Toggle light / dark theme

#Hackers are seeking to exploit the roll-out of government financial relief plans to fill their own pockets at the expense of businesses and affected workers, Israeli cyber researchers have revealed.


Hackers are exploiting the rollout of governmental financial relief to fill their pockets at the expense of businesses and affected workers, according to Israeli cyber researchers.

In recent weeks, governments have sought to ease cash-flow shortages and avoid a recession with ambitious stimulus packages and grants to households, including a massive $2 trillion economic package in the United States.

According to researchers at Israeli cybersecurity giant Check Point, a major increase in malicious and suspicious domains related to relief packages has been registered in recent weeks. The hackers aim to scam individuals into providing personal information, thereby stealing money or committing fraud.

“To do this, they are evolving the scam and phishing techniques that they have been using successfully since the start of the pandemic in January,” the researchers wrote in a recent report.

Just like a virus hijacks your cells and forces them to churn out more copies of the virus, this vaccine is expected to automate the production of those particles, which B-cells and T-cells — the biological hunter-seekers of the immune system — can use to ready themselves to fight the real-deal coronavirus.

The main difference between this sort of DNA-based vaccine and a traditional one, Slavcev told Futurism, is that it relies on the person’s cells to create the mock virus instead of merely exposing them to an inert version of the real virus.

“Personal genetics only has to do with how the vaccine is presented,” Slavcev told Futurism, regarding the decision to develop a DNA-based vaccine. “There is some variation between individuals and populations, but in this case the DNA is just to improve immune response and make it mimic a viral infection as closely as possible to stimulate the most effective immune response.”

Scam alert.


THOMASTON, Me. (WSET) — Police are warning cell phone users of a new text message scam during the coronavirus pandemic. The Thomaston Police Department in Maine posted on Facebook a photo of the alert being sent to people in a text message. The message was sent to someone in Maine from an Indiana area code telling them they need to self-isolate because they came in contact with someone who tested positive or has shown symptoms for coronavirus. The alert also tells you to get tested.

As millions of employees are suddenly working from home, computer security threats are on the rise. The sudden rush to set up home offices means many users working on insufficiently protected devices are exposing businesses to unprecedented new exposure to malicious hackers.

“While the world is grinding to a halt, cyber-attacks are on the rise, preying on public fear and anxiety,” says Yenni Tim, researcher of Cybersecurity at the University of New South Wales Business School in Sydney, Australia.

In an effort to combat , Dell Technologies last week released a utility that will protect one of the most sensitive components of a computer, the BIOS. Frequently the target of the most malicious malware assaults, the BIOS oversees critical computer processes, from boot-up to system configuration parameters.

Chip maker Intel has been chosen to lead a new initiative led by the U.S. military’s research wing, DARPA, aimed at improving cyber-defenses against deception attacks on machine learning models.

Machine learning is a kind of artificial intelligence that allows systems to improve over time with new data and experiences. One of its most common use cases today is object recognition, such as taking a photo and describing what’s in it. That can help those with impaired vision to know what’s in a photo if they can’t see it, for example, but it also can be used by other computers, such as autonomous vehicles, to identify what’s on the road.

But deception attacks, although rare, can meddle with machine learning algorithms. Subtle changes to real-world objects can, in the case of a self-driving vehicle, have disastrous consequences.

Most of us are similar with ‘viruses’ and malware relating to our computers or smartphones, but Yoshihiro Minagawa, a researcher from the University of Tokyo has taken it on literally – he has invented a portable, low-cost, battery-powered device that pairs with a smartphone, which was tested with viruses but could also detect other biological markers. His initial findings, together with other teammates were published recently in the journal, Lab on a Chip.

The current leading method to assess the presence of viruses and other biological markers of disease is effective but large and expensive. It is prohibitively difficult for use in many situations, especially due to certain economic and geographic factors. Although highly accurate at counting viruses, these tools are just too cumbersome for many situations, especially when rapid diagnosis is required.

“I wanted to produce a useful tool for inaccessible or less-affluent communities that can help in the fight against diseases such as influenza,” said Minagawa. “Diagnosis is a critical factor of disease prevention. Our device paves the way for better access to essential diagnostic tools.”

So-called zero-day exploits—hacking techniques that take advantage of secret software flaws—were once the calling card of only the most sophisticated hackers. But today, the global map of zero-day hacking has expanded far beyond the United States, Russia, and China, as more countries than ever buy themselves a spot on it.

Security and intelligence firm FireEye today released a sweeping analysis of how zero days have been exploited worldwide over the last seven years, drawing in data from other security research organizations’ reporting as well as Google Project Zero’s database of active zero days. FireEye was able to link the use of 55 of those secret hacking techniques to state-sponsored operations, going so far as to name which country’s government it believes to be responsible in each case.

The resulting map and timeline, with a tally of which countries have used the most zero days over the last decade, are far from comprehensive. Countries like the US almost certainly have used zero days that remain undetected, FireEye acknowledges, and many others couldn’t be pinned with certainty on any particular country. But it does show how the collection of countries using those hacking techniques now includes less expected players like the United Arab Emirates and Uzbekistan.