Archive for the ‘cybercrime/malcode’ category: Page 86

Feb 8, 2022

Feds arrest married couple, seize $3.6 billion in hacked bitcoin funds

Posted by in categories: bitcoin, cryptocurrencies, cybercrime/malcode, habitats

Tom HlavacSustainable would be a home built of hempcrete, with a greenhouse capable of growing enough food for the family, a small henhouse, and a few bee hives. And a septic system capable of producing fertilizer.

No need for megacorporate involvement. Somethi… See more.

Tom HlavacIf Musk could catalyze adoption of hempcrete and mass produce 3D printers for that, he would do more if value than everything he has done before.

Continue reading “Feds arrest married couple, seize $3.6 billion in hacked bitcoin funds” »

Feb 8, 2022

Medusa malware ramps up Android SMS phishing attacks

Posted by in categories: cybercrime/malcode, finance, robotics/AI

The Medusa Android banking Trojan is seeing increased infection rates as it targets more geographic regions to steal online credentials and perform financial fraud.

Today, researchers at ThreatFabric have published a new report detailing the latest tricks employed by the Medusa malware and how it continues to evolve with new features.

Feb 7, 2022

A lone hacker on a revenge mission says he is the one who keeps turning off North Korea’s internet

Posted by in categories: cybercrime/malcode, internet

The American hacker — who goes by the handle P4x — told Wired he was one of the victims of a cyberattack last year on Western security researchers carried out by North Korean spies. He said he was frustrated that he was a target and that the US appeared to have a lacking response.

He said the hackers tried to snatch hacking tools and information on software vulnerabilities but he was able to stop them before they could get anything worthwhile. Nonetheless, there was a feeling of resentment, he told Wired.

“It felt like the right thing to do here,” P4x told Wired, adding: “If they don’t see we have teeth, it’s just going to keep coming.

Feb 2, 2022

Inside Trickbot, Russia’s Notorious Ransomware Gang

Posted by in categories: cybercrime/malcode, futurism

Despite the arrests and wider ransomware crackdowns in Russia, the Trickbot group has not exactly gone into hiding. Toward the end of last year, the group boosted its operations, says Limor Kessem, an executive security advisor at IBM Security. “They’re trying to infect as many people as possible by contracting out the infection,” she says. Since the start of 2022, the IBM security team has seen Trickbot increase its efforts to evade security protections and conceal its activity. The FBI also formally linked the use of the Diavol ransomware to Trickbot at the beginning of the year. “Trickbot doesn’t seem to be targeting very specifically; I think what they have is numerous affiliates working with them, and whoever brings the most money is welcome to stay,” Limor says.

Holden too says he has seen evidence that Trickbot is ramping up its operations. “Last year they invested more than $20 million into their infrastructure and growth of their organization,” he explains, citing internal messages he has seen. This money, he says, is being spent on everything Trickbot does. “Staffing, technology, communications, development, extortion” are all getting extra investment, he says. The move points to a future where—after the takedown of REvil—the Trickbot group may become the primary Russia-linked cybercrime gang. “You expand in the hope of getting that money back in spades,” Holden says. “It’s not like they are planning to close the shop. It’s not like they are planning to downsize or run and hide.”

Feb 1, 2022

Custom Macintosh With A Real 486

Posted by in categories: cybercrime/malcode, futurism

Older Apple computers can often be something of a collector’s item, with the oldest fetching an enormously high price in auctions. The ones from the late ’80s and early ’90s don’t sell for quite as much yet, but it’s possible that museums and collectors of the future will one day be clamoring for those as well. For that reason, it’s generally frowned upon to hack or modify original hardware. Luckily, this replica of an Apple Macintosh didn’t harm any original hardware yet still manages to run software on bare metal.

The computer is built around a single-board computer, but this SBC isn’t like the modern ARM machines that have become so ubiquitous. It’s a 133MHz AMD 486 which means that it can run FreeDOS and all of the classic DOS PC games of that era without emulation. In order to run Apple’s legacy operating system, however, it does require the use of the vMac emulator, but the 486 is quite capable of handling the extra layer of abstraction. The computer also sports a real SoundBlaster ISA sound card, uses a microSD card for its hard drive, and uses an 800×600 LCD screen.

