7:54 AM 7/12/2020 - The Covid-19 Pandemic Cyberattacks: Is there a significant increase, and are these attacks a part of the Bio-Info-Warfare package? | Hospitals see rise in patient data hacking attacks during COVID-19

COVID-19 cyberthreats

The Covid-19 Pandemic Cyberattacks: Is there a significant increase, and are these attacks a part of the Bio-Info-Warfare package? - GS


Michael_Novakhov shared this story from  Disease X-19 and Security from Michael_Novakhov (10 sites).

Between March and April, IBM saw a 6,000% increase in spam attacks on information technology systems, leveraging COVID-19, many of them at ...
 Google Alert - Coronavirus and cyber attacks


7:54 AM 7/12/2020


Michael Novakhov - SharedNewsLinks
7:54 AM 7/12/2020 - The Covid-19 Pandemic Cyberattacks: Is there a significant increase, and are these attacks a part of the Bio-Info-Warfare package? | Hospitals see rise in patient data hacking attacks during COVID-19
Hospitals see rise in patient data hacking attacks during COVID-19
Cyber attacks stayed at same level during pandemic, says infosec pro
Cyberattacks and Covid-19: who is behind them, and are they the clue to understanding the nature of Pandemic as the Weapon? - Google Search
Cyberattacks and Covid-19: who is behind them, and are they the clue to understanding the nature of Pandemic as the Weapon? - Google Search
Google Alert - Coronavirus and cyber attacks: A game of 'cat and mouse': Hacking attacks on hospitals for patient data increase during ...
Iran: Misaligned radar led to Ukrainian jet downing
6:59 AM 7/12/2020 - North Korea's Military Can Kill a Lot of People
5:53 PM 7/11/2020 - Disease X-19 - News Review
5:17 PM 7/11/2020 - News - rats in nyc
NYC restaurants now battling rat problems amid COVID-19
Rats Are Taking Over New York City
3:06 PM 7/11/2020 - Vice versa: rats caused the Pandemic! Rat population was amplified deliberately & globally as the tool & vector of the future Pandemic. | Rats and the COVID-19 pandemic: Early data on the global emergence of rats in response to social distancing | medRxiv
Rats and the COVID-19 pandemic: Early data on the global emergence of rats in response to social distancing | medRxiv
Maps of COVID-19 in rich and poor neighborhoods show big disparities
10:20 AM 7/11/2020 - US covid-19 rates and rat populations by zip codes: is there an association? - M.N.
Young Adults Now Make Up Most Of Chicagos New Coronavirus Cases, Citys Health Chief Says Block Club Chicago
8:29 AM 7/11/2020 - M.N.: And now the Russian-Jewish #Mafia will start buying up the #NYC, and this was their plan from the beginning - see my earlier posts: "COVID-19 has broken NYC's housing market" - from New York Post.
COVID-19 has broken NYC's housing market
Google Alert - coronavirus in new york post: COVID-19 has broken NYC's housing market
Covid 19 coronavirus: Mutant strain 'six times' more infectious, scientists say
If the coronavirus is really airborne, we might be fighting it the wrong way
6:51 AM 7/11/2020 - M.N.: It is #obvious that the #NYC #RATS lost their sense of #smell, are #infected, #sick and #psychotic. #Test them for #SarsCov2, #Hantaviruses, African Swine Fever (#ASF), and other relevant #infections, which might be the parts of the #complex #DiseaseX19.
Famished NYC Rats Are Harassing Outdoor Diners
3:40 PM 7/10/2020 - Ghislaine Maxwell forced to don paper attire at NY prison amid suicide concerns: report | Fox News
 _____________________________________________
Michael Novakhov - SharedNewsLinks
7:54 AM 7/12/2020 - The Covid-19 Pandemic Cyberattacks: Is there a significant increase, and are these attacks a part of the Bio-Info-Warfare package? | Hospitals see rise in patient data hacking attacks during COVID-19

Michael_Novakhov shared this story from The FBI News Review.

COVID-19 cyberthreats

The Covid-19 Pandemic Cyberattacks: Is there a significant increase, and are these attacks a part of the Bio-Info-Warfare package? - GS

7:54 AM 7/12/2020


  1. 6:59 AM 7/12/2020 - North Korea's Military Can Kill a Lot of People

    The FBI News Review: 6:59 AM 7/12/2020 - North Korea's Military Can Kil... https://fbinewsreview.blogspot.com/2020/07/659-am-7122020-north-koreas-military.html?spref=tw 
Hospitals see rise in patient data hacking attacks during COVID-19

Michael_Novakhov shared this story from GANNETT Syndication Service.

