KELVIN OGBA DAFIAGHOR joins us all the way from Nigeria to attend #GISECGlobal 2022. He is the CEO of the Ogba Educational Clinic and he decided to visit GISEC to network with cybersecurity professionals from all over the world, as well as tech giants exhibiting at the show. It’s been an absolute pleasure having you with us, Kelvin, see you in 2023! 🤩.
Category: cybercrime/malcode – Page 101
Ernesto Di Maio is severely allergic to the yeast in leavened foods. “I have to go somewhere and hide because I will be fully covered with bumps and bubbles on the whole body,” he says. “It’s really brutal.”
Di Maio is a materials scientist at the University of Naples Federico II where he studies the formation of bubbles in polymers like polyurethane. He’s had to swear off bread and pizza, which can make outings in Italy a touch awkward. “It’s quite hard in Naples not to eat pizza,” he explains. “People would say, ‘Don’t you like pizza? Why are you having pasta? That’s strange.’”
So Di Maio put Iaccarino and another graduate student, Pietro Avallone, to work on a project to make pizza dough without yeast. The results of this scientific and culinary experiment are published in Tuesday’s edition of Physics of Fluids. Di Maio pulled in another colleague: chemical engineer Rossana Pasquino who studies the flow of materials, everything from toothpaste to ketchup to plastics. “Pizza [dough] is a funny material,” she explains, “because it flows, but it has to be also like rubber. It has to be elastic enough [when it’s cooked] to be perfect when you eat it.” — I had to post this because I love Pizza.
Bread geeks, take note! The new technique, developed in a lab in Naples, involves the smart application of materials science and physics to make airy, bubbly dough without fermentation.
You’ve probably received this message already — just don’t open it. Details:
Facebook Messenger users have been told to ignore a four-letter message that could lead to disastrous financial consequences or stolen personal information.
Scammers use the instant messaging platform to send out a four-word “look what I found …” message, and a link from compromised accounts. These message also include emojis as well, 7News reports.
If interacted with, the link takes the user to a site where they’re asked to enter their Facebook log in details. This allows the scammer to steal sensitive information from the user’s profile, or install malware on their phone or computer.
A teenager in the UK may be the leader of attacks on Microsoft, Samsung and Nvidia, Bloomberg reports.
U.S. authorities have flagged the U.S. financial system, a central pillar in the U.S. sanctions regime, as an attractive target, and officials and security experts have warned for weeks about the possibility of retaliatory cyberattacks from Russia.
A new malware strain that can survive operating system reinstalls was spotted last year secretly hiding on a computer, according to the antivirus provider Kaspersky.
The company discovered the Windows-based malware last spring running on a single computer. How the malicious code infected the system remains unclear. But the malware was designed to operate on the computer’s UEFI firmware, which helps boot up the system.
The malware, dubbed MoonBounce, is especially scary because it installs itself on the motherboard’s SPI flash memory, instead of the computer’s storage drive. Hence, the malware can persist even if you reinstall the computer’s OS or swap out the storage.
“The investigation into the recent cyber event on the KA-SAT European network continues in partnership with law enforcement, government partners and Viasat’s third-party cybersecurity firm,” Viasat said in a statement March 11. “We currently believe this was a deliberate, isolated and external cyber event.”
The ‘Escobar’ malware has so far targeted customers from 190 financial institutions across 18 different countries. Specific details related to the country and institutions have not been revealed.
The NVIDIA hackers have now targeted Samsung. Here’s what Galaxy smartphone owners need to know.
Businesses need to have a complete view of where potential vulnerabilities or misconfigurations exist in the software supply chain.