KDDI said starting high place monitoring of suspicious person information by drone.
If you start piloting DRONE, your DRONE may take away someone or something important.
Your drawings and notes will be imported directly to your smartphone. You can also convert memos into text.
Dec/13/2018 Kaspersky JP said businessman`s mobile PC is so so danger because Japanese server is infecting 1,500 units in control central server. The infection route of malware is tethering and internet connection by USB.
Below are the most noteworthy malware
Concealment such as “The Bald Knight Rises” malware “XXMM”
· Activity time is limited from 8 o’clock to 17 o’clock so as not to be considered suspicious communication
· Use image data to read communication destination etc. Sneak into data at the end of the image file to disguise (steganography)
· Add a lot of garbage data to prevent analysis by security companies
· Shut out connection by security company