Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 151

Apr 20, 2020

Israeli researchers: Hackers aiming to exploit government financial aid

Posted by in categories: biotech/medical, business, cybercrime/malcode, economics, finance, government

#Hackers are seeking to exploit the roll-out of government financial relief plans to fill their own pockets at the expense of businesses and affected workers, Israeli cyber researchers have revealed.


Hackers are exploiting the rollout of governmental financial relief to fill their pockets at the expense of businesses and affected workers, according to Israeli cyber researchers.

In recent weeks, governments have sought to ease cash-flow shortages and avoid a recession with ambitious stimulus packages and grants to households, including a massive $2 trillion economic package in the United States.

Continue reading “Israeli researchers: Hackers aiming to exploit government financial aid” »

Apr 19, 2020

Cognizant confirms Maze ransomware attack, says customers face disruption

Posted by in category: cybercrime/malcode

Maze, a data-stealing ransomware, typically publishes the data if a ransom is not paid.

Apr 18, 2020

Experimental COVID-19 Vaccine Hacks Your DNA to Build Immunity

Posted by in categories: biotech/medical, cybercrime/malcode, genetics

Just like a virus hijacks your cells and forces them to churn out more copies of the virus, this vaccine is expected to automate the production of those particles, which B-cells and T-cells — the biological hunter-seekers of the immune system — can use to ready themselves to fight the real-deal coronavirus.

The main difference between this sort of DNA-based vaccine and a traditional one, Slavcev told Futurism, is that it relies on the person’s cells to create the mock virus instead of merely exposing them to an inert version of the real virus.

“Personal genetics only has to do with how the vaccine is presented,” Slavcev told Futurism, regarding the decision to develop a DNA-based vaccine. “There is some variation between individuals and populations, but in this case the DNA is just to improve immune response and make it mimic a viral infection as closely as possible to stimulate the most effective immune response.”

Apr 17, 2020

‘DO NOT click the link’; Police warn of scam COVID-19 text messages

Posted by in categories: biotech/medical, cybercrime/malcode, mobile phones

Scam alert.


THOMASTON, Me. (WSET) — Police are warning cell phone users of a new text message scam during the coronavirus pandemic. The Thomaston Police Department in Maine posted on Facebook a photo of the alert being sent to people in a text message. The message was sent to someone in Maine from an Indiana area code telling them they need to self-isolate because they came in contact with someone who tested positive or has shown symptoms for coronavirus. The alert also tells you to get tested.

Apr 16, 2020

As more work from home, Dell unveils new BIOS shield

Posted by in categories: business, cybercrime/malcode, habitats

As millions of employees are suddenly working from home, computer security threats are on the rise. The sudden rush to set up home offices means many users working on insufficiently protected devices are exposing businesses to unprecedented new exposure to malicious hackers.

“While the world is grinding to a halt, cyber-attacks are on the rise, preying on public fear and anxiety,” says Yenni Tim, researcher of Cybersecurity at the University of New South Wales Business School in Sydney, Australia.

In an effort to combat , Dell Technologies last week released a utility that will protect one of the most sensitive components of a computer, the BIOS. Frequently the target of the most malicious malware assaults, the BIOS oversees critical computer processes, from boot-up to system configuration parameters.

Apr 11, 2020

Ransomware scumbags leak Boeing, Lockheed Martin, SpaceX documents after contractor refuses to pay

Posted by in categories: cybercrime/malcode, law, space travel

Anti-mortar system specs, legal paperwork, payment forms, and more, dumped online from infected PCs.

Apr 9, 2020

‘Unkillable’ Android malware gives hackers full remote access to your phone

Posted by in categories: cybercrime/malcode, mobile phones

The xHelper malware installs a trojan within a trojan within a trojan, and is almost impossible to remove.

Apr 9, 2020

DARPA snags Intel to lead its machine learning security tech

Posted by in categories: cybercrime/malcode, information science, military, robotics/AI

Chip maker Intel has been chosen to lead a new initiative led by the U.S. military’s research wing, DARPA, aimed at improving cyber-defenses against deception attacks on machine learning models.

Machine learning is a kind of artificial intelligence that allows systems to improve over time with new data and experiences. One of its most common use cases today is object recognition, such as taking a photo and describing what’s in it. That can help those with impaired vision to know what’s in a photo if they can’t see it, for example, but it also can be used by other computers, such as autonomous vehicles, to identify what’s on the road.

But deception attacks, although rare, can meddle with machine learning algorithms. Subtle changes to real-world objects can, in the case of a self-driving vehicle, have disastrous consequences.

Apr 8, 2020

Detecting real biological viruses with a smartphone

Posted by in categories: biotech/medical, cybercrime/malcode, economics, mobile phones

Most of us are similar with ‘viruses’ and malware relating to our computers or smartphones, but Yoshihiro Minagawa, a researcher from the University of Tokyo has taken it on literally – he has invented a portable, low-cost, battery-powered device that pairs with a smartphone, which was tested with viruses but could also detect other biological markers. His initial findings, together with other teammates were published recently in the journal, Lab on a Chip.

The current leading method to assess the presence of viruses and other biological markers of disease is effective but large and expensive. It is prohibitively difficult for use in many situations, especially due to certain economic and geographic factors. Although highly accurate at counting viruses, these tools are just too cumbersome for many situations, especially when rapid diagnosis is required.

“I wanted to produce a useful tool for inaccessible or less-affluent communities that can help in the fight against diseases such as influenza,” said Minagawa. “Diagnosis is a critical factor of disease prevention. Our device paves the way for better access to essential diagnostic tools.”

Apr 6, 2020

This Map Shows the Global Spread of Zero-Day Hacking Techniques

Posted by in categories: cybercrime/malcode, government

So-called zero-day exploits—hacking techniques that take advantage of secret software flaws—were once the calling card of only the most sophisticated hackers. But today, the global map of zero-day hacking has expanded far beyond the United States, Russia, and China, as more countries than ever buy themselves a spot on it.

Security and intelligence firm FireEye today released a sweeping analysis of how zero days have been exploited worldwide over the last seven years, drawing in data from other security research organizations’ reporting as well as Google Project Zero’s database of active zero days. FireEye was able to link the use of 55 of those secret hacking techniques to state-sponsored operations, going so far as to name which country’s government it believes to be responsible in each case.

The resulting map and timeline, with a tally of which countries have used the most zero days over the last decade, are far from comprehensive. Countries like the US almost certainly have used zero days that remain undetected, FireEye acknowledges, and many others couldn’t be pinned with certainty on any particular country. But it does show how the collection of countries using those hacking techniques now includes less expected players like the United Arab Emirates and Uzbekistan.