Skip to main content

Home/ Digit_al Society/ Group items tagged ITGS software security

Rss Feed Group items tagged

dr tech

Microsoft's Excel Might Be The Most Dangerous Software On The Planet - Forbes - 0 views

  •  
    "No, really, it's possible that Microsoft's Excel is the most dangerous software on the planet. Yes, more dangerous than rogue code running a nuclear power plant, than the Stuxnet that was deliberately sent off to sabotage Iran's nuclear program, worse, even, than whatever rent in the fabric of space time led to the invention of Lolcats. Really, that serious."
dr tech

CryptoLocker Is The Nastiest Malware Ever - Here's What You Can Do - 0 views

  •  
    "Ransomware is an especially odious type of malware. The way it works is simple. Your computer will be infected with some malicious software. That software then renders your computer entirely unusable, sometimes purporting to be from local law enforcement and accusing you of committing a computer crime or viewing explicit pictures of children. It then demands monetary payment, either in the form of a ransom or a 'fine' before access to your computer is returned."
dr tech

Leading voting machine company admits it lied, reveals that its voting machines ship ba... - 0 views

  •  
    "Kim Zetter asked them, on behalf of the New York Times, if their products shipped with backdoors allowing remote parties to access and alter them over the internet, they told her unequivocally that they did not engage in this practice. But now, in a letter to Senator Ron Wyden [D-OR], they admit that they lied, and that they "provided pcAnywhere remote connection software … to a small number of customers between 2000 and 2006.""
dr tech

Turkey coup plotters' use of 'amateur' app helped unveil their network | Technology | T... - 0 views

  •  
    "Security experts who looked at the app, known as ByLock, at the request of Reuters said it appeared to be the work of amateur software developers and had left important information about its users unencrypted."
dr tech

Your next car will be hacked. Will autonomous vehicles be worth it? | Technology | The ... - 0 views

  •  
    "Hacking into software and then demanding a ransom to release it - what's known as ransomware - is not new. Finnish security expert Mikko Hypponen fully expects it to become a reality as self-driving or "autonomous" cars start to become more commonplace."
dr tech

Singapore to test facial recognition on lampposts, stoking privacy fears - 0 views

  •  
    "SINGAPORE - In the not too distant future, surveillance cameras sitting atop over 100,000 lampposts in Singapore could help authorities pick out and recognise faces in crowds across the island-state. The plan to install the cameras, which will be linked to facial recognition software, is raising privacy fears among security experts and rights groups. The government said the system would allow it to "perform crowd analytics" and support anti-terror operations."
dr tech

Chinese Police Say Face Recognition Identified Suspect Out Of Crowd Of 50,000 | Gizmodo... - 0 views

  •  
    "Chinese police say they used facial recognition to identify, then arrest a man attending a crowded concert in Nanchang, China's third largest city. South China Morning Post reports that security cameras equipped with the software pinpointed the man out of the estimated 50,000 other people also in attendance at the concert. "
dr tech

Briton who stopped WannaCry attack arrested over separate malware claims | Technology |... - 0 views

  •  
    "Marcus Hutchins, the 23-year-old British security researcher who was credited with stopping the WannaCry outbreak in its tracks by discovering a hidden "kill switch" for the malware, has been arrested by the FBI over his alleged involvement in another malicious software targeting bank accounts."
dr tech

Internet users advised to change passwords after 16bn logins exposed | Cybercrime | The... - 0 views

  •  
    "Internet users have been told to change their passwords and upgrade their digital security after researchers claimed to have revealed the scale of sensitive information - 16bn login records - potentially available to cybercriminals. Researchers at Cybernews, an online tech publication, said they had found 30 datasets stuffed with credentials harvested from malicious software known as "infostealers" and leaks."
dr tech

Turkish protesters using encryption software to evade censors | Technology | guardian.c... - 0 views

  •  
    "Facebook and Twitter reported to have been blocked in run-up to protests, with people turning to VPNs to broadcast content"
Max van Mesdag

Google warning on fake anti-virus software - 0 views

  •  
    It turns out that 15% of free anti-virus softwares contain viruses themselves, according to Google.
dr tech

Google says Chinese hackers who targeted Biden campaign are faking McAfee software - Th... - 0 views

  •  
    "Google said in a new blog post that hackers linked to the Chinese government have been impersonating antivirus software McAfee to try to infect victims' machines with malware. And, Google says, the hackers appear to be the same group that unsuccessfully targeted the presidential campaign of former Vice President Joe Biden with a phishing attack earlier this year. A similar group of hackers based in Iran had tried to target President Trump's campaign, but also was unsuccessful."
dr tech

'Boundless Informant' Is a Secret NSA Tool to Data-Mine the World - 0 views

  •  
    "The NSA has a tool that records and analyzes all the flow of data that the spy agency collects around the world. Think of it as a global data-mining software that details exactly how much intelligence, and of what type, has been collected from every country in the world. It's aptly called "Boundless Informant." "
dr tech

Stealing an AI algorithm and its underlying data is a "high-school level exercise" - Qu... - 0 views

  •  
    "Researchers have shown that given access to only an API, a way to remotely use software without having it on your computer, it's possible to reverse-engineer machine learning algorithms with up to 99% accuracy. In the real world, this would mean being able to steal AI products from companies like Microsoft and IBM, and use them for free. Small companies built around a single machine learning API could lose any competitive advantage."
dr tech

'Alarming' rise in ransomware tracked - BBC News - 0 views

  •  
    "There are now more than 120 separate families of ransomware, said experts studying the malicious software. Other researchers have seen a 3,500% increase in the criminal use of net infrastructure that helps run ransomware campaigns."
dr tech

Major sites including New York Times and BBC hit by 'ransomware' malvertising | Technol... - 0 views

  •  
    "The malware was delivered through multiple ad networks, and used a number of vulnerabilities, including a recently-patched flaw in Microsoft's former Flash competitor Silverlight, which was discontinued in 2013. When the infected adverts hit users, they redirect the page to servers hosting the malware, which includes the widely-used (amongst cybercriminals) Angler exploit kit. That kit then attempts to find any back door it can into the target's computer, where it will install cryptolocker-style software, which encrypts the user's hard drive and demands payment in bitcoin for the keys to unlock it."
dr tech

Facebook Is Breached by Hackers, Putting 50 Million Users' Data at Risk - The New York ... - 0 views

  •  
    "Three software flaws in Facebook's systems allowed hackers to break into user accounts, including those of the top executives Mark Zuckerberg and Sheryl Sandberg, according to two people familiar with the investigation but not allowed to discuss it publicly. Once in, the attackers could have gained access to apps like Spotify, Instagram and hundreds of others that give users a way to log into their systems through Facebook."
dr tech

Researchers find mountains of sensitive data on totalled Teslas in junkyards / Boing Boing - 0 views

  •  
    "Teslas are incredibly data-hungry, storing massive troves of data about their owners, including videos of crashes, location history, contacts and calendar entries from paired phones, photos of the driver and passengers taken with interior cameras, and other data; this data is stored without encryption, and it is not always clear when Teslas are gathering data, and the only way to comprehensively switch off data-gathering also de-activates over-the-air software updates for the cars, "
‹ Previous 21 - 40 of 53 Next ›
Showing 20 items per page