Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 18

Apr 29, 2024

Millions of devices still vulnerable to abandoned USB worm, continues to spread globally

Posted by in category: cybercrime/malcode

Security researchers have uncovered a chilling global epidemic: an old malware that has been spreading uncontrollably for years. Despite its creators seemingly abandoning the project years ago, this insidious USB worm has lived on, potentially infecting millions of new machines around the world.

The worm, which first hit the scene in 2019 as a new variant of the infamous PlugX malware, had a devious trick up its sleeve. It could automatically copy itself onto any USB drive connected to an infected machine, allowing it to hitch a ride and infect new computers without any user interaction required.

But at some point, the hackers abandoned the malware’s command-and-control server, essentially cutting off their ability to oversee the infected machines. One might assume this would be the end of the line for the pesky worm, but that was not the case.

Apr 28, 2024

Expert-Defying Anomaly — Scientists Discover 2D Nanomaterial With Counter-Intuitive Expanding Properties

Posted by in categories: chemistry, cybercrime/malcode, nanotechnology, particle physics

It is a common hack to stretch a balloon out to make it easier to inflate. When the balloon stretches, the width crosswise shrinks to the size of a string. Noah Stocek, a PhD student collaborating with Western University physicist Giovanni Fanchini, has developed a new nanomaterial that demonstrates the opposite of this phenomenon.

Working at Interface Science Western, home of the Tandetron Accelerator Facility, Stocek, and Fanchini formulated two-dimensional nanosheets of tungsten semi-carbide (or W2C, a chemical compound containing equal parts of tungsten and carbon atoms) which when stretched in one direction, expand perpendicular to the applied force. This structural design is known as auxetics.

Apr 27, 2024

Microsoft Warns Windows Users Of Ongoing Russian Hack Attack

Posted by in category: cybercrime/malcode

Russian military intelligence hackers have been exploiting a Windows vulnerability since at least 2020 according to a new Microsoft report. Here’s what you need to know.

Apr 25, 2024

Hackers are using developing countries for ransomware practice

Posted by in categories: business, cybercrime/malcode, finance

Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and South America before targeting richer countries that have more sophisticated security methods.

Hackers have adopted a “strategy” of infiltrating systems in the developing world before moving to higher-value targets such as in North America and Europe, according to a report published on Wednesday by cyber security firm Performanta.

“Adversaries are using developing countries as a platform where they can test their malicious programs before the more resourceful countries are targeted,” the company told Banking Risk and Regulation, a service from FT Specialist.

Apr 22, 2024

China Working on Super-Fast Submarines Powered by Lasers

Posted by in categories: cybercrime/malcode, military

In China, scientists say they’re developing technology that uses lasers to propel submarines nearly as fast as a jet engine.

As the South China Morning Post reports, engineers at the Harbin Engineering University in Heilongjiang province — where, notably, China’s first experimental submarine was developed — claim that the country’s military is close to achieving this colossal feat.

The idea behind the burgeoning technology is ingenious: lasers generate plasma underwater, which then creates a so-called “detonation wave” to propel a submarine vessel forward. As the SCMP notes, Japanese researchers first proposed this sort of laser propulsion methodology 20 years ago, and in China, scientists have been trying to figure out how to hack it for at least a decade.

Apr 17, 2024

Two-dimensional nanomaterial sets expansion record

Posted by in categories: cybercrime/malcode, nanotechnology

It is a common hack to stretch a balloon out to make it easier to inflate. When the balloon stretches, the width crosswise shrinks to the size of a string. Noah Stocek, a Ph.D. student collaborating with Western physicist Giovanni Fanchini, has developed a new nanomaterial that demonstrates the opposite of this phenomenon.

Apr 13, 2024

The experimental demonstration of a verifiable blind quantum computing protocol

Posted by in categories: cybercrime/malcode, quantum physics

Quantum computers, systems that process and store information leveraging quantum mechanical phenomena, could eventually outperform classical computers on numerous tasks. Among other things, these computers could allow researchers to tackle complex optimization problems, speed up drug discovery and better protect users against cyber-security threats.

Apr 10, 2024

Banking giant Wells Fargo suffers data breach, sends two notification letters

Posted by in categories: cybercrime/malcode, finance

American multinational bank Wells Fargo has informed two of its customers about a data breach.

The personal information involved includes names of clients and mortgage account numbers.

The financial services company claims to be responsible for safeguarding customer information and promptly responded to the incident as it arose.

Apr 9, 2024

Hackers stole 340,000 Social Security numbers from government consulting firm

Posted by in categories: cybercrime/malcode, economics, government

GMA provides economic and litigation support to companies and U.S. government agencies, including the U.S. Department of Justice, bringing civil litigation. According to its data breach notice, GMA told affected individuals that their personal information “was obtained by the U.S. Department of Justice (“DOJ”) as part of a civil litigation matter” supported by GMA.

The reasons and target of the DOJ’s civil litigation are not known. A spokesperson for the Justice Department did not respond to a request for comment.

GMA said that individuals notified of the data breach are “not the subject of this investigation or the associated litigation matters,” and that the cyberattack “does not impact your current Medicare benefits or coverage.”

Apr 9, 2024

NSA Expert: Quantum Computing to Enter Workforce in 3 to 5 Years

Posted by in categories: cybercrime/malcode, government, quantum physics

A national security expert predicts practical quantum computing tools are just three to five years away from integration into the workforce, NextGov is reporting.

Neal Ziring, the Technical Director of the National Security Agency’s (NSA) Cybersecurity Directorate, made the forecast during a recent public sector cybersecurity event hosted by Palo Alto Networks in Palo Alto. As reported by NextGov, Ziring expects the devices to be accessible predominantly through cloud-based platforms.

Ziring added that the impracticality and cost-prohibitive nature of would put on-premise installations for quantum computing systems out of reach for most organizations, including government agencies.

Page 18 of 220First1516171819202122Last