Archive for the ‘cybercrime/malcode’ category: Page 120

Jul 3, 2019

Dozens of Facebook pages about current events in Libya were linked to malware

Posted by in category: cybercrime/malcode

Attackers would use the pages to post malicious URLs, disguising the links as news or mobile applications. Facebook said it removed the pages — which collectively had hundreds of thousands of followers — after notification from researchers…

Jul 1, 2019

Malware Defense: Protecting Against Polymorphic Malware

Posted by in category: cybercrime/malcode

So everything we just said about metamorphic and polymorphic malware also applies to metamorphic and polymorphic ransomware.

Metamorphic and Polymorphic Malware Families

With consistent functionalities regardless of code, malware is often grouped into families so security teams can look for similar functions and code segments in efforts to protect their organizations. Some of the most well-known malware families include:

Jul 1, 2019

The Worm That Nearly Ate the Internet

Posted by in categories: cybercrime/malcode, internet

Today, thanks to extraordinary sleuthing by the F.B.I. and some of the world’s premier cybersecurity experts, there are answers to these questions. They offer an unsettling reminder of the remarkable sophistication of a growing network of cybercriminals and nation states — and the vulnerability of not just our computers, but the internet itself.

It infected 10 million computers. So why did cybergeddon never arrive?

Credit Credit Cathryn Virginia

Jun 30, 2019

If you can pick up an electromagnetic phone call, if you can get an EEG, you can apply the same science to all electromagnetic waves, EVERY ELECTRON IN THE UNIVERSE THAT’S IN MOTION CREATES AN ELECTROMAGNETIC WAVE

Posted by in categories: cybercrime/malcode, science

So yea bro, you got the sensors to pick up the frequency you can hack it.

Jun 22, 2019

An AI “Vaccine” Can Block Adversarial Attacks

Posted by in categories: biotech/medical, cybercrime/malcode, information science, robotics/AI

For as smart as artificial intelligence systems seem to get, they’re still easily confused by hackers who launch so-called adversarial attacks — cyberattacks that trick algorithms into misinterpreting their training data, sometimes to disastrous ends.

In order to bolster AI’s defenses from these dangerous hacks, scientists at the Australian research agency CSIRO say in a press release they’ve created a sort of AI “vaccine” that trains algorithms on weak adversaries so they’re better prepared for the real thing — not entirely unlike how vaccines expose our immune systems to inert viruses so they can fight off infections in the future.

Jun 20, 2019

Forget about The Terminator — we should be worrying about AI malware first

Posted by in categories: cybercrime/malcode, robotics/AI

Advancement of artificial intelligence (AI) prompts fears of a Terminator-style future where humans live as an underclass to the machines we created. However, humanity may face a far more immediate threat in the form of AI malware.

Jun 20, 2019

Florida city pays $600,000 to hackers who seized its computer system

Posted by in category: cybercrime/malcode

Cyberattack blocked 911 dispatchers from logging calls, as a growing number of U.S. municipalities are taken hostage.

Jun 16, 2019

Russian Hackers Tried to Attack U.S. Power Grid

Posted by in categories: cybercrime/malcode, energy, government

A hacking group linked to the Russian government has been attempting to breach the U.S. power grid, Wired reports.

Security experts from the non-profit group the Electric Information Sharing and Analysis Center (E-ISAC) and security firm Dragos tracked the hackers — and warn that the group has been probing the grid for weaknesses, searching for ways that they could access U.S. systems.

Even though there are no signs that the group has succeeded in accessing the power grid, the attacks still have experts worried. And that’s partly because of the history of this particular hacking group: Xenotime, who created the infamous Triton malware. In late 2017, Triton attacked critical infrastructure such as the industrial control systems used in power plants, and it could have been used to cause massive destruction through tampering with power plant controls. That lead it to be labeled the “world’s most murderous malware.”

Jun 16, 2019

It’s Still A Little Hard To Believe ‘Cyberpunk 2077’ Is Releasing On PS4 And Xbox One

Posted by in category: cybercrime/malcode

Again, it’s all good stuff, essentially what I would hope for out a next-gen Deus Ex, but it’s still a little difficult to judge these elaborate upgrade trees without actually getting the opportunity to move through them at the intended pace. From what we can see, it’s plenty deep: there is the opportunity to build a hacking-fluent cyber ninja, and I’m going to guess that a good chunk of people playing this game are going to go that route.

‘Cyberpunk 2077’ is clearly stretching the limits of what’s possible on Xbox One and PS4.

Jun 11, 2019

Protecting our energy infrastructure from cyberattack

Posted by in categories: cybercrime/malcode, nuclear energy

Almost every day, news headlines announce another security breach and the theft of credit card numbers and other personal information. While having one’s credit card stolen can be annoying and unsettling, a far more significant, yet less recognized, concern is the security of physical infrastructure, including energy systems.

“With a credit card theft, you might have to pay $50 and get a new credit card,” says Stuart Madnick, the John Norris Maguire Professor of Information Technologies at the Sloan School of Management, a professor of engineering systems at the School of Engineering, and founding director of the Cybersecurity at MIT Sloan consortium. “But with infrastructure attacks, real physical damage can occur, and recovery can take weeks or months.”

A few examples demonstrate the threat. In 2008, an alleged blew up an oil pipeline in Turkey, shutting it down for three weeks; in 2009, the malicious Stuxnet computer worm destroyed hundreds of Iranian centrifuges, disrupting that country’s nuclear fuel enrichment program; and in 2015, an attack brought down a section of the Ukrainian power grid—for just six hours, but substations on the grid had to be operated manually for months.

Continue reading “Protecting our energy infrastructure from cyberattack” »