Menu

Blog

Page 4548

May 19, 2022

China Says Rover Discovered Glass Spheres on the Dark Side of the Moon

Posted by in category: space

Probs just an exterrestial’s ear ring or something 🤔


China’s Yutu-2 rover just won’t stop making — or at least claiming – weird discoveries on the Moon. Case in point, Chinese space authorities now say it’s found several mysterious glass spheres found on the far side of the lunar surface.

The team behind the discovery published a paper about the findings in the journal Science Bulletin, in which they describe the objects as “translucent glass globules.”

Continue reading “China Says Rover Discovered Glass Spheres on the Dark Side of the Moon” »

May 19, 2022

Memory-restoring molecule provides new hope in the search for a cure for Alzheimer’s

Posted by in categories: biotech/medical, neuroscience

An experiment in mice has shown that a protein in the nervous system can have a rejuvenating effect on older animals, a finding which may help with future research into how to treat the neurological disease.

May 18, 2022

More than 200 apps on Play Store with millions of downloads are stealing users’ passwords and sensitive information

Posted by in categories: cybercrime/malcode, finance, mobile phones

Researchers at Trend Micro identified a set of mobile apps available on the Google Play Store performing malicious tasks in the background, including stealing user credentials and banking details from Android users. Some of these apps have nearly 100,000 downloads, so the scope of the problem is considerable.

In total, the analysis revealed the detection of 200 malicious applications that hide code from dangerous malware variants, capable of putting users of the affected devices in serious trouble.

Continue reading “More than 200 apps on Play Store with millions of downloads are stealing users’ passwords and sensitive information” »

May 18, 2022

New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack

Posted by in category: security

A group of researchers developed a tool capable of detecting errors in the way applications such as Adobe Acrobat or Microsoft Word process JavaScript code, which has allowed finding a total of 134 security flaws, of which 33 have already received a CVE tracking key.

The tool is called “Cooper”, in reference to the technique known as “Cooperative Mutation” it employees. Xu Peng, a software development specialist and co-author of the tool, explains that tools like the ones mentioned accept information from scripting languages; for example, Acrobat allows JavaScript to manipulate PDF files.

Continue reading “New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack” »

May 18, 2022

Researchers Expose Inner Workings of Billion-Dollar Wizard Spider Cybercrime Gang

Posted by in category: cybercrime/malcode

Researchers reveal the inner workings of a cybercriminal group known as the Wizard Spider.


Microsoft warns of a new malicious campaign targeting SQL Servers that involves use of a built-in PowerShell utility (sqlps.exe).

May 18, 2022

Hackers Gain Fileless Persistence on Targeted SQL Servers Using a Built-in Utility

Posted by in category: futurism

Microsoft warns of a new malicious campaign targeting SQL Servers that involves use of a built-in PowerShell utility (sqlps.exe).

May 18, 2022

Microsoft Warns of “Cryware” Info-Stealing Malware Targeting Crypto Wallets

Posted by in categories: cryptocurrencies, cybercrime/malcode, internet

Microsoft warns of “cryware” malware that steals information and exfiltrate data directly from non-custodial cryptocurrency wallets.


Microsoft is warning of an emerging threat targeting internet-connected cryptocurrency wallets, signaling a departure in the use of digital coins in cyberattacks.

The tech giant dubbed the new threat “cryware,” with the attacks resulting in the irreversible theft of virtual currencies by means of fraudulent transfers to an adversary-controlled wallet.

Continue reading “Microsoft Warns of ‘Cryware’ Info-Stealing Malware Targeting Crypto Wallets” »

May 18, 2022

Researchers developing underwater map-making robot

Posted by in category: robotics/AI

Researchers at the Stevens Institute of Technology used a customized BlueROV2 robot to explore a busy harbor at the U.S. Merchant Marine Academy in New York. | Source: Stevens Institute of Technology.

Underwater environments can be particularly challenging for autonomous robots. Things are constantly moving and changing, and robots need to figure out where they are without relying on GPS data.

Researchers at the Stevens Institute of Technology have created a robot that is able to successfully navigate a crowded marina underwater. The robot is able to map its environment, track its own location and plan a safe route through a complex environment in real-time, simultaneously.

May 18, 2022

Marc Raibert, master of robotics, is making machines smarter — and more useful

Posted by in categories: robotics/AI, transportation

The Boston Dynamics founder behind the popular Spot and Stretch robots makes robotics look easy. He’s #26 on the list.


Tech Power Players 50

Now it’s time to tackle something almost as challenging, and perhaps more profitable — unloading trucks.

Continue reading “Marc Raibert, master of robotics, is making machines smarter — and more useful” »

May 18, 2022

First 2022 US case of Monkeypox confirmed

Posted by in categories: biotech/medical, health

Massachusetts health officials on Wednesday confirmed a single case of monkeypox virus infection in an adult male who health officials said recently traveled to Canada.

The Department of Public Health said monkeypox is a rare but potentially serious viral illness that typically begins with flu-like symptoms and swelling of the lymph nodes. It progresses to a rash on the face and body, with most infections lasting two to four weeks.