Viruses, trojans, software vulnerabilities, security issues

In the USA, they created a risk assessment system for AI algorithmsIn the USA, they created a risk assessment system for AI algorithms

In the USA, they created a risk assessment system for AI algorithms

The National Institute of Standards and Technology (NIST), part of the U.S. Department of Commerce, which develops and tests technologies…

8 months ago
Researchers have taught AI to steal information from a monitor using radiation from an HDMI cableResearchers have taught AI to steal information from a monitor using radiation from an HDMI cable

Researchers have taught AI to steal information from a monitor using radiation from an HDMI cable

A new study has found that hackers can use artificial intelligence to decipher electromagnetic radiation emanating from the cable that…

8 months ago
Secure Boot has been compromised on more than 200 PC models from major manufacturers, and this is just the beginningSecure Boot has been compromised on more than 200 PC models from major manufacturers, and this is just the beginning

Secure Boot has been compromised on more than 200 PC models from major manufacturers, and this is just the beginning

Cybersecurity experts at Binarly have discovered that the Secure Boot protocol used in UEFI firmware has been compromised on more…

8 months ago
CrowdStrike outage costs Fortune 500 companies $5.4 billionCrowdStrike outage costs Fortune 500 companies $5.4 billion

CrowdStrike outage costs Fortune 500 companies $5.4 billion

One in four Fortune 500 companies experienced outages during computer outages around the world last Friday caused by a botched…

8 months ago
A US company accidentally hired a North Korean hacker, who immediately began downloading viruses.A US company accidentally hired a North Korean hacker, who immediately began downloading viruses.

A US company accidentally hired a North Korean hacker, who immediately began downloading viruses.

The American company KnowBe4, which specializes in cybersecurity issues, unwittingly hired a hacker from the DPRK, who tried to upload…

8 months ago
Vulnerability in Windows Hello allows hackers to bypass biometric security on business PCsVulnerability in Windows Hello allows hackers to bypass biometric security on business PCs

Vulnerability in Windows Hello allows hackers to bypass biometric security on business PCs

A vulnerability has been identified in the Windows Hello for Business (WHfB) authentication system that allows attackers to bypass the…

8 months ago
Alphabet failed to take over Wiz for $23 billion – the startup considered the proposed conditions humiliatingAlphabet failed to take over Wiz for $23 billion – the startup considered the proposed conditions humiliating

Alphabet failed to take over Wiz for $23 billion – the startup considered the proposed conditions humiliating

Cloud cybersecurity startup Wiz has refused a deal with Alphabet, the parent company of Google, which offered $23 billion for…

8 months ago
Systems affected by the CrowdStrike outage will take several weeks to recoverSystems affected by the CrowdStrike outage will take several weeks to recover

Systems affected by the CrowdStrike outage will take several weeks to recover

The massive outage, which affected about 8.5 million PCs running Microsoft Windows worldwide, although affecting just 1% of systems in…

9 months ago
Systems affected by the CrowdStrike outage will take several weeks to recoverSystems affected by the CrowdStrike outage will take several weeks to recover

Systems affected by the CrowdStrike outage will take several weeks to recover

The massive outage, which affected about 8.5 million PCs running Microsoft Windows worldwide, although affecting just 1% of systems in…

9 months ago