BOSTON On the day before the July 4 holiday weekend, Mount Auburn Hospital's information technology team identified some unusual activity. Alarmed, they quickly took steps to disconnect the Cambridge hospital's computer system from the internet. They switched to backup manual procedures instead of automatic ones. 
No patient data was compromised, and the Harvard-affiliated hospital continued its normal operations, according to hospital officials.
Such attempted attacks are a daily if not hourly occurrence at America's hospitals. And they dont always end as well as Mount Auburns did.
More than 80% of medical practices have been the victims of cyberattacks, according to a national survey. Over half reported patient safety concerns from the hacks, and 20% said that their business had been interrupted for more than five hours. 
That can be the difference between life and death, said Wendi Whitmore, a cybersecurity expert and vice president of IBM X-Force, a commercial security research team.
And the situation has only gotten worse during the months-long coronavirus pandemic, as more employees switched to working from home, and medical facilities were cash-strapped and stretched thin because of COVID-19.
Between March and April, IBM saw a 6,000% increase in spam attacks on information technology systems, leveraging COVID-19, many of them at health care facilities, Whitmore said, describing the situation as a continuous cat and mouse game between criminals and institutions. 
Whitmore said theres been a huge increase in security incidents in recent months, climbing about 75% in North America and 125% in Europe and the Middle East.
Seattle Childrens, for instance, saw a doubling of attempted hacking attacks in March, specifically phishing emails, hunting for someone on the staff who would click on a malicious link and allow malware into the health system'snetwork, said Gary Gooden, chief information security officer at the Washington-based health system. 
The reason: Hackers can make a lot of money. Globally, cybercrime adds up to billions of dollars a year, Gooden said.
Stealing a credit card number might be useful for only a day or two, until the person realizes it and cancels their card. But an electronic medical record is far more valuable.
The FBI reported in 2014 that a stolen credit card or even social security number was worth just $1 on the black market, while an electronic health record would fetch about $50  $1,000 if it belonged to a celebrity or public figure.
Electronic health records, according to the FBI report, can be used to file fraudulent insurance claims, obtain prescription medication, and advance identity theft. Health record theft also is more difficult to detect, taking almost twice as long to recognize as normal identity theft, the report found.
Stealing a newborn or toddlers electronic health record is even more prized, Gooden said, because thieves are rarely caught. You have a free run for 18 years to utilize these personas. They also try to steal the identities of children who die at the hospital, hoping they wont get caught, he said.

Phishing attacks a favorite tactic

Cyber criminals are particularly fond of phishing attacks that entice people to click on email links that provide the thief access to their computer networksCorporate email protectionscan identify and remove nearly all potentially malicious emails before a user within the health care system ever sees them, Gooden said. But for the final few, the vigilance of employees remains crucial.
The lures for getting people to open these spam emails have evolved over the course of the pandemic, said Ryan Witt, managing director at Proofpoint, a technology security company based in Sunnyvale, California.
In February, he said, most of the phishing attempts provided basic information about the coronavirus, often by impersonating health authorities. At the height of the early pandemic in March, the emails offered access to face masks or other personal protective gear. We found a source of equipment for you! was a typical offer.
Then in April, these tempting emails offered advice on how to get stimulus funding checks. Lately, theyve shifted yet again, he said, and now the focus is on getting first in line for a vaccine  though one doesnt yet exist.
Typically, theres a seasonality to cyber-attacks, with more coming during traditional vacation times, when criminals assume defenses are lowered and staff is reduced, said Colin Zick, a partner and co-chair of the privacy and data security practice at Foley Hoag, a Boston-based law firm.
He expects phishing attacks to go up in September, if people return to their offices after working from home.
Another change in workflow, Zick said. Its the perfect opportunity for someone to send a phishing email, that says Im still out, but I want you to do this.

