Skip to main content

Home/ Digit_al Society/ Group items matching "hacker" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Hacker fakes German minister's fingerprints using photos of her hands | Technology | Th... - 0 views

  •  
    "It's an old cliché of security researchers: fingerprints might appear more secure than passwords. But if your password gets stolen, you can change it to a new one; what happens when your fingerprint gets copied?"
1More

Phishers steal San Diego school data going back to 2008 / Boing Boing - 0 views

  •  
    "After a successful phishing attack that captured over 50 accounts, hackers stole 500,000 records from the San Diego Unified School District, for staff, current students, and past students going all the way back to 2008; including SSNs, home addresses and phone numbers, disciplinary files, health information, emergency contact details, health benefits and payroll info, pay information, financial data for direct deposits."
1More

Briton who stopped WannaCry attack arrested over separate malware claims | Technology |... - 0 views

  •  
    "Marcus Hutchins, the 23-year-old British security researcher who was credited with stopping the WannaCry outbreak in its tracks by discovering a hidden "kill switch" for the malware, has been arrested by the FBI over his alleged involvement in another malicious software targeting bank accounts."
1More

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
1More

Hackers Used to Be Humans. Soon, AIs Will Hack Humanity | WIRED - 0 views

  •  
    "In 2015, a research group fed an AI system called Deep Patient health and medical data from some 700,000 people, and tested whether it could predict diseases. It could, but Deep Patient provides no explanation for the basis of a diagnosis, and the researchers have no idea how it comes to its conclusions. A doctor either can either trust or ignore the computer, but that trust will remain blind."
1More

Alexa and Google Home abused to eavesdrop and phish passwords | Ars Technica - 0 views

  •  
    "Now, there's a new concern: malicious apps developed by third parties and hosted by Amazon or Google. The threat isn't just theoretical. Whitehat hackers at Germany's Security Research Labs developed eight apps-four Alexa "skills" and four Google Home "actions"-that all passed Amazon or Google security-vetting processes. The skills or actions posed as simple apps for checking horoscopes, with the exception of one, which masqueraded as a random-number generator. Behind the scenes, these "smart spies," as the researchers call them, surreptitiously eavesdropped on users and phished for their passwords."
1More

Self-Driving Cars. Rogue Nuke Launches. Evil AI. What Tech Threats You Should (and Shou... - 0 views

  •  
    "WILL HACKERS LAUNCH NUCLEAR WEAPONS?"
1More

2 hospital data breaches on Monday exposed patient data | Thaiger - 0 views

  •  
    "Two prominent hospitals were the victims of data breaching hackers in the last few days with each hospital having over 40,000 patients' personal information at risk. On Monday, Phetchabun Hospital had the personal data of 46,000 of their patients compromised while Bhumirajanagarindra Kidney Institute Hospital had the data from 40,000 patients stolen in parallel attacks."
1More

Why you and I will pay the price for the next big cybersecurity crisis | John Naughton ... - 0 views

  •  
    "Virtually every company and organisation now has - indeed has to have - an online presence. But many still take only rudimentary cybersecurity precautions and are sitting ducks for hackers. For most of companies, that's a matter for them and their boards of directors - it's their lookout if a ransomware attack makes them insolvent."
1More

A Cybersecurity Approach To Cutting Food Waste - 0 views

  •  
    "How do you maximize food production and prevent waste in your supply chain at a time when climate change and a growing global population are placing an increasing strain on resources?  According to Israeli startup Blue Circle, you do it in the same way you protect your technology from hackers: with artificial intelligence, machine learning and huge amounts of data. "
1More

Generative AI Is Enabling Fraud and Misinformation - Here Is What You Should Know | by ... - 0 views

  •  
    "ussian, North Korean, or Iranian state backed-hackers, for example, might now be able to execute much more convincing social engineering and election interference schemes in the US using this tool. ChatGPT can also generate multiple versions of these campaigns and many fake online profiles to promote them, to allow the success of such attacks through sheer volume or variation in content."
1More

How the growing Russian ransomware threat is costing companies dear | Cybercrime | The ... - 0 views

  •  
    "The January snow lay thick on the Moscow ground, as masked officers of the FSB - Russia's fearsome security agency - prepared to smash down the doors at one of 25 addresses they would raid that day. Their target was REvil, a shadowy conclave of hackers that claimed to have stolen more than $100m (£74m) a year through "ransomware" attacks, before suddenly disappearing. As group members were led away in cuffs, FSB officers gathered crypto-wallets containing untold volumes of digital currency such as bitcoin. Others used money-counting machines to tot up dozens of stacks of hundred dollar bills."
1More

For two years, criminals stole sensitive information using malware hidden in individual... - 0 views

  •  
    "The criminals were able to send banner ads and javascript to their targets' computers by pushing both into ad networks. These networks aggressively scan advertisers' javascript for suspicious code, so the criminals needed to sneak their bad code past these checks."
1More

Waze is an awesome driving app that also lets hackers stalk you / Boing Boing - 0 views

  •  
    "Researchers at the University of California-Santa Barbara recently discovered a Waze vulnerability that allowed them to create thousands of "ghost drivers" that can monitor the drivers around them-an exploit that could be used to track Waze users in real-time. They proved it to me by tracking my own movements around San Francisco and Las Vegas over a three-day period."
1More

The Year Of The Mega Data Breach - Forbes.com - 0 views

  •  
    Nabsuh - this might be veru useful...
« First ‹ Previous 61 - 80 of 85 Next ›
Showing 20 items per page