Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 91

Dec 19, 2021

Global ransomware attacks rise 151%: Canada spy agency“ data-reactroot=”

Posted by in category: cybercrime/malcode

Agency reports 235 ransomware attacks on Canadian targets this year, half of which were key infrastructure providers.

Dec 18, 2021

Ransomware in 2022: We’re all screwed

Posted by in category: cybercrime/malcode

Security experts tell us what to expect in the cybercriminal landscape as we head into the new year. It’s not good.

Dec 18, 2021

NSO iPhone malware builds a computer inside your phone to steal data

Posted by in categories: cybercrime/malcode, law, mobile phones

NSO Group, an Israeli tech firm, developed malware to hack iPhones by creating a “computer within a computer” capable of stealing sensitive data and sitting undetected for months or even years, researchers at Google have revealed.

The malware is part of NSO Group’s Pegasus software tool, which it is thought to have sold to countries including Azerbaijan, Bahrain, Saudi Arabia, India and the United Arab Emirates. US law-makers have called for sanctions against the firm.


An incredibly sophisticated piece of malware developed by the Israeli tech firm NSO Group works by creating an entirely separate computer inside the memory of an iPhone, allowing attackers to snoop and steal data.

Continue reading “NSO iPhone malware builds a computer inside your phone to steal data” »

Dec 17, 2021

2022 Cyber Security Trends: Ransomware, Extortion, and State Espionage

Posted by in categories: biotech/medical, business, cybercrime/malcode

2021 will be remembered as a significant year for the cyber security industry. With the pandemic accelerating digital transformation, the threat landscape was in constant flux. Major ransomware attacks demonstrated not just their impact on businesses, but wider society too. As we look ahead to 2022, the only constant in our industry is uncertainty in the cyber realm, but here are a few of our predictions for next year, based on trends we’re already seeing emerge.

Ransomware.

Dec 17, 2021

Jamie Metzl: Lab Leak Theory | Lex Fridman Podcast #247

Posted by in categories: bioengineering, biotech/medical, cybercrime/malcode, genetics, government

Jamie Metzl is an author specializing in topics of genetic engineering, biotechnology, and geopolitics. Please support this podcast by checking out our sponsors:
- Mizzen+Main: https://mizzenandmain.com and use code LEX to get $35 off.
- NI: https://www.ni.com/perspectives.
- GiveDirectly: https://givedirectly.org/lex to get gift matched up to $300
- Indeed: https://indeed.com/lex to get $75 credit.
- Blinkist: https://blinkist.com/lex and use code LEX to get 25% off premium.

EPISODE LINKS:
Jamie’s Twitter: https://twitter.com/JamieMetzl.
Jamie’s Website: https://jamiemetzl.com/
Jamie’s lab leak blog post: https://jamiemetzl.com/origins-of-sars-cov-2/
Hacking Darwin (book): https://amzn.to/3lLqLsM

Continue reading “Jamie Metzl: Lab Leak Theory | Lex Fridman Podcast #247” »

Dec 17, 2021

Chinese Spies Accused of Using Huawei in Secret Telecom Hack

Posted by in categories: cybercrime/malcode, government

The U.S. government has warned for years that products from Chinese tech giant Huawei Technologies Co. pose a national security risk. Now, a Bloomberg investigation has found a key piece of evidence explaining why. Bloomberg’s Jamie Tarabay reports on “Bloomberg Daybreak: Asia.”

Dec 17, 2021

Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips

Posted by in categories: cybercrime/malcode, internet

Cybersecurity researchers have demonstrated a new attack technique that makes it possible to leverage a device’s Bluetooth component to directly extract network passwords and manipulate traffic on a Wi-Fi chip, putting billions of electronic devices at risk of stealthy attacks.

The novel attacks work against the so-called “combo chips,” which are specialized chips that are equipped to handle different types of radio wave-based wireless communications, such as Wi-Fi, Bluetooth, and LTE.

“We provide empirical evidence that coexistence, i.e., the coordination of cross-technology wireless transmissions, is an unexplored attack surface,” a group of researchers from the Technical University of Darmstadt’s Secure Mobile Networking Lab and the University of Brescia said in a new paper.

Dec 17, 2021

New Fileless Malware Uses Windows Registry as Storage to Evade Detection

Posted by in category: cybercrime/malcode

A new fileless malware has been spotted using Windows OS registry as both persistent and temporary storage to evade detection.

Dec 16, 2021

Log4j software bug is ‘severe risk’ to the entire internet

Posted by in categories: cybercrime/malcode, internet

A flaw in a commonly used piece of software has left millions of web servers vulnerable to exploitation by hackers.

Dec 16, 2021

Neural networks can hide malware, and scientists are worried

Posted by in categories: cybercrime/malcode, robotics/AI

This article is part of our reviews of AI research papers, a series of posts that explore the latest findings in artificial intelligence.

With their millions and billions of numerical parameters, deep learning models can do many things: detect objects in photos, recognize speech, generate text—and hide malware. Neural networks can embed malicious payloads without triggering anti-malware software, researchers at the University of California, San Diego, and the University of Illinois have found.

Their malware-hiding technique, EvilModel, sheds light on the security concerns of deep learning, which has become a hot topic of discussion in machine learning and cybersecurity conferences. As deep learning becomes ingrained in applications we use every day, the security community needs to think about new ways to protect users against their emerging threats.

Page 91 of 207First8889909192939495Last