Flood of malicious junk traffic makes Ukrainian websites unreachable
DDoS temporarily take out sites as Ukraine stares down Russian soldiers at its border. Enlarge (credit: Getty Images) Ukraine's defense ministry and two banks were knocked offline on Tuesday by a flood of malicious traffic des.....»»
Ukrainian drones now spray 2,500° C thermite streams right into Russian trenches
Mechanical dragons now deliver fire on command. Enlarge Wars of necessity spawn weapons innovation as each side tries to counter the other's tactics and punch through defenses. For instance—as the Russian invasion of.....»»
North Korean hackers’ social engineering tricks
“North Korean malicious cyber actors conducted research on a variety of targets connected to cryptocurrency exchange-traded funds (ETFs) over the last several months,” the FBI has warned through a public service announcement. This suggest.....»»
Amateur Scientist: Detect Cosmic Dust & Space Debris
Tweak the Make: Twilight photometer to detect micrometeors and orbital junk 400 miles high. The post Amateur Scientist: Detect Cosmic Dust & Space Debris appeared first on Make: DIY Projects and Ideas for Makers......»»
India launches flood warning systems at Himalayan glacial lakes
India is setting up high-tech warning systems at nearly 200 Himalayan glacial lakes at risk of bursting their banks, a deadly threat exacerbated by climate change, disaster officials said Tuesday......»»
Perception and deception in times of crisis: Characteristics of messages and sources that allow information to spread
The COVID-19 pandemic not only gave us a global health crisis but also an infodemic, a term coined by the World Health Organization (WHO) to describe the overwhelming flood of information—both accurate and misleading—that inundated media channels.....»»
Harmful “nudify” websites used Google, Apple, and Discord sign-on systems
Sign-on systems from Big Tech companies have been incorporated into deepfake generators. Enlarge (credit: Photo illustration by Jacqui VanLiew/WIRED; Getty Images) Major technology companies, including Google, Apple, and.....»»
Many of the biggest websites have opted out of Apple Intelligence training
Generative AI systems are trained by letting them surf the web to scrape content. Apple allows publishers to opt out of its scraping, and a new report says that many of the biggest websites have specifically opted out of Apple Intelligence training......»»
Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites
Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 and J.....»»
Deepfake-generating AI websites blocked from using Sign in with Apple
Apple has blocked some developers from using Sign in with Apple, after a report discovered popular sign-in tools have been used by websites providing harmful AI image undressing services.Legitimate examples of Sign in with AppleWhile Apple Intelligen.....»»
Unpatchable 0-day in surveillance cam is being exploited to install Mirai
Vulnerability is easy to exploit and allows attackers to remotely execute commands. Enlarge (credit: Getty Images) Malicious hackers are exploiting a critical vulnerability in a widely used security camera to spread Mira.....»»
Canadian insurers and municipalities sharing data could improve availability, affordability of flood insurance
The increasing cost of flood damage has seen property insurance become less affordable for many Canadians. New research from the University of Waterloo shows that if insurers and local governments pooled information on investment in flood-risk manage.....»»
Trying to outrun Ukrainian drones? Kursk traffic cams still issue speeding tickets.
Drones are everywhere. Traffic cameras don't care. Enlarge / Ukrainian FPV drone hunting Russian army assets along a road. Imagine receiving a traffic ticket in the mail because you were speeding down a Russian road in.....»»
F5 and Intel join forces to push the boundaries of AI deployment
F5 announced it is bringing application security and delivery capabilities to AI deployments powered by Intel. This new joint solution combines security and traffic management from F5’s NGINX Plus offering with the optimization and performance of t.....»»
Cybercriminals capitalize on travel industry’s peak season
Cybercriminals are capitalizing on the travel and hospitality industry’s peak season, using increased traffic as cover for their attacks, according to Cequence Security. Researchers investigated the top 10 travel and hospitality sites to identi.....»»
Hackers infect ISPs with malware that steals customers’ credentials
Zero-day that was exploited since June to infect ISPs finally gets fixed. Enlarge (credit: Getty Images) Malicious hackers likely working on behalf of the Chinese government have been exploiting a high-severity zero-day.....»»
"Space junk" that fell in Eastern Cape was a car-size meteorite
The "space junk" that fell over the Eastern Cape on Sunday morning was a meteorite......»»
Android malware uses NFC to steal money at ATMs
ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»
Novel technique allows malicious apps to escape iOS and Android guardrails
Web-based apps escape iOS "Walled Garden" and Android side-loading protections. Enlarge (credit: Getty Images) Phishers are using a novel technique to trick iOS and Android users into installing malicious apps that bypas.....»»
Advanced safety technology causes traffic jam in collision shops
Blind spot monitoring, automatic emergency braking and sensors everywhere have made fixing vehicles after an accident a long and expensive process......»»
Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200) A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited.....»»