Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 139

Apr 9, 2020

‘Unkillable’ Android malware gives hackers full remote access to your phone

Posted by in categories: cybercrime/malcode, mobile phones

The xHelper malware installs a trojan within a trojan within a trojan, and is almost impossible to remove.

Apr 9, 2020

DARPA snags Intel to lead its machine learning security tech

Posted by in categories: cybercrime/malcode, information science, military, robotics/AI

Chip maker Intel has been chosen to lead a new initiative led by the U.S. military’s research wing, DARPA, aimed at improving cyber-defenses against deception attacks on machine learning models.

Machine learning is a kind of artificial intelligence that allows systems to improve over time with new data and experiences. One of its most common use cases today is object recognition, such as taking a photo and describing what’s in it. That can help those with impaired vision to know what’s in a photo if they can’t see it, for example, but it also can be used by other computers, such as autonomous vehicles, to identify what’s on the road.

But deception attacks, although rare, can meddle with machine learning algorithms. Subtle changes to real-world objects can, in the case of a self-driving vehicle, have disastrous consequences.

Apr 8, 2020

Detecting real biological viruses with a smartphone

Posted by in categories: biotech/medical, cybercrime/malcode, economics, mobile phones

Most of us are similar with ‘viruses’ and malware relating to our computers or smartphones, but Yoshihiro Minagawa, a researcher from the University of Tokyo has taken it on literally – he has invented a portable, low-cost, battery-powered device that pairs with a smartphone, which was tested with viruses but could also detect other biological markers. His initial findings, together with other teammates were published recently in the journal, Lab on a Chip.

The current leading method to assess the presence of viruses and other biological markers of disease is effective but large and expensive. It is prohibitively difficult for use in many situations, especially due to certain economic and geographic factors. Although highly accurate at counting viruses, these tools are just too cumbersome for many situations, especially when rapid diagnosis is required.

“I wanted to produce a useful tool for inaccessible or less-affluent communities that can help in the fight against diseases such as influenza,” said Minagawa. “Diagnosis is a critical factor of disease prevention. Our device paves the way for better access to essential diagnostic tools.”

Apr 6, 2020

This Map Shows the Global Spread of Zero-Day Hacking Techniques

Posted by in categories: cybercrime/malcode, government

So-called zero-day exploits—hacking techniques that take advantage of secret software flaws—were once the calling card of only the most sophisticated hackers. But today, the global map of zero-day hacking has expanded far beyond the United States, Russia, and China, as more countries than ever buy themselves a spot on it.

Security and intelligence firm FireEye today released a sweeping analysis of how zero days have been exploited worldwide over the last seven years, drawing in data from other security research organizations’ reporting as well as Google Project Zero’s database of active zero days. FireEye was able to link the use of 55 of those secret hacking techniques to state-sponsored operations, going so far as to name which country’s government it believes to be responsible in each case.

The resulting map and timeline, with a tally of which countries have used the most zero days over the last decade, are far from comprehensive. Countries like the US almost certainly have used zero days that remain undetected, FireEye acknowledges, and many others couldn’t be pinned with certainty on any particular country. But it does show how the collection of countries using those hacking techniques now includes less expected players like the United Arab Emirates and Uzbekistan.

Apr 5, 2020

Aijobs on Facebook Watch

Posted by in categories: cybercrime/malcode, information science, robotics/AI, virtual reality

This is when #ai will replace humans at creative tasks. 🧠 Credit: @worldeconomicforum… Looking for a job in AI & Machine Learning. Follow us for more updates or visit: https://aijobs.com/

#aijobs #artificialintelligence #datascience #IoT #AIoT #robot #robots #deeplearning #robotics #tecnologia #cybersecurity #aiskills #artificialintelligenceai #machinelearning #machinelearningalgorithms #futuretechnology #ML #computerengineer #codinglife #coding #programmerlife #VR #technologies #techie

Apr 5, 2020

Coronavirus leaves US laptops and home devices exposed to cyberattacks

Posted by in categories: biotech/medical, business, cybercrime/malcode

As the coronaviruspandemic sweeps across the United States, another invisible enemy is threatening America’s data security.

From stealing data to disseminating misinformation, hackers are taking advantage of the US at an especially vulnerable time during the war against the deadly outbreak.


As millions of Americans have been ordered to work from home to contain the spread of the virus, data is now being transmitted outside secure business networks, making it a treasure trove for hackers.

Continue reading “Coronavirus leaves US laptops and home devices exposed to cyberattacks” »

Apr 1, 2020

IBM, NUS tie up to tap quantum computing for problem solving

Posted by in categories: cybercrime/malcode, finance, quantum physics

Computing giant IBM and the National University of Singapore (NUS) have embarked on a three-year collaboration to find ways to use quantum computing to solve real-world problems and train quantum scientists.

Quantum computers are currently used in many areas, including medical research into new drug development and the enhancement of cyber security in the financial sector.

The collaboration between IBM and NUS, announced yesterday, is the first of its kind in South-east Asia and gives NUS researchers access to 15 of IBM’s powerful quantum computing systems via a cloud service.

Apr 1, 2020

Israel’s MDA to treat coronavirus patients with new ‘passive vaccine’

Posted by in categories: biotech/medical, cybercrime/malcode

The first patient who recovered from coronavirus donated plasma on Wednesday that will be used to create a “passive vaccine” to treat Israelis who are severely ill with COVID-19.


This assumes that those who have recovered from COVID-19 have developed special anti-virus proteins or antibodies in their plasma, which could therefore help sick patients cope with the disease.

Mar 30, 2020

COVID-19: Hackers Begin Exploiting Zoom’s Overnight Success to Spread Malware

Posted by in categories: biotech/medical, cybercrime/malcode

Many people are turning to Zoom in this time. I suggested my Dad use it for his church…but…Watch Out! After #coronavirus domains, experts find a massive surge in suspicious “Zoom” named domains in the last 7 days, potentially registered by hackers to exploit #Zoom’s overnight success in this pandemic time to spread #malware… #COVID19


Covid-19 impact: hackers begin exploiting zoom’s overnight success to spread malware during coronavirus outbreak with fake domains and websites.

Mar 28, 2020

An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

Posted by in category: cybercrime/malcode

South Korea is a prime suspect for exploiting the secret software vulnerabilities in a sophisticated espionage campaign.