Cybersafety requires eternal vigilance

To protect against these ever-changing approaches, Gooden said, hospitals and medical facilities have to constantly pivot and stay ahead of the curve in terms of technology and practices.
Whitmore agrees. She advises institutions to require multi-factor authentication  using a cellphone to corroborate a person's identity  warn staff about spam, back up their most critical information offline, and encrypt patient information.
Its about installing a series of tripwires that allow organizations to detect when there are attacks against their environment, she said. That buys us time.
But every medical institution is vulnerable.
You have to be eternally vigilant, Zick said. As long as weve got an open internet that is highly unregulated, thats the downside.
Theres not much an individual can do to protect their own medical information, Zick and others said, except trust their health care providers to do it for them.
Zick requests his medical file periodically to ensure he has access to his own records if they were ever lost for good. And he said if he saw a provider acting carelessly with his data such as not using two-factor authentication  he would offer them some free advice.

Hacker ransom demands skyrocking

On June 3, information technology staff at the University of California San Francisco realized that their networks security had been breached two days earlier. They quarantined several IT systems within the School of Medicine as a safety measure, and isolated the activity from the UCSF network, according to a statement from the university
Patient care remained unaffected, the school said, but the attackers launched malware that encrypted a few servers within the School of Medicine, "making them temporarily inaccessible.
The university paid less than half the demanded ransom about $1.14 million in exchange for the stolen data. The FBI is investigating.
Just a few years ago, criminals were asking for $1,200, Whitmore said, but "now we're seeing ransomware demands ranging from $10,000 to $25 million." Attackers do release ransomed data when paid, because otherwise organizations would stop paying, but once the criminals access a computer system they may leave behind the means to do it again.
Large institutions are getting more sophisticated at protecting themselves, Whitmore and others said. But they may still be vulnerable when one of their suppliers or, say, a small specialty medical clinic, is hacked. If the computer systems are linked, the criminals can try to access the bigger facility through the smaller one.
Your security is only as good as your collective security, said Dr. Titus Schleyer, a professor of biomedical informatics at the Indiana University School of Medicine and a research scientist at the Regenstrief Institute, a research organization in Indianapolis. If you have a weak partner all your security doesnt help you.
Zick said the sweet spot is mid-sized medical practices that have tens of thousands of health records, but arent big enough to hire dedicated IT staff to protect the data.

Cash and information are cybertargets

Cybercriminals range from those have no idea what theyre doing, to sophisticated rings of computer scientists, often from the former Eastern Bloc countries, Schleyer said.
Most attacks are aimed at getting money. But some, backed by countries like Russia and China, as well as many others, are looking for information  perhaps the results of a clinical trial for a new COVID-19 therapy, or candidate vaccine.
You do have government actors in the hacking space, no question about it, Schleyer said, adding that he did not know of any specific attempts to get COVID-related information.
Zick said he expects China and Russia will be looking for information, ideally without the victims knowing theyve been spied on. More ransomware originates tends to originate from North Korea and Eastern Europe, he said, where hackers dont care about the information, only the money it can yield.
Going forward, what cyber security experts worry about the most is quantum computing, Schleyer said. Quantum computers, which operate differently than classic ones, will be able to decode current protective systems.
We need to be ready for that moment, Schleyer said. Thatll upset IT around the world when that happens.
Health and patient safety coverage at USA TODAY is made possible in part by a grant from the Masimo Foundation for Ethics, Innovation and Competition in Healthcare. The Masimo Foundation does not provide editorial input.
Cyber attacks stayed at same level during pandemic, says infosec pro

Michael_Novakhov shared this story from Blog di Psicologia, ricerca, curiosità | PsicoSocial.it.

