Skip to main content

Home/ Digit_al Society/ Group items tagged attackers

Rss Feed Group items tagged

dr tech

Bitcoin Thefts Surge, DDoS Hackers Take Millions - InformationWeek - 0 views

  •  
    "Bitcoin Internet Payment System (BIPS), a Denmark-based Bitcoin payment processor, suffered a denial-of-service (DDoS) attack."
dr tech

NSA and GCHQ target Tor network that protects anonymity of web users | World news | The... - 0 views

  •  
    "The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
dr tech

Antivirus software is dead, says security expert at Symantec | Technology | theguardian... - 0 views

  •  
    "Dye told the Wall Street Journal that hackers increasingly use novel methods and bugs in the software of computers to perform attacks, resulting in about 55% cyberattacks going unnoticed by commercial antivirus software."
dr tech

Google launches Project Shield, to protect news sites from DDoS attacks / Boing Boing - 0 views

  •  
    "This is where Google's Project Shield comes through: sites pre-register with Google to "reverse proxy" their traffic through Google's cloud platform. By making a change in DNS, publishers can route all their traffic through Google. This means that a DDoS attack has to be sufficiently robust as to take down Google's cloud (much harder than taking down a WordPress install on a rack in a commodity hosting provider)"
dr tech

Why US elections remain 'dangerously vulnerable' to cyber-attacks | US news | The Guardian - 0 views

  •  
    "Cybersecurity experts have warned for years that malfeasance, technical breakdown or administrative incompetence could easily wreak havoc with electronic systems and could go largely or wholly undetected. This is a concern made much more urgent by Russia's cyber-attacks on political party servers and state voter registration databases in 2016 and by the risk of a repeat - or worse - in this November's midterms. "
dr tech

Vulnerabilities in GPS fleet-tracking tools let attackers track and immobilize cars en ... - 0 views

  •  
    "L&M used a credential stuffing attack: using email addresses gleaned from massive breaches to gain access by repeatedly trying different email/password combinations."
dr tech

'Typographic attack': pen and paper fool AI into thinking apple is an iPod | Technology... - 0 views

  •  
    "But even cleverest AI can be fooled with the simplest of hacks. If you write out the word "iPod" on a sticky label and paste it over the apple, Clip does something odd: it decides, with near certainty, that it is looking at a mid-00s piece of consumer electronics. In another test, pasting dollar signs over a picture of a dog caused it to be recognised as a piggy bank."
dr tech

The Colonial Pipeline Hack Is a New Extreme for Ransomware  | WIRED - 0 views

  •  
    ""This is the largest impact on the energy system in the United States we've seen from a cyberattack, full stop," says Rob Lee, CEO of the critical-infrastructure-focused security firm Dragos. Aside from the financial impact on Colonial Pipeline or the many providers and customers of the fuel it transports, Lee points out that around 40 percent of US electricity in 2020 was produced by burning natural gas, more than any other source. That means, he argues, that the threat of cyberattacks on a pipeline presents a significant threat to the civilian power grid. "You have a real ability to impact the electric system in a broad way by cutting the supply of natural gas. This is a big deal," he adds. "I think Congress is going to have questions. A provider got hit with ransomware from a criminal act, this wasn't even a state-sponsored attack, and it impacted the system in this way?""
dr tech

Iran 'revenge' could come in the form of cyber-attacks, experts warn | World news | The... - 0 views

  •  
    "Hultquist noted that cyberwarfare evens the battlefield between Iran and the US. "That's why they choose an asymmetric battleground," he said. "We might have this massive advantage with a very sophisticated ability, but we also have this very sophisticated society that makes us very vulnerable to computer attacks.""
dr tech

Breathe Easy Bitcoiners, Quantum Computing No Match For Sha-2 Encryption | Hacked - 0 views

  •  
    "Some people assume that once quantum computing comes along modern encryption technologies will be outpowered. But experts are starting to posit that hash functions and asymmetric encryption could defend not only against modern computers, but also against quantum attackers from the future."
dr tech

​Chrome: Stop future computers from cracking current encryption - CNET - 0 views

  •  
    "Google released a beta test version of its Chrome browser that attempts to keep your data secure even if today's uncrackable encryption becomes tomorrow's code-breaking cakewalk. The Chrome 54 beta gets the ability to encipher data sent to and from websites with a technology called CECPQ1. It "protects against future attacks using large quantum computers," Google said in a blog post Thursday."
dr tech

Facebook deletes Norwegian PM's post as 'napalm girl' row escalates | Technology | The ... - 0 views

  •  
    In her intervention on Friday, the Norwegian prime minister wrote that the photograph, entitled The Terror of War and featuring the naked nine-year-old Kim Phúc running away from a napalm attack, had "shaped world history". Solberg added: "I appreciate the work Facebook and other media do to stop content and pictures showing abuse and violence ... But Facebook is wrong when they censor such images."
dr tech

Elon Musk and Sam Altman's OpenAI and Pennsylvania State University made a tool to prot... - 0 views

  •  
    "To thwart such hackers, Elon Musk's OpenAI and Pennsylvania State University released a new tool this week called "cleverhans," that lets artificial intelligence researchers test how vulnerable their AI is to adversarial examples, or purposefully malicious data meant to confuse the algorithms. Once the vulnerability has been found, a defense to the attack can automatically be applied."
dr tech

$10 router blamed in Bangladesh bank hack - BBC News - 0 views

  •  
    "The bank had no firewall and used second-hand routers that cost $10 to connect to global financial networks. Better security and hardware would have hampered the attackers, Reuters said, quoting an official investigator."
dr tech

Cryptocurrency raider takes $60 million in digital cash - 0 views

  •  
    "A cryptocurrency is only as reliable as the technology that keeps it running, and Ethereum is learning this the hard way. An attacker has taken an estimated $60 million in Ethereum's digital money (Ether) by exploiting vulnerabilities in the Decentralized Autonomous Organization, an investment collective. The raider took advantage of a "recursive call" flaw in the DAO's code-based smart contracts, which administer the funds, to scoop up Ether many times in a single pass."
dr tech

Fansmitter: malware that exfiltrates data from airgapped computers by varying the sound... - 0 views

  •  
    "demonstrate a fiendishly clever procedure for getting data off of airgapped computers that have had their speakers removed to prevent acoustic data-transmission: instead of playing sound through the target computer's speakers, they attack its fans, varying their speeds to produce subtle sounds that humans can barely notice, but which nearby devices can pick up through their microphones."
« First ‹ Previous 41 - 60 of 151 Next › Last »
Showing 20 items per page