Menu

Blog

Archive for the ‘security’ category: Page 56

Jun 14, 2022

Hackers clone Coinbase, MetaMask mobile wallets to steal your crypto

Posted by in categories: cryptocurrencies, security

Security researchers have uncovered a large-scale malicious operation that uses trojanized mobile cryptocurrency wallet applications for Coinbase, MetaMask, TokenPocket, and imToken services.

The malicious activity has been identified earlier this year in March. Researchers at Confiant named this activity cluster SeaFlower and describe it as “the most technically sophisticated threat targeting web3 users, right after the infamous Lazarus Group.”

In a recent report, Confiant notes that the malicious cryptocurrency apps are identical to the real ones but they come with a backdoor that can steal the users’ security phrase for accessing the digital assets.

Jun 11, 2022

Windows 11 22H2 build 22621 bug shows “hardware security not supported” on supported PCs

Posted by in category: security

The Windows 11 22H2 (Sun Valley 2) RTM build 22,621 has resurrected an old bug whereupon a system gets a “hardware security not supported” message even on PCs that meet the necessary requirements.

Jun 10, 2022

10 Best Tools for Machine Learning

Posted by in categories: education, robotics/AI, security

The will help you find new opportunities to use and further develop your machine learning skills.


Machine learning has proven to be a tool that performs well in a variety of application fields. From educational and training companies to security systems like facial recognition and online transaction prevention, it is used to improve the quality and accuracy of existing techniques.

Choosing the best tools for machine learning and navigating the space of tools for machine learning isn’t as simple as Google searching “machine learning tools”.

Continue reading “10 Best Tools for Machine Learning” »

Jun 9, 2022

NASA is assembling a team to gather data on unidentifiable events in the sky

Posted by in categories: security, transportation

NASA said it was interested in UAPs from a security and safety perspective. There was no evidence UAPs are extraterrestrial in origin, NASA added. The study will begin this fall and is expected to take nine months.


The team will gather data on “events in the sky that cannot be identified as aircraft or known natural phenomena — from a scientific perspective,” the agency said.

Jun 3, 2022

What is Kinetic 7 and is it the Breakthrough Energy Source the Hype is Promoting or is it a Hoax?

Posted by in categories: business, economics, security

Voltage Enterprises is an Abu Dhabi-based company founded a year ago. It describes itself as a disruptive energy innovator. It claims to have invented a zero-carbon emissions fuel that is cheaper than natural gas. It calls the fuel Kinetic 7 ™. The information I received states:

“The clean gas, which is carbon neutral with net-zero emissions, will give global economies access to a cheap, endless supply of clean energy. Importantly, it will allow countries to maintain the security of their gas and energy supplies whilst also meeting their carbon-neutral net-zero targets. This discovery could play a major role in reversing the global energy crisis, significantly reducing energy costs to the consumer and businesses sectors at a time when the cost-of-living crisis is worsening, and inflation has reached a 40-year high.”

If that doesn’t sound fantastic to you then I am surprised. Kinetic 7 is purportedly manna from heaven for the energy industry or represents disruptive change on a global scale. So which is it and what is it?

Jun 3, 2022

An Actively Exploited Microsoft Zero-Day Flaw Still Doesn’t Have a Patch

Posted by in category: security

“After public knowledge of the exploit grew, we began seeing an immediate response from a variety of attackers beginning to use it,” says Tom Hegel, senior threat researcher at security firm SentinelOne. He adds that while attackers have primarily been observed exploiting the flaw through malicious documents thus far, researchers have discovered other methods as well, including the manipulation of HTML content in network traffic.

“While the malicious document approach is highly concerning, the less documented methods by which the exploit can be triggered are troubling until patched,” Hegel says. “I would expect opportunistic and targeted threat actors to use this vulnerability in a variety of ways when the option is available—it’s just too easy.”

The vulnerability is present in all supported versions of Windows and can be exploited through Microsoft Office 365, Office 2013 through 2019, Office 2021, and Office ProPlus. Microsoft’s main proposed mitigation involves disabling a specific protocol within Support Diagnostic Tool and using Microsoft Defender Antivirus to monitor for and block exploitation.

Jun 3, 2022

New York just passed a bill cracking down on bitcoin mining — here’s everything that’s in it

Posted by in categories: bitcoin, blockchains, cryptocurrencies, law, security

Following an early morning vote in Albany on Friday, lawmakers in New York passed a bill to ban certain bitcoin mining operations that run on carbon-based power sources. The measure now heads to the desk of Governor Kathy Hochul, who could sign it into law or veto it.

If Hochul signs the bill, it would make New York the first state in the country to ban blockchain technology infrastructure, according to Perianne Boring, founder and president of the Chamber of Digital Commerce. Industry insiders also tell CNBC it could have a domino effect across the U.S., which is currently at the forefront of the global bitcoin mining industry, accounting for 38% of the world’s miners.

The New York bill, which previously passed the State Assembly in late April before heading to the State Senate, calls for a two-year moratorium on certain cryptocurrency mining operations which use proof-of-work authentication methods to validate blockchain transactions. Proof-of-work mining, which requires sophisticated gear and a whole lot of electricity, is used to create bitcoin. Ethereum is switching to a less energy-intensive process, but will still use this method for at least for another few months.

Jun 3, 2022

Iraq’s extreme drought reveals a 3,400-year-old city

Posted by in categories: health, security

A team of archaeologists rushed to the site to excavate and map the city before it, once again, became submerged.


Monkeypox appears to be spreading from person to person, the UK Health Security Agency said.

Jun 3, 2022

Health agency confirms community spread of monkeypox in England

Posted by in categories: biotech/medical, health, security

LONDON, June 1 (Reuters) — Monkeypox appears to be spreading from person to person in England, the UK Health Security Agency (UKHSA) said on Wednesday.

The usually mild viral disease, which is endemic in west and central Africa, is understood to spread through close contact. Until early May, cases rarely cropped up outside Africa and were typically linked to travel to there.

“The current outbreak is the first time that the virus has been passed from person to person in England where travel links to an endemic country have not been identified,” the agency said.

Jun 2, 2022

Why the search for a privacy-preserving data sharing mechanism is failing

Posted by in categories: biotech/medical, finance, security

From banking to communication our modern, daily lives are driven by data with ongoing concerns over privacy. Now, a new EPFL paper published in Nature Computational Science argues that many promises made around privacy-preserving mechanisms will never be fulfilled and that we need to accept these inherent limits and not chase the impossible.

Data-driven innovation in the form of personalized medicine, better public services or, for example, greener and more efficient industrial production promises to bring enormous benefits for people and our planet and widespread access to data is considered essential to drive this future. Yet, aggressive data collection and analysis practices raise the alarm over societal values and fundamental rights.

As a result, how to widen access to data while safeguarding the confidentiality of sensitive, has become one of the most prevalent challenges in unleashing the potential of data-driven technologies and a new paper from EPFL’s Security and Privacy Engineering Lab (SPRING) in the School of Comupter and Communication Sciences argues that the promise that any is solvable under both good utility and privacy is akin to chasing rainbows.

Page 56 of 148First5354555657585960Last