Chester Wisniewski, a principal research scientist at security outfit Sophos, told iTWire during an interview: "I see no evidence of that [and ] I have no idea what they're talking about. The number of attacks related to the pandemic, of course, have increased dramatically, but the total number of attacks hasn't changed.
"We saw attacks change from fake shipping notices into 'you've got COVID, click here'. But we didn't see an increase in the number of attacks at all, not an increase in the number of spam attacks, not an increase in the number of ransomware attacks."
Wisniewski said he had not seen a dramatic change in any of the numbers in Sophos' data from the beginning of the year. "So if we look at January, February, we don't see a big change from January, February versus March and April," he added.
In his day-to-day role, Wisniewski, whose interest in security and privacy was piqued while learning to hack from bulletin board text files in the 1980s, analyses the attack data gathered by SophosLabs in a bid to improve understanding of evolving threats.
He has helped organisations design enterprise-scale defence strategies, has served as the primary technical lead on architecting Sophos' first email security appliance, and also consulted on security planning with some big global brands.
A great deal of the interview with Wisniewski focused on how things would look post-COVID, and he agreed that there would be some changes as compared to the period before the lockdown.
For one, he said employers would be keen to look at any savings that could be made by continuing with some COVID-era practices, without jeopardising the welfare of employees.
He pointed to his own organisation as an example. "Look at the real estate that Sophos has here in Vancouver for 300 staff. And that square footage in that building costs us a fortune in the CBD. If we could cut the amount of square footage in half, the savings would be monumental to the company just for the space, let alone the coffee and the other perks."
Wisniewski said adapting to a return to office would mean different things, depending on the industry. Sectors like shipping, logistics and manufacturing tended to have a somewhat immature security model compared to sectors like finance, technology and government. And the bigger the organisation and the bigger the IT staff,. the less the issues that would be encountered.
But the fact that organisations, in general, had been moving towards a zero trust networking model would ensure that there was no calamity when people went back to work. Wisniewski pointed to the fact that today more than 90% of sites were using encryption, a far cry from the situation a decade ago.
"You know, when [Edward] Snowden leaked all the NSA stuff, less than 20% of all the websites in the world were encrypted. Everything was leaking everywhere. We were worried about Wi-Fi security, we were worried about VPNs, we were worried about this, we were worried about that. Now it's over 90% of all websites in the developed world that are encrypted and the 10% that aren't are literally like an eight-year-old soccer blog for your kids League Soccer that's not maintained anymore.
"So the safety of using TLS encryption means that I don't really care if your home Wi-Fi isn't perfect. Or if you're working from the local cafe, it doesn't matter anymore. We're generally using the same safety no matter where we are. What's important is that visibility and monitoring where I started out with is present no matter where I'm at.
"I need to know that your computer is safe, that it's, you know, patched or it's up-to-date, that your security software is not turned off. I need to know those things are in place, no matter where you are, whether you're at the cafe, whether you're at home, whether you're at the office. And if we accomplish that, then it's up to the business to decide if they're for it. I don't really think there's that much security risk."
He anticipated that some machines, taken home by workers to use during the lockdown, would need a rash of patches. But again, these were not the majority. There were some organisations where machines needed to be on the internal LAN to receive their weekly or monthly dose of patches.
"We've had some of this internally where we use Microsoft System Centre Configuration Manager to manage some of our machines. Then other machines, we were managing patches externally through just controlling which Windows Updates got automatically downloaded from Microsoft.
"All the machines that were pointed at Microsoft, no matter where they're in the world, they've been getting their updates according to policy. And we've been able to keep an eye on that.
"But a few of the legacy machines, the four- and five-year-old machines that we were just getting ready to replace, some of those were pointed at internal update points. So they are only getting updates when they VPN in; the problem is the user may only VPN in for a half an hour a day and never get that two gigabyte Windows Update downloaded. And that that update may not have happened."
Wisniewski said he had suggested the equivalent of quarantine for unpatched machines. "I've been recommending that organisations look at creating, either bringing those machines in onto the guest Wi-Fi, or creating a quarantine Wi-Fi, until IT is able to give a quick check of those machines to be sure they're fit for duty."
He said he did not anticipate a rash of malware infections when people returned to work. "I would hope not to see too much on the malware infection side. From what I'm seeing, nothing has gotten particularly worse. I think the biggest thing is going to be regulatory and data being spread around places it doesn't belong.
"You know, I think there's going to be a lot of company documents shared in places they don't belong. Policies breached, that kind of stuff. I think it's prudent to make sure those patches are in place. And you know, antivirus stuff.
"But to be honest, I don't expect that to be a big problem. I don't think we're going to see big outbreaks when people come back. One of the things we'll see is some that shadow IT will continue to be used even though it may be prohibited by policy."
Cyberattacks and Covid-19: who is behind them, and are they the clue to understanding the nature of Pandemic as the Weapon? - Google Search

Michael_Novakhov shared this story .

Search Results


Cyberattacks and Covid-19: who is behind them, and are they the clue to understanding the nature of Pandemic as the Weapon? - Google Search

Michael_Novakhov shared this story .

Search Results

Web results

Apr 8, 2020 - It includes a non-exhaustive list of indicators of compromise (IOCs) ... APT groups are using the COVID-19 pandemic as part of their cyber ... Specifically, it is likely that they will use new government aid packages responding to COVID-19 ... GitHub list of IOCs used COVID-19-related cyberattack campaigns ...
Missing: clue nature Weapon?

