|
|
|
|
Paper is online here: https://arxiv.org/abs/1804.04014
This is a really cool idea but I wonder if there isn't usually an easier way to get data from an infected computer given that you have the chance to install malware. |
|
|
|
|
|
|
Anthony Fauci |
An AIDS-free generation would mean that virtually no child is born with HIV; that, as those children grow up, their risk of becoming infected is far lower than it is today; and that those who become infected can access treatment to help prevent them from developing AIDS and from passing the virus on to others. |
Anant Agarwal |
The online credential, the online certificate is very different from an on campus certificate. And we really believe that online learning and the EdX platform and the EdX portal, these are ways in which - you can think of them as a rising tide that's going to lift all boats whether for students worldwide or on our campuses. |
Fergie |
I'm a big online everything. But for me, shopping online started with music, obviously, then it went onto books, meditation CDs, and I just recently bought these electronic cigarettes. My husband is trying to quit smoking, so I went online and I bought those BluCigs cigarettes in every flavor for him. |
Swami Vivekananda |
Take up one idea. Make that one idea your life - think of it, dream of it, live on that idea. Let the brain, muscles, nerves, every part of your body, be full of that idea, and just leave every other idea alone. This is the way to success. |
Harry S Truman |
I remember when I first came to Washington. For the first six months you wonder how the hell you ever got here. For the next six months you wonder how the hell the rest of them ever got here. |
Stephen Cambone |
There is a reasonable concern that posting raw data can be misleading for those who are not trained in its use and who do not have the broader perspective within which to place a particular piece of data that is raw. |
Alber Elbaz |
If you take something out of the freezer, it's cold, but what happens when it melts? It's a cool party, a cool person, a cool collection. What does that mean? I'm more interested in things that are uncool, things that have a certain individuality, a certain soul, a certain longevity, emotion, fragility. |
Tom Felton |
I really liked the snake that breaks out of the cage in the beginning of the movie. I saw it in real life, and it was really cool. Really big and fat. The owls are cool as well, but you can't really pet them. |
Justin Halpern |
The Internet has really democratized ideas. There are no real gatekeepers any more, because if you have a great idea, and you put it online, people will find it and it will get in front of who it needs to get in front of. |
Diane Ackerman |
Because we can't escape our ancient hunger to live close to nature, we encircle the house with lawns and gardens, install picture windows, adopt pets and Boston ferns, and scent everything that touches our lives. |
|
|
always knew this was possibleeee
Data exfiltrators send info over PCs' power supply cables Malware tickles unused cores to put signals in current
f you want your computer to be really secure, disconnect its power cable.
So says Mordechai Guri and his team of side-channel sleuths at the Ben-Gurio...
|
|
|
|
Scientists Create DNA-Based Exploit of a Computer System Archeron an hour ago 18 Archeron writes: It seems that scientists at University of Washington in Seattle have managed to encode malware into genomic data, allowing them to gain full access to a computer being used to analyze the data. While this may be a highly contrived attack scenario, it does ask the question whether we pay sufficient attention to data-driven exploits, especially where the data is instrument-derived. What other systems could be vulnerable to a tampered raw data source? Perhaps audio and RF analysis systems? MIT Technology Review reports: "To carry out the hack, researchers led by Tadayoshi Kohno and Luis Ceze encoded malicious software in a short stretch of DNA they purchased online. They then used it to gain 'fu...
|
|
|
|
WikiLeaks Dump Reveals CIA Malware For Tracking Windows Devices Via WiFi Networks
WikiLeaks has published the documentation manual for an alleged CIA tool that can track users of Wi-Fi-capable Windows devices based on the Extended Service Set (ESS) data of nearby Wi-Fi networks. According to the tool's 42-page manual, the tool's name is ELSA. Bleeping Computer has an image embedded in its report that explains how the tool works. There are six steps that summarize the ELSA operation. Bleeping Computer reports: Step 1: CIA operative configures ELSA implant (malware) based on a target's environment. This is done using a tool called the "PATCHER wizard," which generates the ELSA payload, a si...
|
|
|
|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...
This post is a comment.
|
|
|
|
Ransomware Asks For High Score Instead of Money
Rensenware" forces players to get a high score in a difficult PC shoot-em-up to decrypt their files. As Malware Hunter Team noted yesterday, users on systems infected with Rensenware are faced with the usual ransomware-style warning that "your precious data like documents, musics, pictures, and some kinda project files" have been "encrypted with highly strong encryption algorithm." The only way to break the encryption lock, according to the warning, is to "score 0.2 billion in LUNATIC level" on TH12 ~ Undefined Fantastic Object. That's easier said than done, as this gameplay video of the "bullet hell" style Japanese shooter shows. As you may have guessed from the specifics here, the Rensenware bug was created more in the spirit of fun than ...
|
|
|
|
Sometimes I'm so busy hating school that I forget about how cool everything I'm learning is. I just had a moment where I thought to myself, "UGH I should start reading this damn paper to prepare for my proposal. DAMNIT." And then I started reading it and I realized, "Oh, man, this is awesome! What a great idea!"
|
|
|
|
Wana Decryptor Ransomware Using NSA Exploit Leaked By Shadow Brokers To Spread Ransomware Worldwide
A ransomware attack running rampant through Europe today is spreading via an exploit leaked in the most recent Shadow Brokers dump. Researchers said the attackers behind today's outbreak of WannaCry ransomware are using EternalBlue, an exploit made public by the mysterious group in possession of offensive hacking tools allegedly developed by the NSA. Most of the attacks are concentrated in Russia, but machines in 74 countries have been infected; researchers at Kaspersky Lab said they've recorded more than 45,000 infections so far on their sensors, and expect that number to climb. Sixteen National Health Service (NHS) organizations in the U.K., several large telecommunications companies and ...
This post is a comment.
|
|
|
|
The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.
To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency?s term for the interception of electronic communications. Instead, it sought to broaden ?active? surveillance methods ? tactics designed to directly infiltrate a target?s computers or network devic...
This post is a comment.
|
|
|
|
Addendum: Minecraft isn't that cool
This post is a comment.
|
|
|
|
This clever AI hid data from its creators to cheat at its appointed task https://techcrunch.com/2018/12/31/this-clever-ai-hid-data-from-its-creators-to-cheat-at-its-appointed-task/
Depending on how paranoid you are, this research from Stanford and Google will be either terrifying or fascinating. A machine learning agent intended to transform aerial images into street maps and back was found to be cheating by hiding information it would need later in “a nearly imperceptible, high-frequency signal.” Clever girl!
...
|
|