Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 130

Feb 12, 2021

Researcher hacks into 35 major technology firms

Posted by in category: cybercrime/malcode

A Romanian threat researcher detailed in a published report Wednesday how he broke into IT systems belonging to some of the largest corporations in the world. His assaults successfully targeted Apple, Microsoft, Tesla, PayPal, Netflix and more than 30 other corporations.

Feb 10, 2021

Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple

Posted by in category: cybercrime/malcode

Ethical hacker Alex Birsan developed a way to inject malicious code into open-source developer tools to exploit dependencies in organizations internal applications.

Feb 8, 2021

In Florida, a near-miss with a cybersecurity worst-case scenario

Posted by in category: cybercrime/malcode

“A hacker, who authorities believe to be the same one from the initial breach, took control of the computer and changed the acceptable level of sodium hydroxide — better known as lye, the main ingredient in many household drain cleaners — from 100 parts per million to 11100 parts per million. A water plant operator noticed immediately and corrected the change, Gualtieri said, adding that if the operator had missed it and the change didn’t trigger some of the plant’s alarms, the lye could have seeped into the water supply in 24 to 36 hours.”


A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye to extremely dangerous levels, officials said.

Continue reading “In Florida, a near-miss with a cybersecurity worst-case scenario” »

Feb 8, 2021

Dr. Julie Marble — JHU Applied Physics Lab — Human-Autonomy Interaction, Collaboration and Trust

Posted by in categories: biotech/medical, cybercrime/malcode, military, robotics/AI

Human-Autonomy Interaction, Collaboration and Trust — Dr. Julie Marble, JHU Applied Physics Laboratory (APL)


Dr. Julie Marble is a senior scientist at the Johns Hopkins University Applied Physics Laboratory (JHUAPL) leading research in human-autonomy interaction, collaboration and trust.

Continue reading “Dr. Julie Marble — JHU Applied Physics Lab — Human-Autonomy Interaction, Collaboration and Trust” »

Feb 8, 2021

FETT Bug Bounty Helps Strengthen SSITH Hardware Defenses

Posted by in category: cybercrime/malcode

After three months of reviewing more than 13000 hours of hacking exploits conducted by more than 580 cybersecurity researchers, DARPA today announced that its Finding Exploits to Thwart Tampering (FETT) Bug Bounty successfully proved the value of the secure hardware architectures developed under its System Security Integration Through Hardware and Firmware (SSITH) program while pinpointing critical areas to further harden defenses.

Feb 7, 2021

Cybersecurity Threats: The Daunting Challenge Of Securing The Internet Of Things

Posted by in categories: cybercrime/malcode, internet

Kindly see my latest FORBES article: Thanks for reading and sharing and stay safe!

#cybersecurity #internetofthings


By 2025, it is expected that there will be more than 30 billion IoT connections, almost 4 IoT devices per person on average and that also amounts to trillions of sensors connecting and interacting on these devices.

Continue reading “Cybersecurity Threats: The Daunting Challenge Of Securing The Internet Of Things” »

Feb 6, 2021

Google says it’s too easy for hackers to find new security flaws

Posted by in categories: cybercrime/malcode, internet

In December 2018, researchers at Google detected a group of hackers with their sights set on Microsoft’s Internet Explorer. Even though new development was shut down two years earlier, it’s such a common browser that if you can find a way to hack it, you’ve got a potential open door to billions of computers.

Feb 6, 2021

Machine learning algorithm may be the key to timely, inexpensive cyber-defense

Posted by in categories: cybercrime/malcode, information science, robotics/AI

Attacks on vulnerable computer networks and cyber-infrastructure—often called zero-day attacks—can quickly overwhelm traditional defenses, resulting in billions of dollars of damage and requiring weeks of manual patching work to shore up the systems after the intrusion.

Feb 3, 2021

Alleged Gaming Software Supply-Chain Attack Installs Spyware

Posted by in category: cybercrime/malcode

Researchers allege that software used for downloading Android apps onto PCs and Macs has been compromised to install malware onto victim devices.

Feb 2, 2021

Agent Tesla ramps up its game in bypassing security walls, attacks endpoint protection

Posted by in category: cybercrime/malcode

The malware now attempts to disable Microsoft antivirus protection.