Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 26

Jan 11, 2024

New report identifies types of cyberattacks that manipulate behavior of AI systems

Posted by in categories: cybercrime/malcode, government, robotics/AI

Adversaries can deliberately confuse or even “poison” artificial intelligence (AI) systems to make them malfunction—and there’s no foolproof defense that their developers can employ. Computer scientists from the National Institute of Standards and Technology (NIST) and their collaborators identify these and other vulnerabilities of AI and machine learning (ML) in a new publication.

Their work, titled Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations, is part of NIST’s broader effort to support the development of trustworthy AI, and it can help put NIST’s AI Risk Management Framework into practice. The publication, a collaboration among government, academia, and industry, is intended to help AI developers and users get a handle on the types of attacks they might expect along with approaches to mitigate them—with the understanding that there is no silver bullet.

“We are providing an overview of attack techniques and methodologies that consider all types of AI systems,” said NIST computer scientist Apostol Vassilev, one of the publication’s authors. “We also describe current mitigation strategies reported in the literature, but these available defenses currently lack robust assurances that they fully mitigate the risks. We are encouraging the community to come up with better defenses.”

Jan 10, 2024

Spy Vs. Spy: In The ChatGPT Era, Who’s On First?

Posted by in categories: cybercrime/malcode, robotics/AI

Adam Stern is Founder and CEO of Infinitely Virtual, provider of cloud technology solutions, based in Los Angeles. Twitter: @iv_cloudhosting

Back in the 1960s, when the U.S. faced off against the Soviets, MAD Magazine initiated a snarky proxy war in the form of a recurring comic strip that pitted two animated spies attempting to outsmart each other. In “Spy vs. Spy,” there were no permanent victors.

Fast forward to the ChatGPT generation. In cybersecurity, it’s AI vs AI now, and the black-hatted figure versus the guy in the white hat is no longer as binary as it once was.

Jan 8, 2024

New Dangerous Cyberattacks Target AI Systems

Posted by in categories: biotech/medical, cybercrime/malcode, robotics/AI

This post is also available in: he עברית (Hebrew)

A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.

AI systems are being integrated into more and more aspects of our lives, from driving vehicles to helping doctors diagnose illnesses to interacting with customers as online chatbots. To perform these tasks the models are trained on vast amounts of data, which in turn helps the AI predict how to respond in a given situation.

Jan 5, 2024

Robustly learning the Hamiltonian dynamics of a superconducting quantum processor

Posted by in categories: cybercrime/malcode, information science, quantum physics

The required precision to perform quantum simulations beyond the capabilities of classical computers imposes major experimental and theoretical challenges. The key to solving these issues are highly precise ways of characterizing analog quantum sim ulators. Here, we robustly estimate the free Hamiltonian parameters of bosonic excitations in a superconducting-qubit analog quantum simulator from measured time-series of single-mode canonical coordinates. We achieve the required levels of precision in estimating the Hamiltonian parameters by maximally exploiting the model structure, making it robust against noise and state-preparation and measurement (SPAM) errors. Importantly, we are also able to obtain tomographic information about those SPAM errors from the same data, crucial for the experimental applicability of Hamiltonian learning in dynamical quantum-quench experiments. Our learning algorithm is highly scalable both in terms of the required amounts of data and post-processing. To achieve this, we develop a new super-resolution technique coined tensorESPRIT for frequency extraction from matrix time-series. The algorithm then combines tensorESPRIT with constrained manifold optimization for the eigenspace reconstruction with pre-and post-processing stages. For up to 14 coupled superconducting qubits on two Sycamore processors, we identify the Hamiltonian parameters — verifying the implementation on one of them up to sub-MHz precision — and construct a spatial implementation error map for a grid of 27 qubits. Our results constitute a fully characterized, highly accurate implementation of an analog dynamical quantum simulation and introduce a diagnostic toolkit for understanding, calibrating, and improving analog quantum processors.

Submitted 18 Aug 2021 to Quantum Physics [quant-ph]

Subjects: quant-ph cond-mat.quant-gas physics.comp-ph.

Jan 2, 2024

China, Russia claim to have tested hack-proof quantum communication link

Posted by in categories: cybercrime/malcode, encryption, quantum physics

The secure quantum communication covered a distance of about 4,000 kilometers using China’s quantum satellite Mozi.


