Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 84

Dec 16, 2021

Neural networks can hide malware, and scientists are worried

Posted by in categories: cybercrime/malcode, robotics/AI

This article is part of our reviews of AI research papers, a series of posts that explore the latest findings in artificial intelligence.

With their millions and billions of numerical parameters, deep learning models can do many things: detect objects in photos, recognize speech, generate text—and hide malware. Neural networks can embed malicious payloads without triggering anti-malware software, researchers at the University of California, San Diego, and the University of Illinois have found.

Their malware-hiding technique, EvilModel, sheds light on the security concerns of deep learning, which has become a hot topic of discussion in machine learning and cybersecurity conferences. As deep learning becomes ingrained in applications we use every day, the security community needs to think about new ways to protect users against their emerging threats.

Dec 13, 2021

China’s ‘Unhackable’ Quantum Satellite System Promises To Defend World’s Largest Power Grid Against Cyber Attacks

Posted by in categories: cybercrime/malcode, energy, quantum physics

China has developed what it calls a Quantum Satellite System in a bid to combat any adversary intrusion into its power infrastructure. The country boasts the world’s largest national power grid.

Dec 12, 2021

1.6 Million WordPress Sites Under Cyberattack From Over 16,000 IP Addresses

Posted by in category: cybercrime/malcode

Nearly 1.6 million WordPress websites were targeted with 13.7 million malicious requests from 16,000 different IP addresses.

Dec 12, 2021

Apache Log4j Vulnerability — Log4Shell — Widely Under Active Attack

Posted by in categories: cryptocurrencies, cybercrime/malcode

Several hackers are actively weaponizing “Log4Shell” vulnerability in Apache Log4j to install cryptocurrency miners, Cobalt Strike, and botnet malware.

Dec 12, 2021

New Cyber Protections Against Stealthy “Logic Bombs” Targeting 3D Printed Drones, Prostheses and Medical Devices

Posted by in categories: biotech/medical, cybercrime/malcode, drones, health

Cyber attackers could target 3D printed objects in health care, aerospace, and other fields.

Cybersecurity researchers at Rutgers University-New Brunswick and the Georgia Institute of Technology have proposed new ways to protect 3D printed objects such as drones, prostheses, and medical devices from stealthy “logic bombs.”

The researchers will present their paper, titled “Physical Logic Bombs in 3D Printers via Emerging 4D Techniques,” at the 2021 Annual Computer Security Applications Conference on December 10, 2021.

Dec 10, 2021

Global race to patch critical computer bug

Posted by in categories: cybercrime/malcode, government

Security experts around the world raced Friday to patch one of the worst computer vulnerabilities discovered in years, a critical flaw in open-source code widely used across industry and government in cloud services and enterprise software.

“I’d be hard-pressed to think of a company that’s not at risk,” said Joe Sullivan, chief security officer for Cloudflare, whose online infrastructure protects websites from malicious actors. Untold millions of servers have it installed, and experts said the fallout would not be known for several days.

New Zealand’s computer emergency response team was among the first to report that the flaw in a Java-language utility for Apache servers used to log user activity was being “actively exploited in the wild” just hours after it was publicly reported Thursday and a patch released.

Dec 10, 2021

Community of ethical hackers needed to prevent AI’s looming ‘crisis of trust’, experts argue

Posted by in categories: cybercrime/malcode, existential risks, robotics/AI

The Artificial Intelligence industry should create a global community of hackers and “threat modelers” dedicated to stress-testing the harm potential of new AI products in order to earn the trust of governments and the public before it’s too late.

This is one of the recommendations made by an international team of risk and machine-learning experts, led by researchers at the University of Cambridge’s Center for the Study of Existential Risk (CSER), who have authored a new “call to action” published today in the journal Science.

They say that companies building intelligent technologies should harness techniques such as “red team” hacking, audit trails and “bias bounties”—paying out rewards for revealing ethical flaws—to prove their integrity before releasing AI for use on the wider public.

Dec 10, 2021

Microsoft researchers: We’ve trained AI to find software bugs using hide-and-seek

Posted by in categories: cybercrime/malcode, robotics/AI

Microsoft creates an AI bug detector that learns to hunt for and fix bugs without being trained on data from real bugs.

Dec 9, 2021

Google disrupts cybercrime web infecting 1 mn devices

Posted by in categories: bitcoin, cybercrime/malcode

Google said Tuesday it has moved to shut down a network of about one million hijacked electronic devices used worldwide to commit online crimes, while also suing Russia-based hackers the tech giant claimed were responsible.

The so-called botnet of infected devices, which was also used to surreptitiously mine bitcoin, was cut off at least for now from the people wielding it on the internet.

“The operators of Glupteba are likely to attempt to regain control of the botnet using a backup command and control mechanism,” wrote Shane Huntley and Luca Nagy from Google’s threat analysis group.

Dec 7, 2021

Criminal hackers are now going after phone lines, too

Posted by in categories: cybercrime/malcode, mobile phones

One way or another, most phone calls these days involve the internet. Cybersecurity experts say that makes us vulnerable in ways we might not realize.

Page 84 of 199First8182838485868788Last