Hosts Jim Love, CIO for ITWC, and Doug Sparkes, a lecturer at the Conrad School of Entrepreneurship and Business, keep things lively in this 20-minute podcast devoted to the importance of understanding which events in the business environment are inevi…Read More Deeper Dive: Scenarios: A how-to guide (Eps.3)
Hosts Jim Love, CIO for ITWC, and Doug Sparkes, a lecturer at the Conrad School of Entrepreneurship and Business, open this 17-minute podcast by taking the listener back in time to October 1973, when the Organization of Arab Petroleum Exporting Countri…Read More Deeper Dive: Scenario Planning Explained (Eps.2)
Flaw Could Enable Access to Secret Encryption KeyA critical authentication bypass vulnerability could enable hackers to remotely compromise programmable logic controllers made by industrial automation giant Rockwell Automation, according to the cyberse…Read More Rockwell Controllers Vulnerable
Incidents Spotlight Growing COVID-19-Related CyberthreatsTwo Indian vaccine makers and an Oxford University lab are reportedly among the latest targets of hackers apparently seeking to steal COVID-19 research data.Read More Indian Vaccine Makers, Oxford Lab Reportedly Hacked
Lactalis, the world’s leading dairy group, has disclosed a cyberattack after unknown threat actors have breached some of the company’s systems. […]Read More World’s leading dairy group Lactalis hit by cyberattack
‘Supply Chain Security Is Broken, and It’s Time for a Change’Jamil Farshchi has been there. As CISO of Equifax, he knows what it’s like to be a victim of a high-profile cyberattack. And he knows breached companies have a choice: “Are they going to be a…Read More Equifax CISO Jamil Farshchi on SolarWinds and Supply Chains
At the beginning of Fraud Prevention Month, we look at the causes of business email compromise scams and how to reduce the odds of being victimized
The post Fraud Prevention Month: Fight business email fraud first appeared on IT World Canada.
No patches are available just yet.
The post Max level vulnerability found in Logix PLCs first appeared on IT World Canada.
The delivery system for the Gootkit information stealer has evolved into a complex and stealthy framework, which earned it the name Gootloader, and is now pushing a wider variety of malware via hacked WordPress sites and malicious SEO techniques for Go…Read More Hackers use black hat SEO to push ransomware, trojans via Google
Airline accused of defrauding USPS with false automated delivery scan dataRead More United Airlines to Pay $49m to Settle False Data Claim
The global digital workplace and app delivery solutions provider company Citrix announced today that it has finally completed the acquisition of SaaS collaborative work management solutions provider company Wrike, for approximately US$2.25 billion in c…Read More Citrix completes acquisition of Wrike
Universal Health Services (UHS) said that the Ryuk ransomware attack it suffered during September 2020 had an estimated impact of $67 million. […]Read More Universal Health Services lost $67 million due to Ryuk ransomware attack
A company that rents out access to more than 10 million Web browsers so that clients can hide their true Internet addresses has built its network by paying browser extension makers to quietly include its code in their creations. This story examines the lopsided economics of extension development, and why installing an extension can be such a risky proposition.Read More Is Your Browser Extension a Botnet Backdoor?
