Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 16

Aug 30, 2023

Hacking into Android in 32 seconds

Posted by in categories: cybercrime/malcode, mobile phones

Samsung S7 is connected to Pixel as HID device (keyboard) that tries to brute force lock screen PIN (PoC) and then download, install and launch Metasploit pa…

Aug 30, 2023

Experts predict AI will be right in centre of apocalypse, destroy human intelligence, creativity

Posted by in categories: cybercrime/malcode, robotics/AI

By: Vikas Datta/IANS

Bali (Indonesia): It is not new technology, but Artificial Intelligence (AI) is now raising concerns with the advent of generative AI tools like ChatGPT, which may have significant repercussions across the cyber landscape, as they foster phenomenon like “suffering distancing syndrome”, “responsibility delegation”, and “AI hallucination” for those simply using it to find or validate information, says a senior Kaspersky Labs cyberthreat expert.

Aug 29, 2023

Major Cyberattack Disables Telescopes in Hawaii and Chile

Posted by in categories: cybercrime/malcode, space

This post is also available in: he עברית (Hebrew)

Prominent National Science Foundation (NSF) space telescopes worldwide have been shut down due to a major cyberattack, the reason for which is unknown. For over two weeks, ten telescopes have been impacted, while some on-site operatives were able to keep some operational. These shutdowns have caused chaos in the astronomy sphere due to many essential windows of opportunity being missed for space observations.

NOIRLab (the NSF-run coordinating center for ground-based astronomy) said in a press release “Our staff are working with cybersecurity experts to get all the impacted telescopes and our website back online as soon as possible and are encouraged by the progress made thus far.”

Aug 29, 2023

Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

Posted by in category: cybercrime/malcode

Hackers are using sneaky compression methods in Android APK files to evade malware detection.

Aug 29, 2023

Hackers shut down 2 of the world’s most advanced telescopes

Posted by in categories: cybercrime/malcode, space

Some of the world’s leading astronomical observatories have reported cyberattacks that have resulted in temporary shutdowns.

The National Science Foundation’s National Optical-Infrared Astronomy Research Laboratory, or NOIRLab, reported that a cybersecurity incident that occurred on Aug. 1 has prompted the lab to temporarily halt operations at its Gemini North Telescope in Hawaii and Gemini South Telescope in Chile. Other, smaller telescopes on Cerro Tololo in Chile were also affected.

Aug 29, 2023

Hacking Biometric Facial Recognition

Posted by in categories: cybercrime/malcode, privacy, robotics/AI

This post is also available in: he עברית (Hebrew)

Are biometric authentication measures no longer safe? Biometric authentication expert says deepfake videos and camera injection attacks are changing the game.

Biometrics authentication is getting more and more popular due to it being fast, easy, and smooth for the user, but Stuart Wells, CTO at biometrics authentication company Jumio, thinks this may be risky.

Aug 29, 2023

U.S. hit by cyberattack: ‘Once you plug the dam one place, hackers find some other weakness’

Posted by in categories: cybercrime/malcode, government

NBC News Global Security Reporter Dan De Luce joins Meet the Press NOW to discuss the latest cyberattack hitting U.S. government agencies.

» Subscribe to NBC News: http://nbcnews.to/SubscribeToNBC
» Watch more NBC video: http://bit.ly/MoreNBCNews.

Continue reading “U.S. hit by cyberattack: ‘Once you plug the dam one place, hackers find some other weakness’” »

Aug 28, 2023

Kali Linux 2023.3 released with 9 new tools, internal changes

Posted by in category: cybercrime/malcode

Kali Linux 2023.3, the third version of 2023, is now available for download, with nine new tools and internal optimizations.

Kali Linux is a Linux distribution created for ethical hackers and cybersecurity professionals to perform penetration testing, security audits, and research against networks.

With this release, the Kali Team says there are not many new features, with most of the changes done internally to increase the overall reliability and optimization of the project.

Aug 27, 2023

How Hackers Hack Any Websites in Minutes?!

Posted by in categories: cybercrime/malcode, education

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join.

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

Continue reading “How Hackers Hack Any Websites in Minutes?!” »

Aug 27, 2023

Study highlights the vulnerabilities of metasurface-based wireless communication systems

Posted by in categories: cybercrime/malcode, internet

Metasurfaces, artificially engineered surfaces that can manipulate electromagnetic signals in unique ways, have huge potential for several technological applications, including the implementation of sixth generation (6G) cellular communications. The limitations and vulnerabilities of these smart surfaces, however, are still poorly understood.

Researchers at Peking University, University of Sannio and Southeast University recently carried out a study aimed at better understanding the vulnerability of metasurfaces to wireless cyber-attacks. Their paper, published in Nature Electronics, outlines two types of attacks that should be considered and accounted for before metasurfaces can be deployed on a large-scale.

“This work was primarily driven by the need for enhancing security and privacy of in the upcoming 6G era, characterized by unprecedented speeds, ultra-low latency, and vast connection nodes,” Lianlin Li, Vincenzo Galdi and Tie Jun Cui, three of the researchers who carried out the study, told Tech Xplore.

Page 16 of 194First1314151617181920Last