COVID-19 Cyber Attacks - WebARX Security

www.webarxsecurity.com covid-19-cyber-attacks

<a href="http://www.webarxsecurity.com" rel="nofollow">www.webarxsecurity.com</a> covid-19-cyber-attacks
COVID-19 Cyber Attacks - As a web security company, over the past weeks, we have been ... list of the cyber attacks and threats related to the global pandemic. ... online, this page serves the purpose of making it easier to spread awareness. ... about half of the respondents said they aren't offering security education that ...
Missing: clue | Must include: clue
Google Alert - Coronavirus and cyber attacks: A game of 'cat and mouse': Hacking attacks on hospitals for patient data increase during ...

Michael_Novakhov shared this story from Disease X-19 and Security from Michael_Novakhov (10 sites).

Between March and April, IBM saw a 6,000% increase in spam attacks on information technology systems, leveraging COVID-19, many of them at ...

 Google Alert - Coronavirus and cyber attacks
Iran: Misaligned radar led to Ukrainian jet downing

Michael_Novakhov shared this story .

Iran: Misaligned radar led to Ukrainian jet downing

People walk near the wreckage of a Ukrainian plane tha crashed near Imam Khomeini airport in Tehran on January 8, 2020, killing everyone on board. (AFP)
Short Url
Updated 28 sec ago
357

Iran: Misaligned radar led to Ukrainian jet downing

  • A failure occurred due to a human error in following the procedure for aligning the radar
TEHRAN: Iran said that the misalignment of an air defense units radar system was the key human error that led to the accidental downing of a Ukrainian passenger plane in January.
A failure occurred due to a human error in following the procedure for aligning the radar, causing a 107-degree error in the system, the Iranian Civil Aviation authority said in a report late Saturday.
6:59 AM 7/12/2020 - North Korea's Military Can Kill a Lot of People

Michael_Novakhov shared this story from The FBI News Review.



Hamburg Sex Workers Demand Germany's Brothels Reopen | World News | US News
_________________________________________________________________

Saved Stories - None
The National Interest: North Korea's Military Can Kill a Lot of People (Thanks to Russia)
CDC: Covid-19 death toll is twice as high among people of color under age 65 as for white Americans
1. Trump from Michael_Novakhov (197 sites): "Russian Intelligence services and international organized crime" - Google News: World Council of Churches wants Hagia Sophia decision reversed - WeForNews
1. Trump from Michael_Novakhov (197 sites): "Russia influence in Eastern Europe" - Google News: The Estonian World Council: Russian fabrications and distortions of history hinder mutual understanding and the pursuit of truth - Estonian World
"us national security" - Google News: US national security adviser OBrien heading to Europe for talks on China - South China Morning Post
"james b. comey" - Google News: Opinion | Robert Mueller: Roger Stone remains a convicted felon, and rightly so - The Washington Post
Top stories - Google News: Trump wears a mask during visit to wounded service members at Walter Reed - CNN
"putin's health" - Google News: Donald Trump wears mask in public for first time live - The Guardian
Stars and Stripes: Trump confirms cyberattack on Russian trolls to deter them during 2018 midterms
Voice of America - English: US Convicts Russian Hacker in 2012 Data Breach
Google Alert - Sars-Cov-2 origins: COVID-19 Vaccine Faces Challenge of Confidence | Voice of America - English
Google Alert - coronavirus: Young Adults Now Make Up Most Of Chicago's New Coronavirus Cases, City's Health Chief Says
Google Alert - coronavirus: Study of Coronavirus in Pregnant Women Finds Striking Racial Differences
Google Alert - sars cov 2: WHO still skeptical SARS-CoV-2 lingers in airdespite what the NYT says
Google Alert - coronavirus: Latinos now twice as likely as whites to get coronavirus in LA County
Google Alert - Latest coronavirus news: 68% of a New York clinic's patients test positive for coronavirus antibodies
Google Alert - Latest coronavirus news: For first time, US records more than 70000 new coronavirus cases in single day
Google Alert - CoronaVirus as Biological Weapon: The Dangers Of Chemical And Bacteriological Biological Weapons
Google Alert - CoronaVirus as Biological Weapon: Top Conspiracy Theories Surrounding the Coronavirus Pandemic
Google Alert - CoronaVirus as Biological Weapon: Biosecurity, Biosafety and Bioterrorism
Google Alert - CoronaVirus as Biological Weapon: Trump election strategy: Blame China for coronavirus, bad economy
Google Alert - sars cov 2 as bioweapon: China Demands WHO Probe Coronavirus 'Origins' in United States
Google Alert - Covid-19 blood clots: 'I Couldn't Do Anything': The Virus and an ER Doctor's Suicide
Google Alert - Coronavirus in New Rochelle, N.Y.: Employers balk at frequent COVID-19 tests for workers. Here's why
Google Alert - covid-19 superspreaders: Colorado scientists sign letter addressing COVID-19 potential for airborne spread