Posted by Matt Levine, Director, Risk Management In an effort to showcase the breadth and depth of Black+ contributions to security and privacy fields, we’ve launched a series in support of #ShareTheMicInCyber that aims to elevate and celebrate th…Read More #ShareTheMicInCyber: Rob Duhart
Sting operation nets a dozen alleged sexual predators who targeted children onlineRead More Florida Police Arrest 12 Alleged Online Predators
The transport system for the Australian state of New South Wales has suffered a data breach after the Clop ransomware exploited a vulnerability to steal files. […]Read More NSW Transport agency extorted by ransomware gang after Accellion attack
NinjaRMM, which provides tools for managed service providers, aims to create a red team capability following years of attacks against MSPs.Read More MSP Provider Builds Red Team as Attackers Target Industry
Judge approves $650m settlement of privacy lawsuit brought against social networkRead More Facebook Photo-tagging Lawsuit Settled for $650m
While the trackers in LastPass’ Android app don’t collect any personal data, the news may not sit well with some privacy-minded users
The post Popular password manager in the spotlight over web trackers appeared first on WeLiveSecurity
A. What Is the Locky Ransomware? Locky Ransomware is a piece of malware that encrypts important files on your computer, rendering them inaccessible and unusable. It holds them ‘hostage’, and in the meanwhile, demanding a ransom payment, in …Read More Locky Ransomware 101: Everything You Need to Know
Prolific Ransomware Can ‘Spread Automatically’ Inside Networks, CERT-FR WarnsProlific Ryuk ransomware has a new trick up its sleeve. “A Ryuk sample with worm-like capabilities – allowing it to spread automatically within networks it infects” was recent…Read More Ryuk Ransomware Updated With ‘Worm-Like Capabilities’
Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall, allowing attackers to log in as root users.Read More Firewall Vendor Patches Critical Auth Bypass Flaw
Resist the lure of catching up with award nominees by trolling for free views. Free, when offered by bad actors, could end up costing you much more than it would for a one-time rental.Read More Why what you watch can make you a target for cybercriminals
Remote employees have engaged in certain risky behaviors, such as storing sensitive data, using inappropriate admin access and failing to update software, says Tanium.Read More How to manage the security challenges triggered by remote work
USDT cryptocurrency developer Tether has said they are being extorted by threat actors who are demanding 500 bitcoins, or approximately $24 million, not to leak allegedly stolen emails and documents. […]Read More Tether cryptocurrency firm says docs in $24 million ransom are ‘forged’
Top executives of the software firm SolarWinds blamed an intern for having used a weak password for several years, exposing the company to hack. Top executives of the SolarWinds firm believe that the root cause of the recently disclosed supply chain attack is an intern that has used a weak password for several years. Initial […]
The post Intern caused ‘solarwinds123’ password leak, former SolarWinds CEO says appeared first on Security Affairs.Read More Intern caused ‘solarwinds123’ password leak, former SolarWinds CEO says
How’s your ‘Probiv’? How about customer service? Here’s how Dark Web forums connect cybercriminals looking for talent with those looking for work — and which skills are hot right now.Read More Cybercrime ‘Help Wanted’: Job Hunting on the Dark Web
80% of orgs admitted that a portion of their workforce are using personal computersRead More Half of Orgs Concerned Remote Working Puts Them at Greater Risk of Cyber-Attacks
Here’s the latest Naked Security Live talk – watch now!Read More Naked Security Live – Beware copyright scams
iPhones, iPads, and Macs seem set for even steeper performance and power management gains come 2022, as it looks like the company’s plans to switch to 3-nanometer (nm) chips are falling into place.Apple’s processor development road map
A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads.
“The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality ce…
Introduction The trojan is a sneaky impersonator that behaves like a legitimate program. It can hide in the background and steal information from the device. Trojan samples often delete, modify, block, and copy data to disrupt services provided by the …Read More Understanding Android Malware Families (UAMF) – The Trojan: An impersonator in the background (Article 2)
Tanium report finds only a third of businesses consider cybersecurity a top priority for 2021Read More 70% of Orgs Facing New Security Challenges Due to #COVID19 Pandemic
After an undisclosed number of subscribers were reportedly hit by malicious SIM swapping attacks, American telecommunications company T-Mobile has announced a data breach. The telecom giant revealed in a security breach notice sent to affected consumer…Read More T-Mobile Confirms Data Breach and SIM Swapping Attacks
Today’s podcast describes ways to avoid being victimized by fraud, and more
The post Cyber Security Today – Fraud Prevention Month starts, cyber incident costs hospital chain $67 million and problems with COVID apps first appeared on IT World Canada.
Gab, the Twitter-like social networking service known for its far-right userbase, has reportedly been hacked – putting more than 40 million public and private posts, messages, as well as user profiles and hashed passwords, at risk of exposure.
