Google launches Project Shield, to protect news sites from DDoS attacks / Boing Boing - 0 views
-
"This is where Google's Project Shield comes through: sites pre-register with Google to "reverse proxy" their traffic through Google's cloud platform. By making a change in DNS, publishers can route all their traffic through Google. This means that a DDoS attack has to be sufficiently robust as to take down Google's cloud (much harder than taking down a WordPress install on a rack in a commodity hosting provider)"
Why US elections remain 'dangerously vulnerable' to cyber-attacks | US news | The Guardian - 0 views
-
"Cybersecurity experts have warned for years that malfeasance, technical breakdown or administrative incompetence could easily wreak havoc with electronic systems and could go largely or wholly undetected. This is a concern made much more urgent by Russia's cyber-attacks on political party servers and state voter registration databases in 2016 and by the risk of a repeat - or worse - in this November's midterms. "
'Typographic attack': pen and paper fool AI into thinking apple is an iPod | Technology... - 0 views
-
"But even cleverest AI can be fooled with the simplest of hacks. If you write out the word "iPod" on a sticky label and paste it over the apple, Clip does something odd: it decides, with near certainty, that it is looking at a mid-00s piece of consumer electronics. In another test, pasting dollar signs over a picture of a dog caused it to be recognised as a piggy bank."
The Colonial Pipeline Hack Is a New Extreme for Ransomware | WIRED - 0 views
-
""This is the largest impact on the energy system in the United States we've seen from a cyberattack, full stop," says Rob Lee, CEO of the critical-infrastructure-focused security firm Dragos. Aside from the financial impact on Colonial Pipeline or the many providers and customers of the fuel it transports, Lee points out that around 40 percent of US electricity in 2020 was produced by burning natural gas, more than any other source. That means, he argues, that the threat of cyberattacks on a pipeline presents a significant threat to the civilian power grid. "You have a real ability to impact the electric system in a broad way by cutting the supply of natural gas. This is a big deal," he adds. "I think Congress is going to have questions. A provider got hit with ransomware from a criminal act, this wasn't even a state-sponsored attack, and it impacted the system in this way?""
Iran 'revenge' could come in the form of cyber-attacks, experts warn | World news | The... - 0 views
-
"Hultquist noted that cyberwarfare evens the battlefield between Iran and the US. "That's why they choose an asymmetric battleground," he said. "We might have this massive advantage with a very sophisticated ability, but we also have this very sophisticated society that makes us very vulnerable to computer attacks.""
Chrome: Stop future computers from cracking current encryption - CNET - 0 views
-
"Google released a beta test version of its Chrome browser that attempts to keep your data secure even if today's uncrackable encryption becomes tomorrow's code-breaking cakewalk. The Chrome 54 beta gets the ability to encipher data sent to and from websites with a technology called CECPQ1. It "protects against future attacks using large quantum computers," Google said in a blog post Thursday."
Facebook deletes Norwegian PM's post as 'napalm girl' row escalates | Technology | The ... - 0 views
-
In her intervention on Friday, the Norwegian prime minister wrote that the photograph, entitled The Terror of War and featuring the naked nine-year-old Kim Phúc running away from a napalm attack, had "shaped world history". Solberg added: "I appreciate the work Facebook and other media do to stop content and pictures showing abuse and violence ... But Facebook is wrong when they censor such images."
Elon Musk and Sam Altman's OpenAI and Pennsylvania State University made a tool to prot... - 0 views
-
"To thwart such hackers, Elon Musk's OpenAI and Pennsylvania State University released a new tool this week called "cleverhans," that lets artificial intelligence researchers test how vulnerable their AI is to adversarial examples, or purposefully malicious data meant to confuse the algorithms. Once the vulnerability has been found, a defense to the attack can automatically be applied."
Cryptocurrency raider takes $60 million in digital cash - 0 views
-
"A cryptocurrency is only as reliable as the technology that keeps it running, and Ethereum is learning this the hard way. An attacker has taken an estimated $60 million in Ethereum's digital money (Ether) by exploiting vulnerabilities in the Decentralized Autonomous Organization, an investment collective. The raider took advantage of a "recursive call" flaw in the DAO's code-based smart contracts, which administer the funds, to scoop up Ether many times in a single pass."
Fansmitter: malware that exfiltrates data from airgapped computers by varying the sound... - 0 views
-
"demonstrate a fiendishly clever procedure for getting data off of airgapped computers that have had their speakers removed to prevent acoustic data-transmission: instead of playing sound through the target computer's speakers, they attack its fans, varying their speeds to produce subtle sounds that humans can barely notice, but which nearby devices can pick up through their microphones."
« First
‹ Previous
41 - 60 of 151
Next ›
Last »
Showing 20▼ items per page