  1. 6:59 AM 7/12/2020 - North Korea's Military Can Kill a Lot of People

    The FBI News Review: 6:59 AM 7/12/2020 - North Korea's Military Can Kil... https://fbinewsreview.blogspot.com/2020/07/659-am-7122020-north-koreas-military.html?spref=tw 
  2. 9 - Bodies donated to science in Paris are being eaten by rats

    8 - NYC rats are going after COVID street diners

    The Nine News Nuggets You Need To Know! | KFI AM 640 | Gary and Shannon https://kfiam640.iheart.com/featured/gary-and-shannon/content/2020-07-10-the-nine-news-nuggets-you-need-to-know/ 
  3.  Michael Novakhov Retweeted
    “Stone is the central figure in the greatest scandals in U.S. history. Ames, Hanssen, the Rosenbergs, Alger Hiss, [Trump]. And now he [gets] a commutation ... from the president he” protected from charges that he stole office with Russia’s help. Cool. 😎🕵🏼https://www.theatlantic.com/ideas/archive/2020/07/roger-stone/614068/ 
  4.  Michael Novakhov Retweeted
    Ghislaine Maxwell filmed US politicians with underage girls, former pal claims https://trib.al/Mnij3H9 


    View image on Twitter
  5. rats caused the Pandemic! Rat population was amplified deliberately & globally as the tool & vector of the future Pandemic. | Rats and the COVID-19

    Covid-19-Review: 3:06 PM 7/11/2020 - Vice versa: rats caused the Pa... https://covid-19-review.blogspot.com/2020/07/306-pm-7112020-vice-versa-rats-caused.html?spref=tw 


Comments

Popular Posts

8:07 AM 9/5/2020 - Crossfire Hurricane Investigation: It was just a GAS! FBI is dead. The new Service is needed (they are always needed), with the completely different outlooks and mentality than in those present days Pinkertons but without their skills, acumen, and efficiency.

9:30 AM 9/11/2020 - Transverse Myelitis, Possible Adverse Reaction to COVID-19 Vaccine, Explained | Coronavirus Infects, Hijacks Brain - How Does It Work? | How Russia Updated Its Disinformation Playbook for 2020

7:09 AM 9/5/2020 - fbi surveillance Google News: Peter Strzok, Notorious Ex-G-Man, Explains Himself And Takes Aim At Trump

Audio Post - The Tip Of An Iceberg: Sexual Misconduct Within The FBI Is Exposed by AP! Investigate The Investigators who are nothing more and nothing less than a bunch of psychopaths, perverts, and child abusers. Abolish the FBI and put the criminal FBI agents in prison where they belong! The present crisis in America is the direct result of the FBI stupidity, treacherous incompetence and malfeasance.

11:16 AM 4/1/2020 - Look at the Coronavirus map of New York City, it speaks for itself: This is the real Collusion: Trump + Russian Mafia! They conspired to bring to reality the old dream of Trump's: to get rid of the NYC eyesore, its public housing projects, and to build the luxury housing instead, making themselves the tens of billions of bloody $$$.

7:26 AM 9/2/2020 - "That truncated FBI investigation that needs to be resumed immediately." (!!! - M.N.) | There Was No Russia Investigation.

10:06 AM 9/1/2020 - Trump to Visit Kenosha After Sparring with Biden Over Security

5:56 PM 3/29/2020 - Coronavirus Deaths in Germany: Is there a different, less virulent strain of the virus?! Did we do the comparison studies?

8:42 PM 4/1/2020 - Michael Novakhov – SharedNewsLinks℠: Coronavirus Could Spread Through Pipes in Buildings, Officials Fear

8:51 AM 8/30/2020 - "ванька встанька" - ("Teflon effect"): "Putin’s approval rating has jumped to one of its highest levels since February as Russia continues its recovery from the coronavirus outbreak".