As a replica, this computer is remarkably faithful to the original and even though it doesn’t ship with a Motorola 68,000 it’s still fun to find retro PC gamers that are able to run their games on original hardware rather than emulation. It reminds us of another retro 486 that is capable of running old games on new hardware without an emulator as well.

Jan 31, 2022

Delete This Authenticator Android App Immediately To Avoid Its Banking Malware Payload

Posted by in categories: cybercrime/malcode, finance

This authenticator app is designed to install bank info-stealing malware that could wipe you out.

Jan 31, 2022

GPU RAM Upgrades Are Closer Than You Think

Posted by in category: cybercrime/malcode

We’re all used to swapping RAM in our desktops and laptops. What about a GPU, though? [dosdude1] teaches us that soldered-on RAM is merely a frontier to be conquered. Of course, there’s gotta be a good reason to undertake such an effort – in his case, he couldn’t find the specific type of Nvidia GT640 that could be flashed with an Apple BIOS to have his Xserve machine output the Apple boot screen properly. All he could find were 1GB versions, and the Apple BIOS could only be flashed onto a 2GB version. Getting 2GB worth of DDR chips on Aliexpress was way too tempting!

The video goes through the entire replacement process, to the point where you could repeat it yourself — as long as you have access to a preheater, which is a must for reworking relatively large PCBs, as well as a set of regular tools for replacing BGA chips. In the end, the card booted up, and, flashed with a new BIOS, successfully displayed the Apple bootup logo that would normally be missing without the special Apple VBIOS sauce. If you ever want to try such a repair, now you have one less excuse — and, with the GT640 being a relatively old card, you don’t even risk all that much!

Continue reading “GPU RAM Upgrades Are Closer Than You Think” »

Jan 30, 2022

Quantum Computers Could Crack Bitcoin. Here’s What It Would Take

Posted by in categories: bitcoin, chemistry, cryptocurrencies, cybercrime/malcode, encryption, energy, mathematics, quantum physics, supercomputing

Quantum computers could cause unprecedented disruption in both good and bad ways, from cracking the encryption that secures our data to solving some of chemistry’s most intractable puzzles. New research has given us more clarity about when that might happen.

Modern encryption schemes rely on fiendishly difficult math problems that would take even the largest supercomputers centuries to crack. But the unique capabilities of a quantum computer mean that at sufficient size and power these problems become simple, rendering today’s encryption useless.

That’s a big problem for cybersecurity, and it also poses a major challenge for cryptocurrencies, which use cryptographic keys to secure transactions. If someone could crack the underlying encryption scheme used by Bitcoin, for instance, they would be able to falsify these keys and alter transactions to steal coins or carry out other fraudulent activity.

Jan 30, 2022

This Week’s Awesome Tech Stories From Around the Web (Through January 29)

Posted by in categories: biotech/medical, cybercrime/malcode, internet, robotics/AI

From an autonomous robotic surgeon to the world’s most powerful cyberweapon, check out this week’s awesome tech stories from around the web.

Jan 30, 2022

5 Ways Artificial Intelligence Is Radically Transforming Creativity in Business

Posted by in categories: business, cybercrime/malcode, robotics/AI

Cybersecurity professionals are already using this tech to identify new types of malware and protect sensitive data for organizations. The beauty of implementing AI systems in a cybersecurity strategy is that they learn as they analyze more data, so they get better at their jobs with new experiences.

The business world is ever-changing, and customer behavior is evolving. Managing the radical transformation can be challenging, but it doesn’t have to be when you’ve got AI at your beck and call. Several SMEs and startups have leveraged AI to capture market share and establish their brand.

Soon, AI in business will no longer be a luxury — it will be a necessity. Companies that don’t keep pace with consumers’ expectations will fall short and lose market share. The only way to stay relevant is to adopt the trend.

Page 86 of 207First8384858687888990Last