Read …Read More “Mentally ill demon hackers” blamed for massive Gab data leak
Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company called SolarWinds. The hack gave the attackers access to the computer networks of some 18,000 of SolarWinds’s customers, including US government agencies such as the Homeland Security Department and State Department, American nuclear research labs, government contractors, IT companies and nongovernmental agencies around the world.
It was a huge attack, with major implications for US national security. The Senate Intelligence Committee is scheduled to …Read More National Security Risks of Late-Stage Capitalism
Google Workspace launched new tools and features to help users make the most of their time, collaborate equally, and deliver more impact—wherever they are. According to Gartner, 90% of survey respondents plan to allow employees to work remotely at leas…Read More Google Workspace enables better connection between onsite and remote workers
Intezer warns of growing threat from programming languageRead More Go Malware Detections Increase 2000%
A critical, easy to exploit vulnerability (CVE-2021-22681) may allow attackers to remotely connect to a number of Rockwell Automation’s programmable logic controllers (PLCs) and to install new (malicious) firmware, alter the device’s config…Read More Critical flaw in Rockwell PLCs allows attackers to fiddle with them (CVE-2021-22681)
You might have heard of the social network Gab after the dramatic incidents that took place on the 6th of January in the USA. DDoSecrets stated that JaXpArO and My Little Anonymous Revival Project, a hacktivist, has siphoned over 70 GB of data out of G…Read More Gab Platform Hacked by Activist Group DDoSecrets
Riddle me this: What exactly is a “note-taking app”?It seems almost painfully obvious, I know — but it’s a question I’ve found myself struggling to answer as I’ve been exploring a new breed of information-storing services.The services allow you to c…Read More 3 next-level note-taking apps that’ll change the way you work
On Friday, popular tech news site Gizmodo published an article with the title: “Go Update Your Passwords Right Now”.
The problem is, it’s just not good advice…Read More Gizmodo gives poor password advice
Micro-businesses and sole traders urged to take the testRead More Self-Assessment Tool Aims to Enhance Small Biz Security
It was recently discovered that a new Ryuk variant lists all the IP addresses in the local ARP cache to propagate itself over the local network, and sends what looks like Wake-on-LAN (WOL) packets to each of the discovered devices, BleepingComputer wri…Read More Ryuk Ransomware Now Self-Spreads to Other Windows LAN Devices
Let’s first take a look back at 2020!
Adding to the list of difficulties that surfaced last year, 2020 was also grim for personal data protection, as it has marked a new record number of leaked credentials and PI data.
A whopping 20 billion records wer…
Amid heightened border tensions between India and China, cybersecurity researchers have revealed a concerted campaign against India’s critical infrastructure, including the nation’s power grid, from Chinese state-sponsored groups.
The attacks, which co…
There’s a lot of chatter about France’s new repairability index, a story about a surgeon’s Zoom call in the middle of surgery turns heads, and the comments of SolarWinds’ CEO It’s all the tech news that’s popular right now. Welcome to Hashtag Tre…Read More Hashtag Trending, March 1, 2021 – France’s new ‘repairability’ index; Zoom call during surgery; More tips to fight Zoom fatigue
COVID-19 struck IT like a tsunami in early 2020, sweeping away long-established operations and processes, forcing CIOs to quickly identify and deploy acceptable alternatives. Now, as the virus threat appears to be gradually receding, IT leaders are vie…Read More 7 ways COVID-19 has changed IT forever
ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users for illegal data collection. ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users. The settlement has yet to be approved by a federal judge. The Chinese firm was accused to have failed […]
The post ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection appeared first on Security Affairs.Read More ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection
Italian also threatened MPs and Black Lives Matters protestersRead More Berlin Resident Jailed for NHS Bomb Threats
As cybersecurity researchers continue to piece together the sprawling SolarWinds supply chain attack, top executives of the Texas-based software services firm blamed an intern for a critical password lapse that went unnoticed for several years.
I’m pleased to welcome the first new government onto Have I Been Pwned for 2021, Portugal. The Portuguese CSIRT, CERT.PT, now has full and free access to query their government domains across the entire scope of data in HIBP.
