Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 96

Mar 6, 2022

Cybercrime thrives during pandemic: Verizon 2021 Data Breach Investigations Report

Posted by in categories: biotech/medical, cybercrime/malcode

Mar 6, 2022

DIY Injection Molder Built From A Cheap Pneumatic Press

Posted by in categories: cybercrime/malcode, materials

[Kurt Schaefer] was watching YouTube videos of people making molds for injection molding purposes using what he considered to be the toy 3,018 CNC machines, and looking at the results, decided he needed a piece of the action. However, once you have molds, the next obvious issue to address is lack of access to an injection molding machine. But these things are expensive. As luck would have it, you can get a nice-looking pneumatic press for less than $350, and with a little more money spent, [Kurt] found he could convert it into a functional injection molding machine (video, embedded below), and get some half-decent results out of it.

After ordering the press on eBay, what eventually arrived was quite a mess, having clearly been inadequately packed for its weight, and had sustained some damage in transit. Despite this, it seemed the functional bits were fine, so [Kurt] decided to press on with the build. The first obvious change is the requirement of a heated chamber to deal with the feedstock material. Using an off-the-shelf injection molding chamber by buster beagle 3D, only a few standoffs and a support bracket needed machining in order to complete the mechanics. A common PID controller available from the usual suppliers, with some heat bands wrapped around the chamber, dealt with the injection temperature requirements, and some 3D printed enclosures wrapped it all up neatly.

Continue reading “DIY Injection Molder Built From A Cheap Pneumatic Press” »

Mar 5, 2022

Elon Musk says SpaceX focusing on cyber defense after Starlink signals jammed near Ukraine conflict areas

Posted by in categories: cybercrime/malcode, Elon Musk, government, internet, satellites

Musk and SpaceX sent Starlink terminals to Ukraine at the request of a government official after internet service was disrupted across the country by the Russian invasion. A shipment of Starlink ground terminals, which use an antenna and terminal to access the satellite broadband service, arrived in Ukraine by Monday Feb. 28). With the terminals in use, SpaceX is working to keep them online, Musk said.

“Some Starlink terminals near conflict areas were being jammed for several hours at a time,” Musk wrote in a Twitter statement Friday (March 1). “Our latest software update bypasses the jamming.”

I wonder how many of the satellites are damaged?

Continue reading “Elon Musk says SpaceX focusing on cyber defense after Starlink signals jammed near Ukraine conflict areas” »

Mar 4, 2022

I’ve Dealt With Foreign Cyberattacks. America Isn’t Ready for What’s Coming

Posted by in categories: business, cybercrime/malcode, economics, government, transportation

Yet the United States lacks an organized response. The weekly reports of ransomware attacks and data breaches make it clear that we’re losing this battle. That’s why America’s leaders must rethink the current cyberdefense system and rally around a centralized regulator to defend both citizens and the private sector against current and future attacks.

The decentralized nature of the American government does not lend itself to fighting foreign cyberthreats. Government agencies handle cyberregulation and threats in the sectors they oversee — an inefficient and ineffective way to address an issue that cuts across our entire economy. In just the past few months, the D.H.S.’s Transportation Security Agency announced new cybersecurity requirements for pipelines and railroads; the Federal Communications Commission put out its own proposal for telecommunication companies; the Securities and Exchange Commission voted on rules for investment advisers and funds; and the Federal Trade Commission threatened to legally pursue companies that fail to fix a newly detected software vulnerability found in many business applications. And on Capitol Hill, there are approximately 80 committees and subcommittees that claim jurisdiction over various aspects of cyberregulation.

These scattered efforts are unlikely to reduce, let alone stop, cybercrime.

Mar 3, 2022

Log4Shell flaw: Still being used for crypto mining, botnet building… and Rickrolls

Posted by in category: cybercrime/malcode

Log4Shell is still a threat but it’s mostly being used for crypto mining and knocking out websites.

Mar 3, 2022

The Growing Threat of Ransomware

Posted by in category: cybercrime/malcode

Guest contributor, Brian Wallace writes about the rising threat from cyber attackers who in 2021 have cost organizations over $20 billion.

Mar 2, 2022

NATO cybersecurity center finishes tests of quantum-proof network

Posted by in categories: cybercrime/malcode, quantum physics

The trial started in March 2021 and was completed in early 2022.

Mar 2, 2022

Nvidia Hack Continues with Release of DLSS Source Code

Posted by in category: cybercrime/malcode

The hackers who struck Nvidia last week have released source code related to DLSS into the wild.

Mar 2, 2022

Nvidia hack reportedly leaks six next-gen GeForce GPU names

Posted by in categories: cryptocurrencies, cybercrime/malcode

But no other genuine details have so far made it out of the stolen data folder.


The reported Nvidia hack has allegedly thrown up the codenames of a bunch of next-gen GPUs, which have now been leaked out to the press. The most pertinent ones for us would be the Lovelace GeForce GPUs, of which there are six listed, but here are also listings for the server-based Hopper and Blackwell GPUs. This looks to have come from an initial leak of some of the stolen documents, supplied to Videocardz.

The green team is allegedly being held to ransom over the Ethereum hash rate limiter attached to its most recent graphics card release after hacking group, Lapsus$, made off with around 1TB of sensitive data.

Mar 2, 2022

Second New ‘IsaacWiper’ Data Wiper Targets Ukraine After Russian Invasion

Posted by in categories: cybercrime/malcode, finance, mobile phones

A new, third, data wiper malware — dubbed “IsaacWiper” — is now targeting Ukrainian governmental systems.


Teabot android banking malware spreads again through google play store apps.

Page 96 of 220First93949596979899100Last