БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 114

Oct 27, 2020

The Internet of Things brings a web of promises and perils to the smart grid, experts say

Posted by in categories: cybercrime/malcode, internet

‚The innocuous microwave on a shelf in a laboratory at the U.S. Department of Energy’s Pacific Northwest National Laboratory (PNNL) in Richland, Wash., is anything but ordinary.

“Weird,” is how Penny McKenzie, a cybersecurity engineer at the laboratory, describes the device.

The microwave arrived at PNNL with the capability to be controlled through a connected to the internet, a connection McKenzie and her colleagues declined when they plugged it into the wall.

Oct 27, 2020

The Deck Is Not Rigged: Poker and the Limits of AI

Posted by in categories: business, cybercrime/malcode, government, health, information science, mathematics, military, robotics/AI

Tuomas Sandholm, a computer scientist at Carnegie Mellon University, is not a poker player—or much of a poker fan, in fact—but he is fascinated by the game for much the same reason as the great game theorist John von Neumann before him. Von Neumann, who died in 1957, viewed poker as the perfect model for human decision making, for finding the balance between skill and chance that accompanies our every choice. He saw poker as the ultimate strategic challenge, combining as it does not just the mathematical elements of a game like chess but the uniquely human, psychological angles that are more difficult to model precisely—a view shared years later by Sandholm in his research with artificial intelligence.

“Poker is the main benchmark and challenge program for games of imperfect information,” Sandholm told me on a warm spring afternoon in 2018, when we met in his offices in Pittsburgh. The game, it turns out, has become the gold standard for developing artificial intelligence.

Tall and thin, with wire-frame glasses and neat brow hair framing a friendly face, Sandholm is behind the creation of three computer programs designed to test their mettle against human poker players: Claudico, Libratus, and most recently, Pluribus. (When we met, Libratus was still a toddler and Pluribus didn’t yet exist.) The goal isn’t to solve poker, as such, but to create algorithms whose decision making prowess in poker’s world of imperfect information and stochastic situations—situations that are randomly determined and unable to be predicted—can then be applied to other stochastic realms, like the military, business, government, cybersecurity, even health care.

Oct 26, 2020

European startups that are hacking the brain better than Neuralink

Posted by in categories: cybercrime/malcode, Elon Musk, neuroscience

…BIOS is doing pretty much the same thing as Neuralink — only in many respects better.


Elon Musk’s Neuralink wants to hack the brain – here are the European neurotechnology startups that are doing the same with a lot less funding.

Oct 25, 2020

Adversarial Machine Learning Threat Matrix

Posted by in categories: cybercrime/malcode, robotics/AI, transportation

Microsoft, in collaboration with MITRE research organization and a dozen other organizations, including IBM, Nvidia, Airbus, and Bosch, has released the Adversarial ML Threat Matrix, a framework that aims to help cybersecurity experts prepare attacks against artificial intelligence models.

With AI models being deployed in several fields, there is a rise in critical online threats jeopardizing their safety and integrity. The Adversarial Machine Learning (ML) Threat Matrix attempts to assemble various techniques employed by malicious adversaries in destabilizing AI systems.

AI models perform several tasks, including identifying objects in images by analyzing the information they ingest for specific common patterns. The researchers have developed malicious patterns that hackers could introduce into the AI systems to trick these models into making mistakes. An Auburn University team had even managed to fool a Google LLC image recognition model into misclassifying objects in photos by slightly adjusting the objects’ position in each input image.

Oct 23, 2020

Researchers find huge, sophisticated black market for trade in online ‘fingerprints’

Posted by in categories: cybercrime/malcode, economics, finance

Security on the internet is a never-ending cat-and-mouse game. Security specialists constantly come up with new ways of protecting our treasured data, only for cyber criminals to devise new and crafty ways of undermining these defenses. Researchers at TU/e have now found evidence of a highly sophisticated Russian-based online marketplace that trades hundreds of thousands of very detailed user profiles. These personal ‘fingerprints’ allow criminals to circumvent state-of-the-art authentication systems, giving them access to valuable user information, such as credit card details.

Our online economy depends on usernames and passwords to make sure that the person buying stuff or transferring money on the internet, is really the person they are saying. However, this limited way of authentication has proven to be far from secure, as people tend to reuse their passwords across several services and websites. This has led to a massive and highly profitable illegal trade in user credentials: According to a recent estimate (from 2017) some 1.9 billion stolen identities were sold through underground markets in a year’s time.