This is now the 12th government onboarded to HIBP andRead More Welcoming the Portuguese Government to Have I Been Pwned
The National Security Agency (NSA) published a document to explain the advantages of implementing a zero-trust model. The National Security Agency (NSA) recently published a document to explain the benefits of adopting a zero-trust model, and advice to navigate the process. Modern infrastructure are complex environments that combine multiple technologies and that are exposed to […]Read More NSA embraces the Zero Trust Security Model
How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer or mobile device or by manipulating your files in such…
The post Ransomware: The Types of and How to Make Ransomware? appeared first on Hacker Combat.Read More Ransomware: The Types of and How to Make Ransomware?
COVID-19 propelled the world of IT years into the future. Organizations considering long-term digital transformation plans were abruptly forced to accelerate their timeline, so employees could work remotely amid shelter-in-place orders. While this shif…Read More Protecting the digital workplace with an integrated security strategy
Attackers increasingly strive to leverage cloud weaknesses that enable them to deliver malware to end users, gain unauthorized access to production environments or their data, or completely compromise a target environment. This strategy is known as a w…Read More How do I select a cloud security solution for my business?
78% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to deal with distributed IT and work-from-home challenges, according to an IDG R…Read More Most IT security leaders lack confidence in their company’s security posture
In a recent report, Trend Micro announced it detected 119,000 cyber threats per minute in 2020 as home workers and infrastructure came under new pressure from attacks. Attacks on homes surged The report also shows that home networks were a major draw l…Read More Insights for navigating a drastically changing threat landscape
AppDynamics released its global research study, exploring the impact of the rapid acceleration of digital transformation created in response to the COVID-19 pandemic and the repercussions for global technologists. The findings reveal a dramatic increas…Read More Full-stack observability: The only way technologists can deal with IT complexity
95% of IT leaders say that client and company data is at risk on email, an Egress report reveals. Additionally, an overwhelming 83% of organizations have suffered data breaches via this channel in the last 12 months. Human error was at the root of near…Read More Data is most at risk on email, with 83% of organizations experiencing email data breaches
Last year, Verizon’s data breaches report showed that “human error” was the only factor with year-over-year increases in reported incidents. The average cost of data breaches from human error stands at $3.33 million, according to IBM’s Cost of a …Read More Fixing the “Human Error” Problem
Checkmarx announced the launch of KICS (Keeping Infrastructure as Code Secure), an open source static analysis solution that enables developers to write more secure infrastructure as code (IaC). With KICS, Checkmarx expands its AST product line, provid…Read More Checkmarx KICS enables developers to detect and fix configuration issues
Assured Data Protection announced the launch of its eXtended Detection and Response (XDR) service, providing businesses and MSPs with a fully automated and managed XDR solution powered by Confluera. The service delivers XDR across multiple data streams…Read More Assured Data Protection enhances cloud data management portfolio with XDR powered by Confluera
Featurespace introduces Automated Deep Behavioral Networks for the card and payments industry, providing a deeper layer of defense to protect consumers from scams, account takeover, card and payments fraud, which cost an estimated $42 billion in 2020. …Read More Featurespace Automated Deep Behavioral Networks protects from card and payments fraud
Transmit Security announced the release of BindID, customer authentication service that is completely password-free. BindID requires no customer software or dedicated hardware and can be used across any channel or device. Customers can authenticate and…Read More Transmit Security BindID: A password-free customer authentication service
The uCIFI Alliance announced the public release of the first unified data model to provide interoperability and interchangeability between connected devices to unlock smart cities, reduce cost and guarantee investments’ sustainability. The open-source …Read More uCIFI Alliance releases unified data model for smart city and utility devices
