersky delivered a double-whammy, including Mother SCADA Matrix as well as malware writtern by ET. You know the web is saturated with pranks to celebrate April Fools’ Day, and you expect it from Google and ThinkGeek, but this year F-Secure and Kaspersky dabbled in the fun.F-Secure: Hackers change 3 million passwords Mikko Hypponen, CRO at F-Secure, wrote:Passwords from over 3,000,000 user accounts were apparently set to “password” late last night in a wide-spread hack that affected hundreds of news, retail and Web 2.0 sites. Most affected users are completely unaware of the attack.According to current statistics, 62% of affected users would not notice such a change as their password was already “password”.F-Secure claimed a hacker group named “Obvious” took credit for the hack and uploaded a 1.9 GB file to The Pirate Bay that contains over 3 million user names and the one password. “To avoid problems like this in the future, we are recommending users to change their password everywhere to ‘password1,’ which is obviously more secure.” Kaspersky delivered a double-whammy.Mother-SCADA Eugene Kaspersky announced that in the course of analyzing SCADA security:We came across “Mother-SCADA”, the chief, predominant, all-powerful ICS of the whole world, on whose smooth and uninterrupted operation relies literally everything on the planet: from how breakfast tastes and the size of annual bonuses, to the hours of night and day time and how fast the sun and the stars move across the skies.Yep, we’ve gone and found the SCADA that manages all the technological processes in the Matrix!Of course, since this morning’s discovery, protecting Matrix SCADA is now the single most important task facing us all today, since control of the “upper level of reality” has the trickle-down effect of ensuring computer security in our projected world. Today, we managed only to plug into Mother-SCADA and conduct preliminary analysis of the system. Critical vulnerabilities so far haven’t been found, but the architecture of the system doesn’t permit a 100% guarantee of its security, even though it’s built on an unknown branch of UNIX. We also attempted analysis of the security of its PLC (programmable logic controllers); however, alas, we weren’t able to determine the manufacturer.Malware written by ETShortly thereafter, Kaspersky reported on another mind-blowing “malware-monster” discovery. This time, Kaspersky warned readers to sit down before announcing, “I’d say it’s theoretically impossible to say that this code was written by a human being (glad to be seated now?).”This code is so infernally intricate that I fear this newly-discovered worm must have extraterrestrial origins.…Most of the infections were detected on computers of scientists of the Russian Academy of Sciences returning from their field investigations into the meteor in Chelyabinsk!!Kaspersky then allegedly quoted these Russian scientists:All known computer malware was created by human beings. But what we’ve got here is a new form of digital essence: Alien computer life infiltrating Earth – specifically, its Internet – via meteoroids, which clearly represents a momentous historic event. Without doubt, it confirms the theory of the initial duality of biological life on Earth – one part of which came about of its own accord, the other part – implanted from without, from space. Thus, we can deduce that today on Earth there simultaneously exist, not two, but three parallel forms of bio-life: terrestrial, extraterrestrial, and also hybrid.Kaspersky said the underwater and underground worlds also pose as “other possible sources of threats,” so the security firm has organized an expedition to the violently erupting Tolbachik volcano “to find computer maliciousness at the very hottest point of the world’s surface.”Gmail Blue Those pranks practically make some of Google’s pale in comparison. For example, Google must want in on Microsoft’s Windows Blue action, since it announced Gmail Blue, which is “Gmail – only bluer.” Like this? Here’s more posts:Gov’t wielded security as a shield to deny the most FOIA requests yet under ObamaWhite Hat Security: Top 10 most insidious web-based attacks and hacking techniquesMicrosoft goes public, talks about Windows Blue and Build 2013 conferenceHackers steal photos, turn Wi-Fi cameras into remote surveillance deviceBlack Hat Europe: ‘Hardening Windows 8 Apps for the Windows Store’DOJ & SEC allegedly investigating Microsoft over bribery allegations in 3 countriesWill future surveillance include global ‘pre-crime’ machine spying on everyone?Urban Exploration aids terrorists with photos of critical infrastructure?CIA Chief advises you to ask: What are your rights? Who owns your data?FBI’s National Security Letter gag orders violate 1st Amendment, ruled unconstitutionalMicrosoft may not scan your email for keywords like Google, but your boss can Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe