Toggle light / dark theme

New ‘negative light’ technology hides data transfers in plain sight

Engineers at UNSW Sydney and Monash have developed an innovative way of sending hidden information that’s hard to intercept. Using a phenomenon known as “negative luminescence,” the system works by making signals blend perfectly into the background of natural heat radiation, such as can be seen with a thermal camera.

To outside observers, it looks like no data is being sent at all. Only a receiver with the right equipment can pick up the hidden message.

Because the very act of communication is invisible, the method makes signals almost impossible to intercept or hack. That means it could one day offer a powerful new security tool for sensitive communications in fields like defense and finance.

Why Hollywood Is Facing a Very Unhappy Ending

Layoffs, consolidation, streaming losses, artificial intelligence and the rise of the creator economy are reshaping Hollywood, raising questions about whether the industry is just hitting a rough patch or in terminal decline.

#hollywood #film #tv ——– Like this video? Subscribe: https://www.youtube.com/Bloomberg?sub_confirmation=1

Get unlimited access to Bloomberg.com for just $1.99 your first month: https://www.bloomberg.com/subscriptions?in_source=YoutubeOriginals Bloomberg Originals offers bold takes for curious minds on today’s biggest topics. Hosted by experts covering stories you haven’t seen and viewpoints you haven’t heard, you’ll discover cinematic, data-led shows that investigate the intersection of business and culture. Exploring every angle of climate change, technology, finance, sports and beyond, Bloomberg Originals is business as you’ve never seen it.

Subscribe for business news, but not as you’ve known it: exclusive interviews, fascinating profiles, data-driven analysis, and the latest in tech innovation from around the world.

Visit our partner channel Bloomberg News for global news and insight in an instant.

New BeatBanker Android malware poses as Starlink app to hijack devices

A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store.

The malware combines banking trojan functions with Monero mining, and can steal credentials, as well as tamper with cryptocurrency transactions.

Kaspersky researchers discovered BeatBanker in campaigns targeting users in Brazil. They also found that the most recent version of the malware deploys the commodity Android remote access trojan called BTMOB RAT, instead of the banking module.

Microsoft Teams phishing targets employees with A0Backdoor malware

Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor.

The attacker relies on social engineering to gain the employee’s trust by first flooding their inbox with spam and then contacting them over Teams, pretending to be the company’s IT staff, offering assistance with the unwanted messages.

To obtain access to the target machine, the threat actor instructs the user to start a Quick Assist remote session, which is used to deploy a malicious toolset that includes digitally signed MSI installers hosted in a personal Microsoft cloud storage account.

Ancient Greece’s most famous oracle was just high on gas fumes

For centuries, people traveled to Delphi in southern Greece hoping for a glimpse of their future. There, at the temple of the god Apollo, a priestess was said to enter a trance and issue prophecies in the voice of Apollo himself. Everyday people, kings, even Alexander the Great traveled for miles to hear the priestess’s input on important decisions, from personal finance to matters of state.

Known as the Pythia or the Oracle of Delphi, the priestess wasn’t believed to be a psychic. Ancient writers like Plutarch, who served as a priest at Delphi in the first and second centuries, described her as a vessel for a power that came from the Earth.

According to Plutarch’s account, the temple of Delphi was constructed around a natural spring, where the water and fissures in the rock produced a sweet-smelling gas called pneuma. On designated days a few times per year, the chosen priestess sat amidst the pneuma on a tripod stool and inhaled enough to enter her trance. This was an exhausting ordeal for the woman. She might cry out, become hysterical, or collapse.

Power producers have financial incentives to block market integration despite cost savings, says study

Renewable energy is lowering electricity costs in some parts of the country, but those benefits aren’t being seen by consumers everywhere because they’re typically placed far away from demand centers. Better integrating electricity transmission networks across regions could significantly reduce generation costs, new research from the University of Michigan shows—at the expense of generation companies’ profits. The study is published in the journal Proceedings of the National Academy of Sciences.

Economist Catherine Hausman, associate professor at the Ford School of Public Policy, and colleagues found that improving interregional connectivity could have saved anywhere from $5.8 billion to $7.1 billion in electricity generation costs in 2022, and $3.4 billion to $5 billion in 2023.

At the same time, investing in regional connectivity could cost some power plants over $20 million in annual net revenue—giving them financial incentives to block or delay transmission network improvements.

Microsoft: Hackers abuse OAuth error flows to spread malware

Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages.

The attacks target government and public-sector organizations with phishing links that prompt users to authenticate to a malicious application, Microsoft Defender researchers say.

With e-signature requests, Social Security notices, meeting invitations, password resets, or various financial and political topics that contain OAuth redirect URLs. Sometimes, the URLs are embedded in PDF files to evade detection.

/* */