Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 65

Dec 16, 2022

Space imaging company Maxar agrees to $6.4 billion takeover

Posted by in categories: cybercrime/malcode, finance, government, space

“Advent has a proven record of strengthening its portfolio companies and a desire to support Maxar in advancing our long-term strategic objectives,” Maxar CEO Daniel Jablonsky said in the statement. “As a private company, we will have enhanced flexibility and additional resources to build on Maxar’s strong foundation, further scale operations and capture the significant opportunities in a rapidly expanding market.”

With some $28 billion invested across the defense, security and cybersecurity sectors in the last three years, Boston-based Advent’s portfolio companies support many satellite and defense platforms which serve the U.S. government and its allies as well as companies across the globe. The firm said it arranged debt and equity financing commitments to finance the acquisition.

The transaction is expected to close mid-2023, subject to customary closing conditions. Maxar, which has 4,400 employees, will operate under the same brand and maintain its headquarters in Westminster, Colorado, and will remain U.S.-controlled and operated.

Dec 14, 2022

A DNA Hack Might One Day Save Us From Future Heart Attacks

Posted by in categories: biotech/medical, cybercrime/malcode

It worked on mice—and one day it might work on humans as well.

Dec 11, 2022

Elon Musk’s Twitter Purchase Raises Concerns for MENA Region

Posted by in categories: business, cybercrime/malcode, Elon Musk, government, space, sustainability

“The likelihood of a cyber-attacks on Twitter feel very high right now and their ability to be able to counteract that feels very low,” Radcliffe said. “The amount of information that they have on users is considerable and I think that that’s a potential source of concern, particularly in countries in the Middle East and other places where once the information is on the open market and in the public domain it could potentially be harmful to users.”

Partnering with individuals or groups close to authoritarian regimes raises concerns over how Twitter might react should it be pressured by supply information on dissidents or to quell opposition speech. They also raise questions about Musk’s potential conflict of business interests concerning Tesla and Space X’s availability in certain markets.

Such questions have already been brought up by at least one member of the US Congress. But experts say they’re much more concerned about data security should Twitter go under.

Dec 8, 2022

Automated dark web markets sell corporate email accounts for $2

Posted by in categories: business, cybercrime/malcode

Cybercrime marketplaces are increasingly selling stolen corporate email addresses for as low as $2 to fill a growing demand by hackers who use them for business email compromise and phishing attacks or initial access to networks.

Analysts at Israeli cyber-intelligence firm KELA have closely followed this trend, reporting at least 225,000 email accounts for sale on underground markets.

The largest webmail shops are Xleet and Lufix, claiming to offer access to over 100k breached corporate email accounts, with prices ranging between $2 and $30, if not more, for highly-desirable organizations.

Dec 8, 2022

Bad news! The platform certificates of many phone manufactures have been hacked. These are used to sign trusted apps on Android phones. Now these certificates are being used to certify malicious Android applications

Posted by in categories: cybercrime/malcode, mobile phones

Data security — information security newspaper | hacking news.

Dec 7, 2022

Your Windows PC may be hit with yet another bug, causing some apps to stop responding

Posted by in category: cybercrime/malcode

Microsoft’s Windows Client and Server builds are not hit with a nasty bug, causing some apps to stop responding. The software giant has recently confirmed the issue and promised to bring a fix in an upcoming software update. Microsoft also has a hack to identify if users are currently using any affected apps.

Dec 6, 2022

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds

Posted by in categories: cybercrime/malcode, law

It is common to hear news reports about large data breaches, but what happens once your personal data is stolen? Our research shows that, like most legal commodities, stolen data products flow through a supply chain consisting of producers, wholesalers and consumers. But this supply chain involves the interconnection of multiple criminal organizations operating in illicit underground marketplaces.

The stolen data begins with producers—hackers who exploit vulnerable systems and steal such as , bank account information and Social Security numbers. Next, the stolen data is advertised by wholesalers and distributors who sell the data. Finally, the data is purchased by consumers who use it to commit various forms of fraud, including fraudulent credit card transactions, identity theft and phishing attacks.

This trafficking of stolen data between producers, wholesalers and consumers is enabled by darknet markets, which are websites that resemble ordinary e-commerce websites but are accessible only using special browsers or authorization codes.

Dec 3, 2022

Google shuts down Duplex on the Web, its attempt to bring AI smarts to retail sites and more

Posted by in categories: cybercrime/malcode, food, internet, robotics/AI

Google is shutting down Duplex on the Web, its AI-powered set of services that navigated sites to simplify the process of ordering food, purchasing movie tickets and more. According to a note on a Google support page, Google on the Web and any automation features enabled by it will no longer be supported as of this month.

“As we continue to improve the Duplex experience, we’re responding to the feedback we’ve heard from users and developers about how to make it even better,” a Google spokesperson told TechCrunch via email, adding that Duplex on the Web partners have been notified to help them prepare for the shutdown. “By the end of this year, we’ll turn down Duplex on the Web and fully focus on making AI advancements to the Duplex voice technology that helps people most every day.”

Google introduced Duplex on the Web, an outgrowth of its call-automating Duplex technology, during its 2019 Google I/O developer conference. To start, it was focused on a couple of narrow use cases, including opening a movie theater chain’s website to fill out all of the necessary information on a user’s behalf — pausing to prompt for choices like seats. But Duplex on the Web later expanded to passwords, helping users automatically change passwords exposed in a data breach, as well as assist with checkout for e-commerce retailers, flight check-in for airline sites and automatic discount finding.

Nov 29, 2022

Centre starts drive to prevent cyber threats to state entities

Posted by in categories: biotech/medical, cybercrime/malcode, government

The central government has started a drive to upgrade its IT equipment and infrastructure so that all electronic, data storage and communication devices used in government departments and agencies remain within the life span specified by the manufacturer and remain immune to cyber threats.

The move comes in the wake of a large number of cyber security incidents reported by Cert-In, a nodal agency for responding to such incidents and a recent ransomware attack at country’s top medical institute All India Institute of Medical Sciences (AIIMS), New Delhi on 23 November.

The ministry of electronics and information technology (Meity) has directed all secretaries of central ministries to actively take actions with regards to cyber security. Use of out-of-date operating systems and IT equipment must be discontinued, Meity said in a communication reviewed by Mint.

Nov 28, 2022

Acer fixes UEFI bugs that can be used to disable Secure Boot

Posted by in category: cybercrime/malcode

Acer has fixed a high-severity vulnerability affecting multiple laptop models that could enable local attackers to deactivate UEFI Secure Boot on targeted systems.

The Secure Boot security feature blocks untrusted operating systems bootloaders on computers with a Trusted Platform Module (TPM) chip and Unified Extensible Firmware Interface (UEFI) firmware to prevent malicious code like rootkits and bootkits from loading during the startup process.

Reported by ESET malware researcher Martin Smolar, the security flaw (CVE-2022–4020) was discovered in the HQSwSmiDxe DXE driver on some consumer Acer Notebook devices.

Page 65 of 220First6263646566676869Last