Advances in IoT devices have changed the scope of what is possible in the realm of home automation; high-end control systems once costing hundreds of thousands of dollars can be put together with IoT components for a fraction of the cost. The Quantum I…Read More Quantum Integration IoT platform allows anyone to build their own fully functional IoT network
The introduction of Version 6 of Cavirin‘s cloud security and compliance product delivers more efficient reporting and remediation. Rapid response to threats and awareness of a system’s health is a critical factor. The new AWS baseline poli…Read More Cavirin speeds up the process of keeping customers’ hybrid clouds safe
RiskRecon marked the expansion of its cybersecurity risk monitoring to 3.9 million companies globally. The essential insights into the health of digital ecosystems delivered by RiskRecon enables its clients to easily understand and act on their cyberse…Read More RiskRecon expands cybersecurity risk monitoring to 3.9 million companies globally
Paysafe is leveraging technology from Snowflake to achieve meaningful data insights and deliver more informed and enhanced customer experiences by tapping into Artificial Intelligence (AI) and Machine Learning (ML) data models. The announcement support…Read More Paysafe uses Snowflake to develop new data science models for enhanced customer experiences
CyberLink announced a partnership integrating its facial recognition software development kit (SDK) FaceMe into Vypin eScreener kiosks. The solution enables touchless access control and security, in an all-in-one facial recognition, mask detection, dig…Read More CyberLink integrates its facial recognition SDK FaceMe into Vypin eScreener kiosks
ThreatLocker announced its partnership with Datto. This integration streamlines secure business operations for MSPs, allowing them to access their Autotask PSA account from within the ThreatLocker portal. Ransomware remains the most common cyber threat…Read More ThreatLocker partners with Datto to streamline secure business operations for MSPs
A summary wrap-up of Rekt Casino Transformational Cybersecurity Leader webcast series.Read More Rekt Casino Revisited: Transformational Series Part 4
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, February 2021.Serious Linux VulnerabilityLast month a newly discovered critical vulnerability …Read More Cyber Security Roundup for March 2021
Very Good Security (VGS) has further cemented its commitment to securing the world’s information by empowering organizations to prepare for their first SOC 2 audits completely free with VGS Control (Control). Achieving SOC 2 compliance has historically…Read More Very Good Security helps organizations achieve SOC 2 compliance with VGS Control
HYAS announced that it had closed a $US16 million round of funding led by Austin, TX based, S3 Ventures. The funds will be used to accelerate product development and global market expansion for the company’s cyber attack infrastructure identification a…Read More HYAS raises $16M to accelerate product development and global market expansion
With Cloud PC, Microsoft would handle your device configuration in your organization with regular updates, security improvements, and managed support. Cloud PC appears to be a part of the company’s “Windows as a Service” tagline, which has become more …Read More Windows 10 Cloud PC: The latest info about Microsoft’s new service
During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security. During the recent video conference of the members of the European Council (25-26 February 2021), NATO chief Jens Stoltenberg highlighted the importance to define a strategy to boost defense and security. “We […]
The post EU leaders aim at boosting defense and security, including cybersecurity appeared first on Security Affairs.Read More EU leaders aim at boosting defense and security, including cybersecurity
An AOL mail phishing campaign is underway to steal users’ login name and password by warning recipients that their account is about to be closed. […]Read More Beware: AOL phishing email states your account will be closed
These Google-owned domains have confused even the most skilled researchers and security products time and time again if these are malicious. The domains in question are redirector.gvt1.com and gvt1/gvt2 subdomains that have spun many threads on the int…Read More What are these suspicious Google GVT1.com URLs?