It will come as no surprise that banks and other have come up with more complex authentication systems, which rely not only on something the users know (their password), but also something they have (e.g. a token). This process, known as multi-factor authentication (MFA), severely limits the potential for cybercrime, but has drawbacks. Because it adds an extra step, many users don’t bother to register for it, which means that only a minority of people use it.

Oct 22, 2020

Cyberattacks against machine learning systems are more common than you think

Posted by in categories: business, cybercrime/malcode, finance, robotics/AI

Machine learning (ML) is making incredible transformations in critical areas such as finance, healthcare, and defense, impacting nearly every aspect of our lives. Many businesses, eager to capitalize on advancements in ML, have not scrutinized the security of their ML systems. Today, along with MITRE, and contributions from 11 organizations including IBM, NVIDIA, Bosch, Microsoft is releasing the Adversarial ML Threat Matrix, an industry-focused open framework, to empower security analysts to detect, respond to, and remediate threats against ML systems.

During the last four years, Microsoft has seen a notable increase in attacks on commercial ML systems. Market reports are also bringing attention to this problem: Gartner’s Top 10 Strategic Technology Trends for 2020, published in October 2019, predicts that “Through 2022, 30% of all AI cyberattacks will leverage training-data poisoning, AI model theft, or adversarial samples to attack AI-powered systems.” Despite these compelling reasons to secure ML systems, Microsoft’s survey spanning 28 businesses found that most industry practitioners have yet to come to terms with adversarial machine learning. Twenty-five out of the 28 businesses indicated that they don’t have the right tools in place to secure their ML systems. What’s more, they are explicitly looking for guidance. We found that preparation is not just limited to smaller organizations. We spoke to Fortune 500 companies, governments, non-profits, and small and mid-sized organizations.

Our survey pointed to marked cognitive dissonance especially among security analysts who generally believe that risk to ML systems is a futuristic concern. This is a problem because cyber attacks on ML systems are now on the uptick. For instance, in 2020 we saw the first CVE for an ML component in a commercial system and SEI/CERT issued the first vuln note bringing to attention how many of the current ML systems can be subjected to arbitrary misclassification attacks assaulting the confidentiality, integrity, and availability of ML systems. The academic community has been sounding the alarm since 2004, and have routinely shown that ML systems, if not mindfully secured, can be compromised.

Oct 20, 2020

Top tip, everyone: Chinese hackers are hitting these 25 vulns, so make sure you patch them ASAP, says NSA

Posted by in category: cybercrime/malcode

Plus this Chrome one being exploited in the wild, we note.

Oct 20, 2020

Google Says Biggest DDoS Attack on Record Hit the Company in 2017

Posted by in categories: cybercrime/malcode, internet

The largest DDoS attack in history was done against Google on 2017. It was done by a state-backed group.

Read article for more details.

Continue reading “Google Says Biggest DDoS Attack on Record Hit the Company in 2017” »

Oct 18, 2020

Software spots and fixes hang bugs in seconds, rather than weeks

Posted by in categories: cybercrime/malcode, robotics/AI

Hang bugs—when software gets stuck, but doesn’t crash—can frustrate both users and programmers, taking weeks for companies to identify and fix. Now researchers from North Carolina State University have developed software that can spot and fix the problems in seconds.

“Many of us have experience with hang bugs—think of a time when you were on website and the wheel just kept spinning and spinning,” says Helen Gu, co-author of a paper on the work and a professor of computer science at NC State. “Because these bugs don’t crash the program, they’re hard to detect. But they can frustrate or drive away customers and hurt a company’s bottom line.”

Continue reading “Software spots and fixes hang bugs in seconds, rather than weeks” »

Oct 17, 2020

#SpaceWatchGL Opinion: Let’s not make Newspace a paradise for hackers

Posted by in categories: cybercrime/malcode, encryption

In the race to launch smallsats into low earth orbit quickly and cost-effectively, operators and manufacturers have compromised on security and left themselves vulnerable to cyber attacks. Let’s not make Newspace a paradise for hackers.

Smallsat operators and manufacturers need to consider why their smallsats are so vulnerable to cyber attacks, the harm attacks can cause, cyber security weaknesses, why basic encryption is not enough and what can be done about it now. These are the issues that this article addresses.