БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 16

Mar 30, 2024

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

Posted by in categories: cryptocurrencies, cybercrime/malcode

⚠️ Mac users, beware! Malicious ads and fake websites are spreading dangerous malware like Atomic Stealer, which can steal your passwords, cryptocurrency, and other sensitive data.

Mar 28, 2024

$700 cybercrime software turns Raspberry Pi into an evasive fraud tool

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

Cybercriminals are selling custom Raspberry Pi software called ‘GEOBOX’ on Telegram, which allows inexperienced hackers to convert the mini-computers into anonymous cyberattack tools.

GEOBOX is sold on Telegram channels for a subscription of $80 per month or $700 for a lifetime license, payable in cryptocurrency.

Analysts at Resecurity discovered the tool during an investigation into a high-profile banking theft impacting a Fortune 100 company.

Mar 27, 2024

Predicting and Controlling Bad Actor Artificial Intelligence

Posted by in categories: cybercrime/malcode, government, internet, mapping, robotics/AI

This article includes computer-generated images that map internet communities by topic, without specifically naming each one. The research was funded by the US government, which is anticipating massive interference in the 2024 elections by “bad actors” using relatively simple AI chat-bots.


In an era of super-accelerated technological advancement, the specter of malevolent artificial intelligence (AI) looms large. While AI holds promise for transforming industries and enhancing human life, the potential for abuse poses significant societal risks. Threats include avalanches of misinformation, deepfake videos, voice mimicry, sophisticated phishing scams, inflammatory ethnic and religious rhetoric, and autonomous weapons that make life-and-death decisions without human intervention.

During this election year in the United States, some are worried that bad actor AI will sway the outcomes of hotly contested races. We spoke with Neil Johnson, a professor of physics at George Washington University, about his research that maps out where AI threats originate and how to help keep ourselves safe.

Continue reading “Predicting and Controlling Bad Actor Artificial Intelligence” »

Mar 27, 2024

Waking the Mysteries of Sleep

Posted by in categories: cybercrime/malcode, education, neuroscience

#science Where do our dreams come from, why do we have them, and what do they mean? Can we harness them to foster creativity, solve problems, and prepare for the future? What’s happening in the brains of so-called lucid dreamers, and can new developments in this cutting-edge field of research help us unlock the mystery of consciousness itself? Researchers Deirdre Barrett, Ken Paller, and Antonio Zadra join Brian Greene for a discussion about the mystery and power of dreams and where our minds go after midnight. This program is part of the Big Ideas series, supported by the John Templeton Foundation. Footage of the Ken Paller dream study from NOVA Online: Dream Hacking, https://www.pbs.org/wgbh/nova/video/d… ©2021 WGBH Educational Foundation. Participants: Deirdre Barrett, Psychologist Ken Paller, Neuroscientist Antonio Zadra, Psychologist Brian Greene – moderator Official Site: https://www.worldsciencefestival.com/ Twitter: / worldscifest Facebook: / worldsciencefestival Instagram: / worldscifest #Science #WorldScienceFestival

Mar 26, 2024

Major Python Infrastructure Breach — Over 170K Users Compromised. How Safe Is Your Code?

Posted by in category: cybercrime/malcode

– Over 170K Users Compromised. How Safe Is Your Code? — Malware — Information Security Newspaper | Hacking News.

Mar 26, 2024

The Looping Attack: Application-Layer Loops as a New DDoS Attack Vector

Posted by in category: cybercrime/malcode

Data security — information security newspaper | hacking news.

Mar 26, 2024

Web-Based PLC Malware: A New Technique to Hack Industrial Control Systems

Posted by in category: cybercrime/malcode

Data security — information security newspaper | hacking news.

Mar 21, 2024

Cybersecurity attacks have the potential to infiltrate medical devices and cripple health care, expert warns

Posted by in categories: biotech/medical, cybercrime/malcode, health

The cyberattack on Change Healthcare last month should serve as a wake-up call for the health care industry, which needs to focus on securing its infrastructure, says Kevin Fu, a Northeastern University professor of electrical and computer engineering and cybersecurity adviser to the White House.

Mar 13, 2024

Researchers achieve quantum key distribution for cybersecurity in novel experiment

Posted by in categories: cybercrime/malcode, quantum physics

Researchers at the Department of Energy’s Oak Ridge National Laboratory have demonstrated that advanced quantum-based cybersecurity can be realized in a deployed fiber link.

Mar 13, 2024

Surgeons Use Apple VR Headset During Spinal Operation

Posted by in categories: augmented reality, biotech/medical, cybercrime/malcode

A surgery team in the UK successfully utilized the recently-released Apple Vision Pro to assist spinal surgery — a fascinating use case for the augmented reality (AR) headsets that goes far beyond movie-watching, productivity-hacking, or distracted driving.

As Business Insider reports, the expensive “spatial computing” device was used to execute two microspinal procedures at London’s Cromwell Hospital. To be clear, it wasn’t the surgeons themselves who were wearing bunky AR headsets. The device was instead donned by an assisting surgical scrub nurse, who according to a press release used headset-integrated software called eXeX to access things like “surgical setup and the procedural guides from within the sterile field of the operating theatre,” in addition to any needed data or surgical visualizations.

So, in short: coupled with the eXeX software, the headset offered the folks in the operating room hands-free access to documents and other information related to the procedure and its workflow. Pretty cool!

Page 16 of 215First1314151617181920Last