Archive for the ‘cybercrime/malcode’ category: Page 23

Jul 13, 2022

Researchers find the missing photonic link to enable an all-silicon quantum internet

Posted by in categories: biotech/medical, chemistry, cybercrime/malcode, internet, quantum physics, supercomputing

Researchers at Simon Fraser University have made a crucial breakthrough in the development of quantum technology.

Their research, published in Nature today, describes their observations of more than 150,000 silicon “T center” photon-spin qubits, an important milestone that unlocks immediate opportunities to construct massively scalable quantum computers and the quantum internet that will connect them.

Quantum computing has to provide computing power well beyond the capabilities of today’s supercomputers, which could enable advances in many other fields, including chemistry, , medicine and cybersecurity.

Jul 13, 2022

Microsoft Warns of Large-Scale AiTM Phishing Attacks Against Over 10,000 Organizations

Posted by in category: cybercrime/malcode

Microsoft warns of a large-scale AITM phishing attacks targeting over 10,000 organizations across the world.

Jul 12, 2022

New ‘Luna Moth’ hackers breach orgs via fake subscription renewals

Posted by in category: cybercrime/malcode

A new data extortion group has been breaching companies to steal confidential information, threatening victims to make the files publicly available unless they pay a ransom.

The gang received the name Luna Moth and has been active since at least March in phishing campaigns that delivered remote access tools (RAT) that enable the corporate data theft.

Jul 9, 2022

The Devastating Decline of a Brilliant Young Coder

Posted by in categories: cybercrime/malcode, internet

Lee Holloway programmed internet security firm Cloudflare into being. Then he became apathetic, distant, and unpredictable—for a long time, no one could make sense of it.

Jul 8, 2022

Finding and fixing bugs with deep learning

Posted by in categories: cybercrime/malcode, education, robotics/AI

Circa 2021

Finding and fixing bugs in code is a time-consuming, and often frustrating, part of everyday work for software developers. Can deep learning address this problem and help developers deliver better software, faster? In a new paper, Self-Supervised Bug Detection and Repair, presented at the 2021 Conference on Neural Information Processing Systems (NeurIPS 2021), we show a promising deep learning model, which we call BugLab can be taught to detect and fix bugs, without using labelled data, through a “hide and seek” game.

To find and fix bugs in code requires not only reasoning over the code’s structure but also understanding ambiguous natural language hints that software developers leave in code comments, variable names, and more. For example, the code snippet below fixes a bug in an open-source project in GitHub.

Continue reading “Finding and fixing bugs with deep learning” »

Jul 8, 2022

Researchers achieve record entanglement of quantum memories

Posted by in categories: cybercrime/malcode, particle physics, quantum physics

A network in which data transmission is perfectly secure against hacking? If physicists have their way, this will become reality one day with the help of the quantum mechanical phenomenon known as entanglement. For entangled particles, the rule is: If you measure the state of one of the particles, then you automatically know the state of the other. It makes no difference how far away the entangled particles are from each other. This is an ideal state of affairs for transmitting information over long distances in a way that renders eavesdropping impossible.

A team led by physicists Prof. Harald Weinfurter from LMU and Prof. Christoph Becher from Saarland University have now coupled two atomic over a 33-kilometer-long fiber optic connection. This is the longest distance so far that anyone has ever managed entanglement via a telecom fiber.

The quantum mechanical entanglement is mediated via photons emitted by the two quantum memories. A decisive step was the researchers’ shifting of the wavelength of the emitted light particles to a value that is used for conventional telecommunications. “By doing this, we were able to significantly reduce the loss of photons and create entangled quantum memories even over long distances of fiber optic cable,” says Weinfurter.

Jul 7, 2022

North Korean hackers now targeting hospitals and healthcare providers, U.S. agencies warn

Posted by in categories: biotech/medical, cybercrime/malcode, government

North Korean-backed hackers are targeting hospitals and healthcare organizations in the U.S. with ransomware, a trio of government agencies that includes the Federal Bureau of Investigation warn in a cybersecurity alert.

Jul 7, 2022

Finding and fixing software bugs automatically with SapFix and Sapienz

Posted by in categories: cybercrime/malcode, robotics/AI

Circa 2018

Debugging code is drudgery. But SapFix, a new AI hybrid tool created by Facebook engineers, can significantly reduce the amount of time engineers spend on debugging, while also speeding up the process of rolling out new software. SapFix can automatically generate fixes for specific bugs, and then propose them to engineers for approval and deployment to production.

SapFix has been used to accelerate the process of shipping robust, stable code updates to millions of devices using the Facebook Android app — the first such use of AI-powered testing and debugging tools in production at this scale. We intend to share SapFix with the engineering community, as it is the next step in the evolution of automating debugging, with the potential to boost the production and stability of new code for a wide range of companies and research organizations.

Continue reading “Finding and fixing software bugs automatically with SapFix and Sapienz” »

Jul 7, 2022

Russia’s Sandworm Hackers Have Built a Botnet of Firewalls

Posted by in category: cybercrime/malcode

Western intelligence services are raising alarms about Cyclops Blink, the latest tool at the notorious group’s disposal.

Jul 5, 2022

In the Brain, Function Follows Form

Posted by in categories: cybercrime/malcode, neuroscience

Interpreting magnetic resonance images in the context of network control theory, researchers seek to explain the brain’s dynamics in terms of its structure, information content, and energetics.

Zero-Day vulnerability in Chrome, Edge, Brave, Opera, Vivaldi browsers allow taking control of your laptop or mobile — Vulnerabilities — Information Security Newspaper | Hacking News.

Page 23 of 161First2021222324252627Last