Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 139

Sep 4, 2020

The psychology of phishing: why do we fall for terrible email scams?

Posted by in categories: cybercrime/malcode, finance

This is an article from 2014, but it’s interesting — especially for why phishing emails are so lame. Money quote:

‘The answer is that the implausibility is a useful tool for the scammers. An entirely believable email would get millions of people falling for the bait – most of whom would catch on later when the scammers started requesting private banking details. This way, the fraudsters can avoid wasting their time on no-hopers, knowing that any replies they do receive are … See More.


Maybe your bank wants you to update your password; maybe a new Facebook friend wants to show you a funny web page. Maybe a Nigerian lawyer wants to pass on a legacy from a long-lost relative.

Continue reading “The psychology of phishing: why do we fall for terrible email scams?” »

Sep 3, 2020

Our quantum internet breakthrough could help make hacking a thing of the past

Posted by in categories: cybercrime/malcode, internet, quantum physics

New research shows how the next generation of ultra-secure communication could be possible with existing infrastructure.

Sep 3, 2020

Optimising the Everyday with The Spatial Web

Posted by in categories: augmented reality, bitcoin, cybercrime/malcode, internet, robotics/AI

Amanda Christensen, ideaXme guest contributor, fake news and deepfake researcher and Marketing Manager at Cubaka, interviews Dan Mapes, PhD, MBA co-founder of VERSES.io and co-author of The Spatial Web: How Web 3.0 Will Connect Humans, Machines, and AI to Transform the World.

Amanda Christensen Comments:

Continue reading “Optimising the Everyday with The Spatial Web” »

Sep 2, 2020

NCSC departing boss reflects on China, Russia and trust in tech

Posted by in categories: cybercrime/malcode, government

At the same time, the NCSC had to help government and public-sector organisations deal with the sudden increased dependence on technology, whether in the cabinet meeting over video link or the government sending out genuine text messages to the entire public.


The departing head of the National Cyber Security Centre reflects on the threats he has faced.

Aug 30, 2020

Emotet malware’s new ‘Red Dawn’ attachment is just as dangerous

Posted by in category: cybercrime/malcode

The Emotet botnet has begun to use a new template for their malicious attachments, and it is just as dangerous as ever.

After a five-month “vacation,” the Emotet malware returned in July 2020 and began to spew massive amounts of malicious spam worldwide.

Aug 29, 2020

Android security bug let malicious apps siphon off private user data

Posted by in categories: cybercrime/malcode, robotics/AI

The bug, now fixed, could be abused to steal sensitive and private data from other apps.

Aug 28, 2020

FBI Reportedly Foils Russian Hack at Tesla Factory

Posted by in categories: cybercrime/malcode, sustainability, transportation

« Acording to Electrek, an FBI complaint details how the feds helped foil a plot by Russian hackers to target Tesla’s Nevada Gigafactory with a massive ransomware hack and data breach.

It’s worth noting that the complaint itself never explicitly says that the target of the hack was Tesla, though its Gigafactory is located outside Sparks, Nevada. Electrek, though, is reporting as fact that Tesla is the target. We’ve reached out to Tesla for additional information and we’ll update if any new info comes to light. »


Intriguingly, it sounds as though the hackers weren’t just after ransom.

Continue reading “FBI Reportedly Foils Russian Hack at Tesla Factory” »

Aug 27, 2020

4 Evolving Technology Areas Of Smart Cybersecurity

Posted by in categories: cybercrime/malcode, robotics/AI

By Chuck Brooks In FORBES


The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity. Smart Cybersecurity is a logical reaction to try to manage risk by lessening security gaps often posed by reliance on manual processes that are impacted by a continual cybersecurity skills shortage and the administrative burdens of data security management.

Despite the challenges, there is promise for reducing dependence on humans and bolstering cybersecurity capabilities. A myriad of evolving cognitive technologies can help us enhance cybersecurity and navigate the increasingly malicious and disruptive cyber threat landscape. They include:

Continue reading “4 Evolving Technology Areas Of Smart Cybersecurity” »

Aug 25, 2020

Microsoft says the pandemic has changed the future of cybersecurity in these five ways

Posted by in categories: biotech/medical, business, cybercrime/malcode

A new report from Microsoft suggests that cloud-based technologies and Zero Trust architecture will become mainstays of businesses’ cybersecurity investments going forward.

Aug 24, 2020

New Bluetooth Vulnerability: Hackers Could Spy on You

Posted by in categories: cybercrime/malcode, encryption, mobile phones

O,.o.


Millions of us use Bluetooth wireless communications every day—to make phone calls when driving, with our fitness trackers, streaming at work or play. Innocent enough, seemingly. But no technology comes without a warning: a recently discovered Bluetooth vulnerability allows hackers to spy on your conversations or take control of your smart phone. The vulnerability deals with the encryption between two devices. It even has a name—a KNOB hack (Key Negotiation Of Bluetooth).

This is not the first time Bluetooth has been hacked and it likely won’t be the last. And this one has its limitations. To take advantage of the KNOB vulnerability the hacker has to be in close proximity of your phone. There is also currently no evidence that this vulnerability has been exploited maliciously.

Continue reading “New Bluetooth Vulnerability: Hackers Could Spy on You” »