The list was shared by the operator of a DDoS booter service.
Category: cybercrime/malcode
Several Greek government websites fell prey to cyber-attacks on Friday evening, forcing some of them to shut down entirely for security reasons, after access to them became problematic.
Among those attacked by hackers were the websites of the Greek Parliament, the Foreign Affairs Ministry, the Athens Stock Exchange, the National Intelligence Service (EYP) and the Finance Ministry.
A Turkish group named” Phoenix’s Helmets” (Anka Neferler Tim) posted a post on Facebook claiming responsibility for the attacks, in order to respond, as they said, to Athens’ threats against Turkey.
It’s been a lousy week for Windows users: first, the NSA curveball crypto vulnerability and now confirmation of a zero-day vulnerability that’s being actively exploited with no fix yet.
Hot on the heels of National Security Agency (NSA) and Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) warnings for Windows 10 users to update urgently as news of the curveball crypto vulnerability broke, here we are again. The CISA has published a new warning for Windows users as Microsoft confirms a critical zero-day vulnerability is being actively exploited, and there’s no fix available at the time of writing.
Advancements in neurotechnology are blurring the line between biology and technology. There is an emerging push to implant electronic devices inside the human body, hardwire them to our brains, and allow us to not only overcome disadvantages or injury but open up entirely new avenues of human experience.
VICE’s Thomas Morton got an inside look at what might be the next evolutionary step for humankind.
Check out VICE News for more: http://vicenews.com
Follow VICE News here:
Facebook: https://www.facebook.com/vicenews
Twitter: https://twitter.com/vicenews
Tumblr: http://vicenews.tumblr.com/
Instagram: http://instagram.com/vicenews
More videos from the VICE network: https://www.fb.com/vicevideo
#VICEonHBO
Not sure how old this video is. But, Very impressive if it is able to grab random objects at these speeds; although i suspect it needed a lot of training before.
This handy #roboticarm can be trained to catch practically anything. 🤖 💪
Looking for a job in AI & Machine Learning. Follow us for more updates or visit: https://aijobs.com/
#aijobs #artificialintelligence #datascience #robots #ai #IoT #AIoT #deeplearning #robotics #tecnologia #cybersecurity #aiskills #artificialintelligenceai #machinelearning #machinelearningalgorithms #futuretechnology #ML #computerengineer #codinglife #coding #programmerlife #VR #technologies #techie
A Chinese facial-recognition database with information on thousands of children was stored without protection on the internet, a researcher discovered, raising questions about school surveillance and cybersecurity in China.
The cache was connected to a surveillance system labeled “Safe School Shield” and contained facial-identification and location data, according to Victor Gevers, a researcher at the Dutch nonprofit GDI Foundation, which scans the internet for vulnerabilities and flags them to owners for fixing.
As the U.S. Army increasingly uses facial and object recognition to train artificial intelligent systems to identify threats, the need to protect its systems from cyberattacks becomes essential.
An Army project conducted by researchers at Duke University and led by electrical and computer engineering faculty members Dr. Helen Li and Dr. Yiran Chen, made significant progress toward mitigating these types of attacks. Two members of the Duke team, Yukun Yang and Ximing Qiao, recently took first prize in the Defense category of the CSAW ‘19 HackML competition.
“Object recognition is a key component of future intelligent systems, and the Army must safeguard these systems from cyberattacks,” said MaryAnne Fields, program manager for intelligent systems at the Army Research Office. “This work will lay the foundations for recognizing and mitigating backdoor attacks in which the data used to train the object recognition system is subtly altered to give incorrect answers. Safeguarding object recognition systems will ensure that future Soldiers will have confidence in the intelligent systems they use.”
As warfare continues to enter the digital realm, the Army plans to transform its cyber operations branch into a full-scale information warfare command, according to a top U.S. general.
The service will convert Cyber Command into the Army Information Warfare Command, Army Chief of Staff Gen. James McConville said at a panel on Tuesday. It’s one of the several modernization efforts the Army is taking on to counter “great power” opponents like Russia and China.
“We’re recognizing the importance of information operations, so our Cyber Command is going to become an information warfare command,” McConville said.
Security breach took place on January 7, but the city said it detected the intrusion in time to prevent any damage.
Microsoft has released a security patch for a dangerous vulnerability affecting hundreds of millions of computers running Windows 10.
The vulnerability is found in a decades-old Windows cryptographic component, known as CryptoAPI. The component has a range of functions, one of which allows developers to digitally sign their software, proving that the software has not been tampered with. But the bug may allow attackers to spoof legitimate software, potentially making it easier to run malicious software — like ransomware — on a vulnerable computer.
“The user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider,” Microsoft said.