Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 20

Apr 4, 2024

Google fixes one more Chrome zero-day exploited at Pwn2Own

Posted by in category: cybercrime/malcode

Google has fixed another zero-day vulnerability in the Chrome browser, which was exploited by security researchers during the Pwn2Own hacking contest last month.

Tracked as CVE-2024–3159, this high-severity security flaw is caused by an out-of-bounds read weakness in the Chrome V8 JavaScript engine.

Remote attackers can exploit the vulnerability using crafted HTML pages to gain access to data beyond the memory buffer via heap corruption, which can provide them with sensitive information or trigger a crash.

Apr 4, 2024

How to Check if a Linux Distribution is Compromised by the XZ Utils Backdoor in 6 Steps

Posted by in category: cybercrime/malcode

Data security — information security newspaper | hacking news.

Apr 3, 2024

Cow Hacked With Human DNA Produces Milk Containing High Levels of Human Insulin

Posted by in categories: biotech/medical, cybercrime/malcode, genetics

Researchers have created a gene-edited cow that produces human insulin in her milk in Brazil.

Mar 31, 2024

Why neuromorphic chips could be the future of computing

Posted by in categories: cybercrime/malcode, robotics/AI

Neuromorphic chips could reduce energy bills for AI developers as well as emit useful cybersecurity signals in the future of computing.

Mar 30, 2024

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

Posted by in categories: cryptocurrencies, cybercrime/malcode

⚠️ Mac users, beware! Malicious ads and fake websites are spreading dangerous malware like Atomic Stealer, which can steal your passwords, cryptocurrency, and other sensitive data.

Mar 28, 2024

$700 cybercrime software turns Raspberry Pi into an evasive fraud tool

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

Cybercriminals are selling custom Raspberry Pi software called ‘GEOBOX’ on Telegram, which allows inexperienced hackers to convert the mini-computers into anonymous cyberattack tools.

GEOBOX is sold on Telegram channels for a subscription of $80 per month or $700 for a lifetime license, payable in cryptocurrency.

Analysts at Resecurity discovered the tool during an investigation into a high-profile banking theft impacting a Fortune 100 company.

Mar 27, 2024

Predicting and Controlling Bad Actor Artificial Intelligence

Posted by in categories: cybercrime/malcode, government, internet, mapping, robotics/AI

This article includes computer-generated images that map internet communities by topic, without specifically naming each one. The research was funded by the US government, which is anticipating massive interference in the 2024 elections by “bad actors” using relatively simple AI chat-bots.


In an era of super-accelerated technological advancement, the specter of malevolent artificial intelligence (AI) looms large. While AI holds promise for transforming industries and enhancing human life, the potential for abuse poses significant societal risks. Threats include avalanches of misinformation, deepfake videos, voice mimicry, sophisticated phishing scams, inflammatory ethnic and religious rhetoric, and autonomous weapons that make life-and-death decisions without human intervention.

During this election year in the United States, some are worried that bad actor AI will sway the outcomes of hotly contested races. We spoke with Neil Johnson, a professor of physics at George Washington University, about his research that maps out where AI threats originate and how to help keep ourselves safe.

Continue reading “Predicting and Controlling Bad Actor Artificial Intelligence” »

Mar 27, 2024

Waking the Mysteries of Sleep

Posted by in categories: cybercrime/malcode, education, neuroscience

#science Where do our dreams come from, why do we have them, and what do they mean? Can we harness them to foster creativity, solve problems, and prepare for the future? What’s happening in the brains of so-called lucid dreamers, and can new developments in this cutting-edge field of research help us unlock the mystery of consciousness itself? Researchers Deirdre Barrett, Ken Paller, and Antonio Zadra join Brian Greene for a discussion about the mystery and power of dreams and where our minds go after midnight. This program is part of the Big Ideas series, supported by the John Templeton Foundation. Footage of the Ken Paller dream study from NOVA Online: Dream Hacking, https://www.pbs.org/wgbh/nova/video/d… ©2021 WGBH Educational Foundation. Participants: Deirdre Barrett, Psychologist Ken Paller, Neuroscientist Antonio Zadra, Psychologist Brian Greene – moderator Official Site: https://www.worldsciencefestival.com/ Twitter: / worldscifest Facebook: / worldsciencefestival Instagram: / worldscifest #Science #WorldScienceFestival

Mar 26, 2024

Major Python Infrastructure Breach — Over 170K Users Compromised. How Safe Is Your Code?

Posted by in category: cybercrime/malcode

– Over 170K Users Compromised. How Safe Is Your Code? — Malware — Information Security Newspaper | Hacking News.

Mar 26, 2024

The Looping Attack: Application-Layer Loops as a New DDoS Attack Vector

Posted by in category: cybercrime/malcode

Data security — information security newspaper | hacking news.

Page 20 of 220First1718192021222324Last