Blog

Archive for the ‘cybercrime/malcode’ category: Page 130

Jan 26, 2021

How quantum computers could hack our brains with fake memories like Total Recall

Posted by in categories: cybercrime/malcode, neuroscience, quantum physics

Well, maybe they would be good memories. 😃


Quantum computers, according to experts, will one day be capable of performing incredible calculations and nearly unfathomable feats of logic. In the near future, we know they’ll help us discover new drugs to fight disease and new materials to build with. But the far future potential for these enigmatic machines is as vast as the universe itself.

Continue reading “How quantum computers could hack our brains with fake memories like Total Recall” »

Jan 22, 2021

New website launched to document vulnerabilities in malware strains

Posted by in category: cybercrime/malcode

Controversy brewing?

But the site also touches on a sensitive topic in the cyber-security industry. For decades, security researchers have been secretly hacking back against malware operators.

Just like malware sometimes uses bugs in legitimate apps to infiltrate systems, security firms have also used bugs in malware code to infiltrate the attacker’s infrastructure.

Jan 15, 2021

AI set to replace humans in cybersecurity by 2030, says Trend Micro

Posted by in categories: cybercrime/malcode, robotics/AI

In 2021 Trend Micro predicts that cybercriminals will look to home networks as a critical launch pad to compromising corporate IT and IoT networks.

Jan 14, 2021

Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips

Posted by in category: cybercrime/malcode

Intel 11th Gen vPro Chips Adds Hardware-Enabled Ransomware Detection.

Jan 14, 2021

FTC settlement with Ever orders data and AIs deleted after facial recognition pivot

Posted by in categories: cybercrime/malcode, information science, robotics/AI

The maker of a defunct cloud photo storage app that pivoted to selling facial recognition services has been ordered to delete user data and any algorithms trained on it, under the terms of an FTC settlement.

The regulator investigated complaints the Ever app — which gained earlier notoriety for using dark patterns to spam users’ contacts — had applied facial recognition to users’ photographs without properly informing them what it was doing with their selfies.

Under the proposed settlement, Ever must delete photos and videos of users who deactivated their accounts and also delete all face embeddings (i.e. data related to facial features which can be used for facial recognition purposes) that it derived from photos of users who did not give express consent to such a use.

Jan 10, 2021

Hack-proof network closer after China’s quantum communication experiment

Posted by in categories: cybercrime/malcode, quantum physics

China is positioning itself to be a world leader in quantum technology, including drafting international standards.

Jan 9, 2021

The Best Cybersecurity Predictions For 2021 Roundup

Posted by in category: cybercrime/malcode

The following predictions provide insights into how cybersecurity will evolve in 2021:


55% of enterprise executives plan to increase their cybersecurity budgets in 2021, and 51% are adding full-time cyber staff in 2021 according to PwC.

Jan 8, 2021

Is neuroscience the key to protecting AI from adversarial attacks?

Posted by in categories: biotech/medical, cybercrime/malcode, neuroscience, robotics/AI

Deep learning has come a long way since the days when it could only recognize handwritten characters on checks and envelopes. Today, deep neural networks have become a key component of many computer vision applications, from photo and video editors to medical software and self-driving cars.

Roughly fashioned after the structure of the brain, neural networks have come closer to seeing the world as humans do. But they still have a long way to go, and they make mistakes in situations where humans would never err.

These situations, generally known as adversarial examples, change the behavior of an AI model in befuddling ways. Adversarial machine learning is one of the greatest challenges of current artificial intelligence systems. They can lead to machine learning models failing in unpredictable ways or becoming vulnerable to cyberattacks.

Jan 8, 2021

FBI Warns of Egregor Attacks on Businesses Worldwide

Posted by in categories: business, cybercrime/malcode

The agency said the malware has already compromised more than 150 organizations and provided insight into its ransomware-as-a-service behavior.

The FBI has alerted companies in the private sector to a spate of attacks using the Egregor ransomware. The malware currently is raging a warpath across businesses worldwide and has already compromised more than 150 organizations.

The agency issued an advisory (PDF) that also shed new light and identifies the innerworkings of the prolific malware, which has already been seen wreaking indiscriminate havoc against various types of organizations. Bookseller Barnes & Noble, retailer Kmart, gaming software provider Ubisoft and the Vancouver metro system Translink all are known victims of the ransomware.

Jan 4, 2021

DUAL takes AI to the next level

Posted by in categories: cybercrime/malcode, information science, robotics/AI

Scientists at DGIST in Korea, and UC Irvine and UC San Diego in the US, have developed a computer architecture that processes unsupervised machine learning algorithms faster, while consuming significantly less energy than state-of-the-art graphics processing units. The key is processing data where it is stored in computer memory and in an all-digital format. The researchers presented the new architecture, called DUAL, at the 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture.

“Today’s computer applications generate a large amount of data that needs to be processed by algorithms,” says Yeseong Kim of Daegu Gyeongbuk Institute of Science and Technology (DGIST), who led the effort.

Powerful “unsupervised” machine learning involves training an algorithm to recognize patterns in without providing labeled examples for comparison. One popular approach is a clustering algorithm, which groups similar data into different classes. These algorithms are used for a wide variety of data analyzes, such as identifying on social media, filtering spam email and detecting criminal or fraudulent activity online.