Archive for the ‘cybercrime/malcode’ category: Page 127
Feb 22, 2021
Deepfake Voice Technology Iterates on Old Phishing Strategies
Posted by Quinn Sena in categories: cybercrime/malcode, robotics/AI
As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent.
Feb 21, 2021
Cybersecurity, Emerging Tech, Risk Management — Winter 2021 Writings & Media
Posted by Chuck Brooks in categories: cybercrime/malcode, energy
These three pillars of cybersecurity risk management need not stand alone. In fact, they all should be incorporated together in cybersecurity framework strategy to identify gaps, mitigate threats, and build resilience in the case of an inevitable cyberattack. Of course, there are many other elements and protocols associated with utilization of these cyber risk management pillars. Combining them creates a more holistic mindset that also makes it easier to plan and adapt. With the growing sophistication of global cyber-threats and the expanding digital attack surface, a vigilant three pillar approach makes good sense.
Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and evangelist for Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech Experts to Follow on LinkedIn.” Chuck was named as a 2020 top leader and influencer in “Who’s Who in Cybersecurity” by Onalytica. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was named by The Potomac Officers Club and Executive Mosaic and GovCon as at “One of The Top Five Executives to Watch in GovCon Cybersecurity. Chuck is a two-time Presidential appointee who was an original member of the Department of Homeland Security. Chuck has been a featured speaker at numerous conferences and events including presenting before the G20 country meeting on energy cybersecurity.
Feb 13, 2021
A Billion-Dollar Dark Web Crime Lord Calls It Quits
Posted by Genevieve Klien in category: cybercrime/malcode
The “big hack” redux, riot planning on Facebook, and more of the week’s top security news.
Feb 13, 2021
Researchers hack Xbox console to develop nanoscale medical 3D printer
Posted by Genevieve Klien in categories: biotech/medical, cybercrime/malcode, nanotechnology
Researchers from the Technical University of Denmark (DTU) have repurposed a component from a Microsoft Xbox 360 to develop a high-resolution large-volume nanoscale 3D printer with various applications in the medical sector.
The team took an optical pick-up unit (OPU) component from an Xbox 360 console to replace a conventional Stereolithography (SLA) optical system, in order to drastically simplify the SLA 3D printing system. With the OPU costing less than $5, the researcher’s solution could potentially increase the affordability of such equipment by thousands of pounds.
“With our 3D printer that can print micro and nanoscale 3D objects, we are able to go from tens of micrometers in printing resolution down to hundreds of nanometers without expensive specialized components,” said DTU PhD Student Tien-Jen Chang and research team member.
Feb 12, 2021
Researcher hacks into 35 major technology firms
Posted by Saúl Morales Rodriguéz in category: cybercrime/malcode
A Romanian threat researcher detailed in a published report Wednesday how he broke into IT systems belonging to some of the largest corporations in the world. His assaults successfully targeted Apple, Microsoft, Tesla, PayPal, Netflix and more than 30 other corporations.
Feb 10, 2021
Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple
Posted by Genevieve Klien in category: cybercrime/malcode
Ethical hacker Alex Birsan developed a way to inject malicious code into open-source developer tools to exploit dependencies in organizations internal applications.
Feb 8, 2021
In Florida, a near-miss with a cybersecurity worst-case scenario
Posted by Brent Ellman in category: cybercrime/malcode
“A hacker, who authorities believe to be the same one from the initial breach, took control of the computer and changed the acceptable level of sodium hydroxide — better known as lye, the main ingredient in many household drain cleaners — from 100 parts per million to 11100 parts per million. A water plant operator noticed immediately and corrected the change, Gualtieri said, adding that if the operator had missed it and the change didn’t trigger some of the plant’s alarms, the lye could have seeped into the water supply in 24 to 36 hours.”
A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye to extremely dangerous levels, officials said.
Continue reading “In Florida, a near-miss with a cybersecurity worst-case scenario” »
Feb 8, 2021
Dr. Julie Marble — JHU Applied Physics Lab — Human-Autonomy Interaction, Collaboration and Trust
Posted by Ira S. Pastor in categories: biotech/medical, cybercrime/malcode, military, robotics/AI
Human-Autonomy Interaction, Collaboration and Trust — Dr. Julie Marble, JHU Applied Physics Laboratory (APL)
Dr. Julie Marble is a senior scientist at the Johns Hopkins University Applied Physics Laboratory (JHUAPL) leading research in human-autonomy interaction, collaboration and trust.
Feb 8, 2021
FETT Bug Bounty Helps Strengthen SSITH Hardware Defenses
Posted by Saúl Morales Rodriguéz in category: cybercrime/malcode
After three months of reviewing more than 13000 hours of hacking exploits conducted by more than 580 cybersecurity researchers, DARPA today announced that its Finding Exploits to Thwart Tampering (FETT) Bug Bounty successfully proved the value of the secure hardware architectures developed under its System Security Integration Through Hardware and Firmware (SSITH) program while pinpointing critical areas to further harden defenses.