Prominent cryptocurrency exchange infected with previously unseen Mac malware
It's not yet clear how the full-featured JokerSpy backdoor gets installed. Enlarge (credit: Getty Images) Researchers have discovered previously unknown Mac malware infecting a cryptocurrency exchange. It contains a full.....»»
AI company Midjourney teases hardware product in a new form factor
It hired a hardware chief who previously worked on Apple Vision Pro. Responding to this meme image of a wizard with an orb from the I.C.E. book Middle-earth: Valar and Maiar, Midjourney's founder joked that the new hardware form.....»»
AI image-generation company Midjourney says it’s “getting into hardware”
It hired a hardware chief who previously worked on Apple Vision Pro. Responding to this meme image of a wizard with an orb from the I.C.E. book Middle-earth: Valar and Maiar, Midjourney's founder joked that the new hardware form.....»»
Expel partners with Wiz to enhance security for cloud environments
Expel announced a new strategic partnership with Wiz, a cloud-native application protection platform (CNAPP). The partnership provides an integration offering MDR for Wiz toxic risk combinations (including vulnerabilities, secrets, malware, and threa.....»»
A YouTube video really can remove water from your iPhone
A YouTube video claiming it can remove water from your iPhone might seem up there with emails from Nigerian princes and videos of Elon Musk promoting some new cryptocurrency, but tests reveal that it does actually work … somewhat. A tech writer.....»»
Versa Director zero-day exploited to compromise ISPs, MSPs (CVE-2024-39717)
Advanced, persistent attackers have exploited a zero-day vulnerability (CVE-2024-39717) in Versa Director to compromise US-based managed service providers with a custom-made web shell dubbed VersaMem by the researchers. The malware harvests credentia.....»»
Hackers infect ISPs with malware that steals customers’ credentials
Zero-day that was exploited since June to infect ISPs finally gets fixed. Enlarge (credit: Getty Images) Malicious hackers likely working on behalf of the Chinese government have been exploiting a high-severity zero-day.....»»
3D shapes of viral proteins point to previously unknown roles
Viruses are tricky to keep up with. They evolve quickly and regularly develop new proteins that help them infect their hosts. These rapid shifts mean that researchers are still trying to understand a multitude of viral proteins and precisely how they.....»»
Fostering creativity in the scientific research process
How can creativity be implemented in the scientific research process from the outset? By equipping students with creativity tools during their training. This is the message of a prominent group of researchers, which they have now published as a Lette.....»»
Researchers discover rejuvenation mechanism in unicellular organisms
A team of scientists from the Cluster of Excellence "Balance of the Microverse" has discovered a previously unknown rejuvenation mechanism in unicellular organisms. They studied unicellular microalgae, which serve as the basis of food chains in the o.....»»
Android malware steals payment card data using previously unseen technique
Attacker then emulates the card and makes withdrawals or payments from victim's account. Enlarge (credit: d3sign) Newly discovered Android malware steals payment card data using an infected device’s NFC reader and rela.....»»
A new malware threat to macOS adds to the data-stealing surge
Mac users face another macOS threat that aims to steal your data and targets x86_64 and Arm architectures......»»
New macOS malware impersonates popular apps then steals your data
Security researchers have discovered new macOS malware that’s built to steal your most sensitive data. Dubbed ‘Cthulhu Stealer,’ the malware targets users by impersonating popular apps so it can harvest your system password, iCloud Keychain pas.....»»
Evolved and more powerful macOS malware strain sold cheaply to criminals
Researchers have discovered another data-seizing macOS malware, with "Cthulhu Stealer" sold to online criminals for just $500 a month.Cthulhu Stealer in action [Cado Security]The Mac is becoming even more of a target for malware, with warnings surfac.....»»
This new Android malware can steal your card details via the NFC chip
Security researchers spot a sophisticated attack that steals people's NFC data and can be used to steal money, and more......»»
These colorful diagrams show how air quality has changed in more than 100 countries since 1850
Air pollution is an unseen menace that poses a major threat to human health and the climate. We have created the air quality stripes, a visual tool that captures global air pollution trends, to bring this hidden threat into sharp focus......»»
Folding iPad and MacBook may both now be arriving in 2027 or 2028
Apple analyst Ming-Chi Kuo, who previously said he expected a folding MacBook to launch in 2026, now says the timeline has been pushed back to 2027 or 2028. He also says that work on a folding iPad is “not yet visible” in Apple’s supply chai.....»»
Android malware uses NFC to steal money at ATMs
ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»
Foldable MacBook Pro delayed to at least 2027
Technical challenges mean that Apple won't be able to launch a foldable MacBook Pro in 2025 as expected, says Ming-Chi Kuo, and it may not be out until late 2027 or 2028.A generated image of a foldable MacBook conceptIt's previously been rumored that.....»»
Alleged iPhone 16 Pro box label corroborates production in India
We’re only a few weeks away from the official announcement of the iPhone 16, and the rumors never stop. As some sources have previously reported, Apple is expected to produce the Pro models of this year’s iPhones for the first time in India, in a.....»»
Ancient microbes linked to evolution of human immune proteins
When you become infected with a virus, some of the first weapons your body deploys to fight it are those passed down to us from our microbial ancestors billions of years ago. According to new research from The University of Texas at Austin, two key e.....»»