Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 91

Apr 25, 2022

Hackers say cracking power grid tech was easiest challenge yet

Posted by in categories: cybercrime/malcode, energy

During an industrial control systems hacking challenge, a Dutch team won $40,000 for cracking tech used to control the power grid.

Apr 25, 2022

Elon Musk acquires Twitter for roughly $44 billion

Posted by in categories: cybercrime/malcode, economics, Elon Musk, information science, robotics/AI

The company’s board and the Tesla CEO hammered out the final details of his $54.20 a share bid.

The agreement marks the close of a dramatic courtship and a sharp change of heart at the social-media network.

Elon Musk acquired Twitter for $44 billion on Monday, the company announced, giving the world’s richest person command of one of its most influential social media sites — which serves as a platform for political leaders, a sounding board for experts across industries and an information hub for millions of everyday users.

Continue reading “Elon Musk acquires Twitter for roughly $44 billion” »

Apr 25, 2022

This ‘Tamper-Evident Container’ Snitches on Meddlers and Thieves

Posted by in categories: cybercrime/malcode, encryption

The 3D-printed containers keep a log of all break-in attempts, meaning your snail mail just got way safer.


Suppose you want to mail a court document to someone across the country—you don’t want anyone to see the secure information inside, of course. So, you seal it into a container that has special sensors built into its walls, and electronics that monitor the shield of sensors. Now, the container is armed and monitoring.

Continue reading “This ‘Tamper-Evident Container’ Snitches on Meddlers and Thieves” »

Apr 24, 2022

How to Tell if Your Webcam Has Been Hacked

Posted by in category: cybercrime/malcode

There are signs that can tell you if your webcam has been hacked or not. With the increasing cases of data breaches and hacks, there is no surprise if there are people who are concerned if their devices are protected enough from any attack.

Apr 22, 2022

Flaw in Audio Format Exposed Millions of Android Phones to Remote Hacking

Posted by in categories: cybercrime/malcode, mobile phones

Google rolled out patches for the flaws in a December security update, so Android users should make sure they’ve updated their mobile OSes.

Apr 22, 2022

Is SpaceX better at parrying Russian cyberattacks than the Pentagon?

Posted by in categories: cybercrime/malcode, military, space travel

Apr 22, 2022

Quasiparticles used to generate millions of truly random numbers a second

Posted by in categories: cybercrime/malcode, information science, quantum physics

This could lead to a truly random number generator making things much more secure.


Random numbers are crucial for computing, but our current algorithms aren’t truly random. Researchers at Brown University have now found a way to tap into the fluctuations of quasiparticles to generate millions of truly random numbers per second.

Random number generators are key parts of computer software, but technically they don’t quite live up to their name. Algorithms that generate these numbers are still deterministic, meaning that anyone with enough information about how it works could potentially find patterns and predict the numbers produced. These pseudo-random numbers suffice for low stakes uses like gaming, but for scientific simulations or cybersecurity, truly random numbers are important.

Continue reading “Quasiparticles used to generate millions of truly random numbers a second” »

Apr 21, 2022

Researchers break world record for quantum-encrypted communications

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Researchers in Beijing have set a new quantum secure direct communication (QSDC) world record of 102.2 km (64 miles), smashing the previous mark of 18 km (11 miles), The Eurasian Times reported. Transmission speeds were extremely slow at 0.54 bits per second, but still good enough for text message and phone call encryption over a distance of 30 km (19 miles), wrote research lead Long Guilu in Nature. The work could eventually lead to hack-proof communication, as any eavesdropping attempt on a quantum line can be instantly detected.

QSDC uses the principal of entanglement to secure networks. Quantum physics dictates that entangled particles are linked, so that if you change the property of one by measuring it, the other will instantly change, too — effectively making hacking impossible. In theory, the particles stay linked even if they’re light-years apart, so such systems should work over great distances.

The same research team set the previous fiber record, and devised a “novel design of physical system with a new protocol” to achieve the longer distance. They simplified it by eliminating the “complicated active compensation subsystem” used in the previous model. “This enables an ultra-low quantum bit error rate (QBER) and the long-term stability against environmental noises.”

Apr 20, 2022

FBI warning: These hackers are targeting developers and DevOps teams to break into crypto firms

Posted by in categories: blockchains, business, cryptocurrencies, cybercrime/malcode, government

The US government has detailed how North Korean state-sponsored attackers have been hacking cryptocurrency firms using phishing, malware and exploits to steal funds and initiate fraudulent blockchain transactions.

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) have issued a joint cybersecurity advisory to warn all businesses in cryptocurrency to watch out for attacks from North Korean state-sponsored hackers.

Apr 19, 2022

A model that can help inexperienced users identify phishing emails

Posted by in categories: cybercrime/malcode, robotics/AI

Phishing attacks are cyber-attacks through which criminals trick users into sending them money and sensitive information, or into installing malware on their computer, by sending them deceptive emails or messages. As these attacks have become increasingly widespread, developers have been trying to develop more advanced tools to detect them and protect potential victims.

Researchers at Monash University and CSIRO’s Data61 in Australia have recently developed a machine learning-based approach that could help users to identify phishing emails, so that they don’t inadvertently install or send sensitive data to cyber-criminals. This model was introduced in a paper pre-published on arXiv and set to be presented at AsiaCCS 2022, a cyber-security conference.

“We have identified a gap in current phishing research, namely realizing that existing literature focuses on rigorous ‘black and white’ methods to classify whether something is a phishing email or not,” Tingmin (Tina) Wu, one of the researchers who carried out the study, told TechXplore.

Page 91 of 220First8889909192939495Last