These Google-owned domains have confused even the most skilled researchers and security products time and time again if these are malicious. The domains in question are redirector.gvt1.com and gvt1/gvt2 subdomains that have spun many threads on the int…Read More Don’t Worry: Google’s suspicious GVT1.com URLs aren’t dangerous
The New Zealand-based cryptocurrency exchange Cryptopia suffered a new cyber heist while it is in liquidation due to a 2019 security breach. In 2019, the New Zealand-based cryptocurrency exchange Cryptopia discloses a cyber attack that took place on January 14th. At the time of the first attack, the threat actors stole approximately USD 30 million […]
The post New Zealand-based cryptocurrency exchange Cryptopia hacked again appeared first on Security Affairs.Read More New Zealand-based cryptocurrency exchange Cryptopia hacked again
In an incident report published on Friday, Google said that a Google Voice outage affecting a majority of the telephone service’s users earlier this month was caused by expired TLS certificates. […]Read More Recent Google Voice outage caused by expired certificates
In an incident report published on Friday, Google said that a Google Voice outage affecting a majority of the telephone service’s users earlier this month was caused by expired TLS certificates. […]Read More Google Voice silenced by expired TLS certificate in February outage
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here. Bug bounty hacker earned $5,000 reporting a Stored XSS flaw in iCloud.com Experts warn of threat actors abusing […]Read More Security Affairs newsletter Round 303
Here’s an overview of some of last week’s most interesting news and articles: Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP! The day after VMware released fixes for a critical RCE flaw (CVE-2021-21972)…Read More Week in review: Kali Linux 2021.1, CNAME-based tracking, VMware vCenter Servers under attack
A critical authentication bypass vulnerability could be exploited by remote attackers to Rockwell Automation programmable logic controllers (PLCs). A critical authentication bypass vulnerability, tracked as CVE-2021-22681, can be exploited by remote attackers to compromise programmable logic controllers (PLCs) manufactured by Rockwell Automation. The vulnerability was independently reported to Rockwell by researchers at the Soonchunhyang University […]
The post Experts found a critical authentication bypass flaw in Rockwell Automation software appeared first on Security Affairs.Read More Experts found a critical authentication bypass flaw in Rockwell Automation software
Windows 10 ‘Sun Valley’ UI refresh, otherwise known as ‘version 21H2’, is reportedly arriving in the second half of this year and it will also include several new features. […]Read More The Windows 10 Sun Valley design refresh – Here’s what’s coming
Windows 10 ‘Sun Valley’ UI refresh, otherwise known as ‘version 21H2’, is reportedly arriving in the second half of this year and it will also include several new features. […]Read More Windows 10 Sun Valley design refresh — here’s what you need to know
The National Institute for Health Research (NIHR) Clinical Research Network (CRN) has appointed Samantha Liscio as its chief information and technology officer.
The post Samantha Liscio appointed as CITO at NIHR Clinical Research Network first appear…
‘Hotarus Corp’ Ransomware operators hacked Ecuador’s largest private bank, Banco Pichincha, and the country’s Ministry of Finance. A cybercrime group called ‘Hotarus Corp’ has breached the Ecuador’s largest private bank, Banco Pichincha, and the local Ministry of Finance (the Ministerio de Economía y Finanzas de Ecuador). The group claims to have also stolen data from […]
The post Hotarus Corp gang hacked Ecuador’s Ministry of Finance and Banco Pichincha appeared first on Security Affairs.Read More Hotarus Corp gang hacked Ecuador’s Ministry of Finance and Banco Pichincha
Critical Networks Within National Security Systems Should Implement Zero TrustThe US National Security Agency has issued its zero trust guidance aimed at securing critical networks and sensitive data within key federal agencies. The NSA adds it is also…Read More NSA Issues Guidance on Zero Trust Implementation
The National Security Agency (NSA) and Microsoft are advocating for the Zero Trust security model as a more efficient way for enterprises to defend against today’s increasingly sophisticated threats. […]Read More NSA, Microsoft promote a Zero Trust approach to cybersecurity
Microsoft has fixed a Windows 10 bug that could cause NTFS volumes to become corrupted by merely accessing a particular path or viewing a specially crafted file. […]Read More Microsoft fixes Windows 10 drive corruption bug — what you need to know
Project Zero, Google’s 0day bug-hunting team, shared technical details and proof-of-concept (PoC) exploit code for a critical remote code execution (RCE) bug affecting a Windows graphics component. […]Read More Google shares PoC exploit for critical Windows 10 Graphics RCE bug
The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after it became aware that some of its customers were allegedly victims of SIM swap attacks. Crooks conduct SIM swapping attacks to take control of victims’ […]
The post T-Mobile customers were hit with SIM swapping attacks appeared first on Security Affairs.Read More T-Mobile customers were hit with SIM swapping attacks
I honestly don’t know where my time goes. I get up, have great plans for all the things I want to do then next minute, the day is gone. There’s probably some hints in the range of different things I’m speaking about this week and the book is certainly nowRead More Weekly Update 232