Attacks on vulnerable computer networks and cyber-infrastructure—often called zero-day attacks—can quickly overwhelm traditional defenses, resulting in billions of dollars of damage and requiring weeks of manual patching work to shore up the systems after the intrusion.
Category: cybercrime/malcode – Page 145
Researchers allege that software used for downloading Android apps onto PCs and Macs has been compromised to install malware onto victim devices.
The domain name perl.com was stolen this week and is now points to an IP address associated with malware campaigns.
U.S. and Bulgarian authorities took control of the dark web site used by the NetWalker ransomware cybercrime group.
Law enforcement agencies dismantled the infrastructure of Emotet, a notorious email-based Windows malware behind several botnet-driven spam campaigns.
Well, maybe they would be good memories. 😃
Quantum computers, according to experts, will one day be capable of performing incredible calculations and nearly unfathomable feats of logic. In the near future, we know they’ll help us discover new drugs to fight disease and new materials to build with. But the far future potential for these enigmatic machines is as vast as the universe itself.
The realm of classic science fiction is littered with ideas that today’s experts believe lie within the realm of reality – if not today’s reality, then perhaps tomorrow’s quantum computer-laden one. One of those ideas comes straight out of a Paul Verhoeven film from over thirty years ago: Total Recall.
In fairness, the film (we’re talking about the 1990 one starring the former governor of California not the 2012 remake) was based on a short story by Phillip K Dick. But for the purposes of this article we’ll be discussing the movie’s depiction of “Rekall,” a mysterious company portrayed in the film.
Controversy brewing?
But the site also touches on a sensitive topic in the cyber-security industry. For decades, security researchers have been secretly hacking back against malware operators.
Just like malware sometimes uses bugs in legitimate apps to infiltrate systems, security firms have also used bugs in malware code to infiltrate the attacker’s infrastructure.
In 2021 Trend Micro predicts that cybercriminals will look to home networks as a critical launch pad to compromising corporate IT and IoT networks.