Menu

Blog

Page 3878

May 19, 2022

A bridge to Dath Ilan? Improved governance on the critical path to AI alignment

Posted by in categories: governance, robotics/AI

Showcasing my finalist entry in the Future of Life Institute’s AI worldbuilding competition.

May 19, 2022

U.S. monkeypox case reported, as Spain, Portugal report infections in growing outbreak

Posted by in category: futurism

😳!!!


Two more European countries reported unusual monkeypox cases on Wednesday, a development that suggests an outbreak first spotted in the United Kingdom is more widespread than first believed.

May 19, 2022

China Says Rover Discovered Glass Spheres on the Dark Side of the Moon

Posted by in category: space

Probs just an exterrestial’s ear ring or something đŸ€”


China’s Yutu-2 rover just won’t stop making — or at least claiming – weird discoveries on the Moon. Case in point, Chinese space authorities now say it’s found several mysterious glass spheres found on the far side of the lunar surface.

The team behind the discovery published a paper about the findings in the journal Science Bulletin, in which they describe the objects as “translucent glass globules.”

Continue reading “China Says Rover Discovered Glass Spheres on the Dark Side of the Moon” »

May 19, 2022

Memory-restoring molecule provides new hope in the search for a cure for Alzheimer’s

Posted by in categories: biotech/medical, neuroscience

An experiment in mice has shown that a protein in the nervous system can have a rejuvenating effect on older animals, a finding which may help with future research into how to treat the neurological disease.

May 18, 2022

More than 200 apps on Play Store with millions of downloads are stealing users’ passwords and sensitive information

Posted by in categories: cybercrime/malcode, finance, mobile phones

Researchers at Trend Micro identified a set of mobile apps available on the Google Play Store performing malicious tasks in the background, including stealing user credentials and banking details from Android users. Some of these apps have nearly 100,000 downloads, so the scope of the problem is considerable.

In total, the analysis revealed the detection of 200 malicious applications that hide code from dangerous malware variants, capable of putting users of the affected devices in serious trouble.

Continue reading “More than 200 apps on Play Store with millions of downloads are stealing users’ passwords and sensitive information” »

May 18, 2022

New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack

Posted by in category: security

A group of researchers developed a tool capable of detecting errors in the way applications such as Adobe Acrobat or Microsoft Word process JavaScript code, which has allowed finding a total of 134 security flaws, of which 33 have already received a CVE tracking key.

The tool is called “Cooper”, in reference to the technique known as “Cooperative Mutation” it employees. Xu Peng, a software development specialist and co-author of the tool, explains that tools like the ones mentioned accept information from scripting languages; for example, Acrobat allows JavaScript to manipulate PDF files.

Continue reading “New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack” »

May 18, 2022

Researchers Expose Inner Workings of Billion-Dollar Wizard Spider Cybercrime Gang

Posted by in category: cybercrime/malcode

Researchers reveal the inner workings of a cybercriminal group known as the Wizard Spider.


Microsoft warns of a new malicious campaign targeting SQL Servers that involves use of a built-in PowerShell utility (sqlps.exe).

May 18, 2022

Hackers Gain Fileless Persistence on Targeted SQL Servers Using a Built-in Utility

Posted by in category: futurism

Microsoft warns of a new malicious campaign targeting SQL Servers that involves use of a built-in PowerShell utility (sqlps.exe).

May 18, 2022

Microsoft Warns of “Cryware” Info-Stealing Malware Targeting Crypto Wallets

Posted by in categories: cryptocurrencies, cybercrime/malcode, internet

Microsoft warns of “cryware” malware that steals information and exfiltrate data directly from non-custodial cryptocurrency wallets.


Microsoft is warning of an emerging threat targeting internet-connected cryptocurrency wallets, signaling a departure in the use of digital coins in cyberattacks.

The tech giant dubbed the new threat “cryware,” with the attacks resulting in the irreversible theft of virtual currencies by means of fraudulent transfers to an adversary-controlled wallet.

Continue reading “Microsoft Warns of ‘Cryware’ Info-Stealing Malware Targeting Crypto Wallets” »

May 18, 2022

Researchers developing underwater map-making robot

Posted by in category: robotics/AI

Researchers at the Stevens Institute of Technology used a customized BlueROV2 robot to explore a busy harbor at the U.S. Merchant Marine Academy in New York. | Source: Stevens Institute of Technology.

Underwater environments can be particularly challenging for autonomous robots. Things are constantly moving and changing, and robots need to figure out where they are without relying on GPS data.

Researchers at the Stevens Institute of Technology have created a robot that is able to successfully navigate a crowded marina underwater. The robot is able to map its environment, track its own location and plan a safe route through a complex environment in real-time, simultaneously.