Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 36

Mar 25, 2023

Gmail and Outlook users given ‘red alert’ over scary AI ‘hiding in your inbox’

Posted by in categories: cybercrime/malcode, robotics/AI

A nefarious use for AI. Phishing emails.


SECURITY experts have issued a warning over dangerous phishing emails that are put together by artificial intelligence.

The scams are convincing and help cybercriminals connect with victims before they attack, according to security site CSO.

Continue reading “Gmail and Outlook users given ‘red alert’ over scary AI ‘hiding in your inbox’” »

Mar 24, 2023

Scientist Reveals How to Escape Our Simulation

Posted by in category: cybercrime/malcode

Hack your way out of the wrong reality.

Mar 21, 2023

Google AI And Microsoft ChatGPT Are Not Our Biggest Security Risks, Warns Chess Legend Kasparov

Posted by in categories: biotech/medical, cybercrime/malcode, internet, robotics/AI, supercomputing

Amid a flurry of Google and Microsoft generative AI releases last week during SXSW, Garry Kasparov, who is a chess grandmaster, Avast Security Ambassador and Chairman of the Human Rights Foundation, told me he is less concerned about ChatGPT hacking into home appliances than he is about users being duped by bad actors.

“People still have the monopoly on evil,” he warned, standing firm on thoughts he shared with me in 2019. Widely considered one of the greatest chess players of all time, Kasparov gained mythic status in the 1990s as world champion when he beat, and then was defeated by IBM’s Deep Blue supercomputer.


Despite the rapid advancement of generative AI, chess legend Garry Kasparov, now ambassador for the security firm Avast, explains why he doesn’t fear ChatGPT creating a virus to take down the Internet, but shares Gen’s CTO concerns that text-to-video deepfakes could warp our reality.

Continue reading “Google AI And Microsoft ChatGPT Are Not Our Biggest Security Risks, Warns Chess Legend Kasparov” »

Mar 19, 2023

OpenAI CEO cautions AI like ChatGPT could cause disinformation, cyber-attacks

Posted by in categories: cybercrime/malcode, robotics/AI

Society has a limited amount of time “to figure out how to react” and “regulate” AI, says Sam Altman.

OpenAI CEO Sam Altman has cautioned that his company’s artificial intelligence technology, ChatGPT, poses serious risks as it reshapes society.

He emphasized that regulators and society must be involved with the technology, according to an interview telecasted by ABC News on Thursday night.

Continue reading “OpenAI CEO cautions AI like ChatGPT could cause disinformation, cyber-attacks” »

Mar 16, 2023

Cryptojacking Group TeamTNT Suspected of Using Decoy Miner to Conceal Data Exfiltration

Posted by in categories: cryptocurrencies, cybercrime/malcode

The cryptojacking group known as TeamTNT is suspected to be behind a previously undiscovered strain of malware used to mine Monero cryptocurrency on compromised systems.

That’s according to Cado Security, which found the sample after Sysdig detailed a sophisticated attack known as SCARLETEEL aimed at containerized environments to ultimately steal proprietary data and software.

Specifically, the early phase of the attack chain involved the use of a cryptocurrency miner, which the cloud security firm suspected was deployed as a decoy to conceal the detection of data exfiltration.

Mar 15, 2023

Researchers From Stanford And DeepMind Come Up With The Idea of Using Large Language Models LLMs as a Proxy Reward Function

Posted by in categories: cybercrime/malcode, internet, robotics/AI

With the development of computing and data, autonomous agents are gaining power. The need for humans to have some say over the policies learned by agents and to check that they align with their goals becomes all the more apparent in light of this.

Currently, users either 1) create reward functions for desired actions or 2) provide extensive labeled data. Both strategies present difficulties and are unlikely to be implemented in practice. Agents are vulnerable to reward hacking, making it challenging to design reward functions that strike a balance between competing goals. Yet, a reward function can be learned from annotated examples. However, enormous amounts of labeled data are needed to capture the subtleties of individual users’ tastes and objectives, which has proven expensive. Furthermore, reward functions must be redesigned, or the dataset should be re-collected for a new user population with different goals.

New research by Stanford University and DeepMind aims to design a system that makes it simpler for users to share their preferences, with an interface that is more natural than writing a reward function and a cost-effective approach to define those preferences using only a few instances. Their work uses large language models (LLMs) that have been trained on massive amounts of text data from the internet and have proven adept at learning in context with no or very few training examples. According to the researchers, LLMs are excellent contextual learners because they have been trained on a large enough dataset to incorporate important commonsense priors about human behavior.

Mar 13, 2023

AT&T data breach hits nine million customer accounts

Posted by in category: cybercrime/malcode

A third-party vendor hack exposed millions of AT&T customers’ account information, including names, phone numbers, and email addresses.

Mar 13, 2023

Stealthy UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw

Posted by in category: cybercrime/malcode

Researchers on Wednesday announced a major cybersecurity find—the world’s first-known instance of real-world malware that can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of Windows.

Dubbed BlackLotus, the malware is what’s known as a UEFI bootkit. These sophisticated pieces of malware target the UEFI—short for Unified Extensible Firmware Interface —the low-level and complex chain of firmware responsible for booting up virtually every modern computer. As the mechanism that bridges a PC’s device firmware with its operating system, the UEFI is an OS in its own right. It’s located in an SPI-connected flash storage chip soldered onto the computer motherboard, making it difficult to inspect or patch. Previously discovered bootkits such as CosmicStrand, MosaicRegressor, and MoonBounce work by targeting the UEFI firmware stored in the flash storage chip. Others, including BlackLotus, target the software stored in the EFI system partition.

Because the UEFI is the first thing to run when a computer is turned on, it influences the OS, security apps, and all other software that follows. These traits make the UEFI the perfect place to launch malware. When successful, UEFI bootkits disable OS security mechanisms and ensure that a computer remains infected with stealthy malware that runs at the kernel mode or user mode, even after the operating system is reinstalled or a hard drive is replaced.

Mar 13, 2023

CASPER attack steals data using air-gapped computer’s internal speaker

Posted by in categories: cybercrime/malcode, mobile phones

Researchers at the School of Cyber Security at Korea University, Seoul, have presented a new covert channel attack named CASPER can leak data from air-gapped computers to a nearby smartphone at a rate of 20bits/sec.

The CASPER attack leverages the internal speakers inside the target computer as the data transmission channel to transmit high-frequency audio that the human ear cannot hear and convey binary or Morse code to a microphone up to 1.5m away.

The receiving microphone can be in a smartphone recording sound inside the attacker’s pocket or a laptop in the same room.

Mar 11, 2023

AT&T data breach compromises roughly nine million accounts, here’s what you need to know

Posted by in category: cybercrime/malcode

It looks like AT&T experienced a data breach, leaving roughly 9 million customers data exposed. The data breach didn’t come directly from the wireless carrier, but occurred with one of its vendors.

The news originates from the AT&T forums, where customers were curious about an email that has apparently been going out to affected customers since last week. The email discusses the breach the wireless carrier experienced, sharing that it occurred with one of its vendor’s systems, which gave access to the wireless carrier’s “Customer Proprietary Network Information” (CPNI) system.

Page 36 of 200First3334353637383940Last