Scientists in Russia and China have established quantum communication encrypted with the help of secure keys transmitted by China’s quantum satellite, reports SCMP.

Jan 2, 2024

States and Congress scramble to secure water systems against cyberattacks

Posted by in categories: chemistry, cybercrime/malcode, government, sustainability

READ MORE: Suspected cyberattack renders most gas stations in Iran out of service

The hacking of the Municipal Water Authority of Aliquippa is prompting new warnings from U.S. security officials at a time when states and the federal government are wrestling with how to harden water utilities against cyberattacks.

The danger, officials say, is hackers gaining control of automated equipment to shut down pumps that supply drinking water or contaminate drinking water by reprogramming automated chemical treatments. Besides Iran, other potentially hostile geopolitical rivals, including China, are viewed by U.S. officials as a threat.

Jan 2, 2024

New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections

Posted by in category: cybercrime/malcode

Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that could be used by threat actors to bypass security mechanisms and achieve execution of malicious code on systems running Microsoft Windows 10 and Windows 11.

The approach “leverages executables commonly found in the trusted WinSxS folder and exploits them via the classic DLL search order hijacking technique,” cybersecurity firm Security Joes said in a new report exclusively shared with The Hacker News.

Continue reading “New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections” »

Dec 27, 2023

The next generation of Tesla’s humanoid robot makes its debut | Kurt the CyberGuy

Posted by in categories: cybercrime/malcode, mobile phones, robotics/AI

Tesla unveils Optimus Gen 2, a lighter, faster, and smoother humanoid robot that can assist humans in various tasks.\
https://cyberguy.com/future-tech/next…\
\
For more of my tech tips \& security alerts, subscribe to my free CyberGuy Report Newsletter\
Cyberguy.com/newsletter\
\
Ask Kurt a question or let us know what stories you’d like us to cover\
CyberGuy.com/Contact\
\
***********\
\
Answers to the most asked CyberGuy questions:\
\
● What is the best way to protect your Mac, Windows, iPhone, and Android devices from getting hacked? https://cyberguy.com/software/best-an… \
\
● What is the best way to stay private, secure, and anonymous while browsing the web?\
https://cyberguy.com/privacy/best-vpns/\
\
● How can I get rid of robocalls with apps and data removal services?\
https://cyberguy.com/how-to/how-to-ge…\
\
***********\
\
Related: \
\
Best Antivirus Security Software\
https://cyberguy.com/LockUpYourTech\
\
Best VPNs for Browsing the Internet Privately\
https://cyberguy.com/VPN\
\
How to Back-up your Devices the right way\
https://cyberguy.com/HowoBackupDevices\
\
***********\
\

http://cyberguy.com/newsletter\
\
***********\
\
Follow me here:\
http://www.cyberguy.com\
/ cyberguyofficial \
/ cyberguy \
/ kurtthecyberguy \
\
#TeslaRobot\
#OptimusGen2\
#HumanoidRobotics\
#TechInnovation\
#TechNews\
#TechnologyNews\
#Innovation\
#FutureTech\
\
***\
\
ABOUT CYBERGUY — AMERICA’S TECH AUTHORITY\
\
Kurt \

Dec 27, 2023

Hackers expose thousands of parking app users to data breach risk

Posted by in category: cybercrime/malcode

Europe’s largest parking app operator, EasyPark Group, faces a major data breach, urging heightened cybersecurity awareness.

Dec 27, 2023

Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining

Posted by in categories: cryptocurrencies, cybercrime/malcode

Poorly secured Linux SSH servers are being targeted by bad actors to install port scanners and dictionary attack tools with the goal of targeting other vulnerable servers and co-opting them into a network to carry out cryptocurrency mining and distributed denial-of-service (DDoS) attacks.

“Threat actors can also choose to install only scanners and sell the breached IP and account credentials on the dark web,” the AhnLab Security Emergency Response Center (ASEC) said in a report on Tuesday.

In these attacks, adversaries try to guess a server’s SSH credentials by running through a list of commonly used combinations of usernames and passwords, a technique called dictionary attack.

Page 26 of 220First2324252627282930Last