Apr 28, 2020
MIT Scientists Are Building Devices to Hack Your Dreams
Posted by Shane Hinshaw in category: cybercrime/malcode
Lucid in the sky.
Lucid in the sky.
Software bugs have been a concern for programmers for nearly 75 years since the day programmer Grace Murray Hopper reported the cause of an error in an early Harvard Mark II computer: a moth stuck between relay contacts. Thus the term “bug” was born.
Bugs range from slight computer hiccups to catastrophes. In the Eighties, at least five patients died after a Therac-25 radiation therapy device malfunctioned due to an error by an inexperienced programmer. In 1962, NASA mission control destroyed the Mariner I space probe as it diverted from its intended path over the Atlantic Ocean; incorrectly transcribed handwritten code was blamed. In 1982, a software bug later alleged to have been implanted into the Soviet trans-Siberian gas pipeline by the CIA triggered one of the largest non–nuclear explosions in history.
According to data management firm Coralogix, programmers produce 70 bugs per 1,000 lines of code, with each bug solution demanding 30 times more hours than it took to write the code in the first place. The firm estimates the United States spends $113 billion a year identifying and remediating bugs.
The scary truth about cyber security that you wish you’d known. 15 alarming cyber security facts and statistics for 2019.
Israeli researchers uncovered a novel way that hackers could steal sensitive data from a highly secured computer: by tapping into the vibrations from a cooling system fan.
Lead cyber-security researcher Mordechai Guri at Ben-Gurion University of the Negev said data encoded by hackers into fan vibrations could be transmitted to a smartphone placed in the vicinity of the targeted computer.
Continue reading “Cyberattack can steal data via cooling fan vibrations” »
#Hackers are seeking to exploit the roll-out of government financial relief plans to fill their own pockets at the expense of businesses and affected workers, Israeli cyber researchers have revealed.
Hackers are exploiting the rollout of governmental financial relief to fill their pockets at the expense of businesses and affected workers, according to Israeli cyber researchers.
In recent weeks, governments have sought to ease cash-flow shortages and avoid a recession with ambitious stimulus packages and grants to households, including a massive $2 trillion economic package in the United States.
Continue reading “Israeli researchers: Hackers aiming to exploit government financial aid” »
Just like a virus hijacks your cells and forces them to churn out more copies of the virus, this vaccine is expected to automate the production of those particles, which B-cells and T-cells — the biological hunter-seekers of the immune system — can use to ready themselves to fight the real-deal coronavirus.
The main difference between this sort of DNA-based vaccine and a traditional one, Slavcev told Futurism, is that it relies on the person’s cells to create the mock virus instead of merely exposing them to an inert version of the real virus.
“Personal genetics only has to do with how the vaccine is presented,” Slavcev told Futurism, regarding the decision to develop a DNA-based vaccine. “There is some variation between individuals and populations, but in this case the DNA is just to improve immune response and make it mimic a viral infection as closely as possible to stimulate the most effective immune response.”
Scam alert.
THOMASTON, Me. (WSET) — Police are warning cell phone users of a new text message scam during the coronavirus pandemic. The Thomaston Police Department in Maine posted on Facebook a photo of the alert being sent to people in a text message. The message was sent to someone in Maine from an Indiana area code telling them they need to self-isolate because they came in contact with someone who tested positive or has shown symptoms for coronavirus. The alert also tells you to get tested.
As millions of employees are suddenly working from home, computer security threats are on the rise. The sudden rush to set up home offices means many users working on insufficiently protected devices are exposing businesses to unprecedented new exposure to malicious hackers.
“While the world is grinding to a halt, cyber-attacks are on the rise, preying on public fear and anxiety,” says Yenni Tim, researcher of Cybersecurity at the University of New South Wales Business School in Sydney, Australia.
In an effort to combat security threats, Dell Technologies last week released a utility that will protect one of the most sensitive components of a computer, the BIOS. Frequently the target of the most malicious malware assaults, the BIOS oversees critical computer processes, from boot-up to system configuration parameters.