Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 2

Jan 8, 2025

Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers

Posted by in categories: biotech/medical, cybercrime/malcode, genetics

Outdated BIOS firmware in Illumina iSeq 100 allows attackers to disable devices or install malware, threatening critical genetic research and vaccine.

Jan 5, 2025

Quantum Leap: D-Wave’s Bold New Move! Discover the Future of Computing

Posted by in categories: cybercrime/malcode, quantum physics

In a groundbreaking development poised to reshape the landscape of quantum computing, D-Wave Systems has announced their latest innovation: the Advantage2 quantum processor. As the industry grapples with an ever-increasing demand for computational power, this announcement signals a pivotal moment in the quest to harness the full potential of quantum technology.

Game-Changing Technology The Advantage2 processor boasts a staggering 7,000 qubits, significantly surpassing its predecessors and setting a new benchmark for quantum performance. This advancement is expected to enhance quantum annealing processes, thereby accelerating solutions for complex optimization problems that classical computers struggle to handle efficiently.

Continue reading “Quantum Leap: D-Wave’s Bold New Move! Discover the Future of Computing” »

Jan 4, 2025

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps

Posted by in category: cybercrime/malcode

PLAYFULGHOST malware mimics Gh0st RAT with advanced spyware features, targeting users via phishing and SEO poisoning techniques.

Jan 4, 2025

U.S. Sanctions Chinese Cybersecurity Firm for State-Backed Hacking Campaigns

Posted by in category: cybercrime/malcode

U.S. sanctions Integrity Technology Group for aiding Flax Typhoon’s state-sponsored hacks, targeting U.S. systems since 2021.

Jan 2, 2025

“WWI Fighter Plane Hack” Inspires Breakthrough in Cancer Treatment

Posted by in categories: bioengineering, biotech/medical, cybercrime/malcode, military

Researchers at the University of Massachusetts Amherst have developed an innovative technology inspired by the synchronization mechanism of WWI fighter aircraft, which coordinated machine gun fire with propeller movement. This breakthrough allows precise, real-time control of the pH in a cell’s environment to influence its behavior. Detailed in Nano Letters, the study opens exciting possibilities for developing new cancer and heart disease therapies and advancing the field of tissue engineering.

“Every cell is responsive to pH,” explains Jinglei Ping, associate professor of mechanical and industrial engineering at UMass Amherst and corresponding author of the study. “The behavior and functions of cells are impacted heavily by pH. Some cells lose viability when the pH has a certain level and for some cells, the pH can change their physiological properties.” Previous work has demonstrated that changes of pH as small as 0.1 pH units can have physiologically significant effects on cells.

Dec 31, 2024

Data Sheet: Nvidia’s $700 million open source surprise

Posted by in categories: biotech/medical, cybercrime/malcode, robotics/AI

Plus: Bytedance’s $7 billion loophole, AI-enabled robo-surgeons, the U.S. Treasury hack, and an IBM antitrust probe—in the latest edition of Fortune’s flagship tech newsletter.

Dec 31, 2024

Massive healthcare breaches prompt US cybersecurity rules overhaul

Posted by in categories: biotech/medical, cybercrime/malcode, encryption, health

The U.S. Department of Health and Human Services (HHS) has proposed updates to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to secure patients’ health data following a surge in massive healthcare data leaks.

These stricter cybersecurity rules, proposed by the HHS’ Office for Civil Rights (OCR) and expected to be published as a final rule within 60 days, would require healthcare organizations to encrypt protected health information (PHI), implement multifactor authentication, and segment their networks to make it harder for attackers to move laterally through them.

“In recent years, there has been an alarming growth in the number of breaches affecting 500 or more individuals reported to the Department, the overall number of individuals affected by such breaches, and the rampant escalation of cyberattacks using hacking and ransomware,” the HHS’ proposal says.

Dec 29, 2024

Texas awards $170 million contract for cybersecurity assistance

Posted by in categories: cybercrime/malcode, military

At the end of a year when Texas employees were among those targeted by hackers, the state has awarded a multi-million-dollar contract to a company that works with entities to increase technological efficiency and offer cybersecurity protection. Science Applications International Corporation (SAIC) announced Dec. 18 that it was awarded a $170.9 million contract from the Texas Department of Information Resources (DIR) to provide cybersecurity services in protection of state networks.

SAIC, which is headquartered in Reston, Va., and has been providing security services to California, Colorado and Virginia for years, also has worked with the Air Force in deploying “a cloud-based command and control capability” to air defense sectors with the North American Aerospace Defense Command (NORAD), according to information technology news website StateScoop. It employs about 24,000 people.

Dec 29, 2024

5 Cybersecurity Priorities for The Trump Administration

Posted by in categories: cybercrime/malcode, education, internet, quantum physics, robotics/AI

2024: A year when AI, quantum computing, and cybersecurity converged to redefine our digital landscape. For those navigating these complex technological frontiers, clarity became the most critical currency.

Inside Cyber, Key moments that resonated with our community:

• Cybersecurity Trends for 2025 Diving deep into the evolving threat landscape and strategic priorities.

Continue reading “5 Cybersecurity Priorities for The Trump Administration” »

Dec 28, 2024

How to Steal an AI Model Without Actually Hacking Anything

Posted by in categories: cybercrime/malcode, robotics/AI

Researchers developed a technique that senses a model’s electromagnetic ‘signature’ and compares it to other models run on the same kind of chip.

Page 2 of 22612345678Last