Jul 25, 2023
Kindly check out my Cybercrime Magazine & Georgetown University Podcast and my interview
Posted by Chuck Brooks in categories: cybercrime/malcode, robotics/AI
“Guarding The Digital Frontier. AI As A Cyber Weapon”
Thank you!
“Guarding The Digital Frontier. AI As A Cyber Weapon”
Thank you!
Cybersecurity researchers said they have discovered what they say is the first open-source software supply chain attacks specifically targeting the banking sector.
“These attacks showcased advanced techniques, including targeting specific components in web assets of the victim bank by attaching malicious functionalities to it,” Checkmarx said in a report published last week.
“The attackers employed deceptive tactics such as creating a fake LinkedIn profile to appear credible and customized command-and-control (C2) centers for each target, exploiting legitimate services for illicit activities.”
The Chinese state-backed APT41 hacking group is targeting Android devices with two newly discovered spyware strains dubbed WyrmSpy and DragonEgg by Lookout security researchers.
APT41 is one of the oldest state hacking groups with a history of targeting various industries in the USA, Asia, and Europe.
They are known for conducting cyber-espionage operations against entities across various industry sectors, including software development, hardware manufacturing, think tanks, telcos, universities, and foreign governments.
While Tesla famously won’t support CarPlay, code found in its iOS app update points to at least testing of AirPlay in its cars.
It’s never been possible to use Apple’s CarPlay in Teslas — not without a hack, and a convoluted one at that — but CEO Elon Musk has previously hinted at AirPlay support.
Now according to the unofficial “Tesla App Updates (iOS)” account on Twitter, the latest version of Tesla’s iPhone app includes a mention of AirPlay in its code.
Welcome to PyGrid AI, the place to come for all things Artificial Intelligence (AI). Our blog publishes articles from experts in the field that cover a wide range of topics related to AI. Whether you are looking for the latest news, research findings, or practical advice on how to use AI, you will find it here. We strive to provide the most up-to-date information on AI, as well as thoughtful commentary, to help you make the most of this exciting technology. Thank you for visiting AI Formation, and please come back often!
The competitive nature of AI development poses a dilemma for organizations, as prioritizing speed may lead to neglecting ethical guidelines, bias detection, and safety measures. Known and emerging concerns associated with AI in the workplace include the spread of misinformation, copyright and intellectual property concerns, cybersecurity, data privacy, as well as navigating rapid and ambiguous regulations. To mitigate these risks, we propose thirteen principles for responsible AI at work.
Page-utils class= article-utils—vertical hide-for-print data-js-target= page-utils data-id= tag: blogs.harvardbusiness.org, 2007/03/31:999.359663 data-title=13 Principles for Using AI Responsibly data-url=/2023/06/13-principles-for-using-ai-responsibly data-topic= Technology and analytics data-authors= Brian Spisak; Louis B. Rosenberg; Max Beilby data-content-type= Digital Article data-content-image=/resources/images/article_assets/2023/06/Jun23_30_200245321-001-383x215.jpg data-summary=
Companies need to consider a set of risks as they explore how to adopt new tools.
Managing Director of Cyber Security Consulting at Verizon.
It’s no surprise firewalls and encryption are instrumental to help defend against cyberattacks, but those tools can’t defend against one of the largest cybersecurity threats: people.
Social engineering—manipulating individuals to divulge sensitive information—is on the rise, even as organizations increasingly implement cybersecurity education and training. While social engineering already poses a challenge for organizations, AI might make it even more of a threat.
Have you ever been compelled to enter sensitive payment data on the website of an unknown merchant? Would you be willing to consign your credit card data or passwords to untrustworthy hands? Scientists from the University of Vienna have now designed an unconditionally secure system for shopping in such settings, combining modern cryptographic techniques with the fundamental properties of quantum light. The demonstration of such “quantum-digital payments” in a realistic environment has been published in Nature Communications.
Digital payments have replaced physical banknotes in many aspects of our daily lives. Similar to banknotes, they should be easy to use, unique, tamper-resistant and untraceable, but additionally withstand digital attackers and data breaches.
In today’s payment ecosystem, customers’ sensitive data is substituted by sequences of random numbers, and the uniqueness of each transaction is secured by a classical cryptographic method or code. However, adversaries and merchants with powerful computational resources can crack these codes and recover the customers’ private data, and for example, make payments in their name.
PORTSMOUTH, Va. (WAVY) – Artificial intelligence is already revolutionizing society – from healthcare and education to cybersecurity and even our courts. Despite all of its benefits, it has also given criminals an edge when it comes to deceiving us.
Financial sextortion is a crime in which a bad actor attempts to leverage personal material (think: naked pictures or videos) to force a victim into giving into their demands — usually money or other compromising material.
You may have stumbled across the Flipper Zero hacking device that’s been doing the rounds. The company, which started in Russia in 2020, left the country at the start of the war and moved on since then. It claims it no longer has ties to Russia and that it is on track to sell $80 million worth of its products this year after selling almost $5 million worth as Kickstarter preorders — and it claims it sold $25 million worth of the devices last year.
So what are they selling? Flipper Zero is a “portable gamified multi-tool” aimed at everyone with an interest in cybersecurity, whether as a penetration tester, curious nerd or student — or with more nefarious purposes. The tool includes a bunch of ways to manipulate the world around you, including wireless devices (think garage openers), RFID card systems, remote keyless systems, key fobs, entry to barriers, etc. Basically, you can program it to emulate a bunch of different lock systems.
Continue reading “Flipper hacking device on track to make $80M worth of sales” »