Space: The Final Frontier for Cyberattacks

 

source: darkreading.com  |  image: pixabay.com

 

A failure to imagine — and prepare for — threats to outer-space related assets could be a huge mistake at a time when nation-states and private companies are rushing to deploy devices in a frantic new space race.

A distributed denial-of-service (DDoS) attack this week disabled electronic door locks across a major lunar settlement, trapping dozens of people indoors and locking out many more in lethal cold. The threat actor behind the attack is believed responsible for also commandeering a swarm of decades-old CubeSats last year and attempting to use them to trigger a chain reaction of potentially devastating satellite crashes.

Neither “incident” has happened, of course. Yet. But they well could, sometime in the not-too-distant future, and now is the time to start thinking about and planning for them. Continue reading “Space: The Final Frontier for Cyberattacks”

Have we hit peak Apple?

source: fastcompany.com  |  image: pixabay.com

 

Apple used a recent keynote at the annual WWDC event to unveil a roster of new software developments, product upgrades, and most importantly—their long-awaited AI play. Fast Company’s own Yasmin Gagne discusses Apple’s new high-stakes partnership with OpenAI, implications for app-based businesses, and investors’ reactions to the week’s news. Gagne also reads the tea leaves on Tim Cook’s future successor, explores whether we’ve reached “peak Apple,” and more. 

t was not short. I’m gonna be honest. I got a little bored, and then we hit the AI stuff, and I was fully back in.

A lot of the buzz coming in was about how Apple would enter the AI craze, which it’s been slow to do. And in classic Apple style, they rebranded AI itself, calling their offerings, “Apple Intelligence.” Continue reading “Have we hit peak Apple?”

Swimming microrobots deliver cancer-fighting drugs to metastatic lung tumors in mice

 

source: sciencedaily.com  |  image: pixabay.com

 

Engineers at the University of California San Diego have developed microscopic robots, known as microrobots, capable of swimming through the lungs to deliver cancer-fighting medication directly to metastatic tumors. This approach has shown promise in mice, where it inhibited the growth and spread of tumors that had metastasized to the lungs, thereby boosting survival rates compared to control treatments.

The findings are detailed in a paper published on June 12 in Science Advances.The microrobots are an ingenious combination of biology and nanotechnology. They are a joint effort between the labs of Joseph Wang and Liangfang Zhang, both professors in the Aiiso Yufeng Li Family Department of Chemical and Nano Engineering at the UC San Diego Jacobs School of Engineering.

To create the microrobots, researchers chemically attached drug-filled nanoparticles to the surface of green algae cells. The algae, which provide the microrobots with their movement, enable the nanoparticles to efficiently swim around in the lungs and deliver their therapeutic payload to tumors. Continue reading “Swimming microrobots deliver cancer-fighting drugs…”

Mysterious Hack Destroyed 600,000 Internet Routers

source: wired.com  |  image: pixabay.com

 

If you have a crypto wallet containing a fortune but forgot the password, all may not be lost. This week, a pair of researchers revealed how they cracked an 11-year-old password to a crypto wallet containing roughly $3 million in bitcoins. With a lot of skill and a bit of luck, the researchers uncovered a flaw in how a previous version of the RoboForm password manager generates passwords that allowed them to accurately figure out the missing login and access the buried treasure.

Police in Western countries are using a new tactic to go after cybercriminals who remain physically out of reach of US law enforcement: trolling. The recent takedowns of ransomware groups like LockBit go beyond the traditional disruption of online infrastructure to include messages on seized websites meant to mess with the minds of criminal hackers. Experts say these trollish tactics help sow distrust between cybercriminals—who already have ample reason to distrust one another.

Continue reading “Mysterious Hack Destroyed 600,000 Internet Routers”

Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

source: wired.com | image: pexels.com

 

The iPhone maker has detected spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky—but there are a few steps you can take to protect yourself.

 

In April, Apple sent notifications to iPhone users in 92 countries, warning them they’d been targeted with spyware. “Apple detected that you are being targeted by a mercenary spyware attack that is trying to remotely compromise the iPhone associated with your Apple ID,” the notification reads.

Users quickly took to social media sites including X, trying to work out what the notification meant. Many of those targeted were based in India, but others in Europe also reported receiving Apple’s warning.

Weeks later, little is still known about the latest iPhone attacks. Former smartphone giant Blackberry, now a security firm, has released research indicating they are linked to a Chinese spyware campaign dubbed “LightSpy,” but Apple spokesperson Shane Bauer says this is inaccurate, and researchers at security firm Huntress say the variant Blackberry analyzed was a macOS version, not iOS. Continue reading “Apple’s iPhone Spyware Problem Is Getting Worse”

Is the ‘Dead Internet’ theory suddenly coming true?

This could be a sign

source: fastcompany.com  |  image: pexels.com

No, not shrimp Jesus—though that’s noteworthy, too. We’re talking about what TikTok could be planning with AI influencers.

 

There’s been a popular theory floating around conspiracy circles for about seven or eight years now. It’s called the “Dead Internet” theory, and its main argument is that the organic, human-created content that powered the early web in the 1990s and 2000s has been usurped by artificially created content, which now dominates what people see online. Hence, the internet is “dead” because the content most of us consume is no longer created by living beings (humans).

But there’s another component to the theory—and this is where the conspiracy part comes into play. The Dead Internet theory states that this move from human-created content to artificially generated content was purposeful, spearheaded by governments and corporations in order to exploit control over the public’s perception. 

Continue reading “Is the ‘Dead Internet’ theory suddenly coming true?”

How to Protect Yourself (and Your Loved Ones) From AI Scam Calls

 

source: wired.com  |  image: pexels.com

 
AI tools are getting better at cloning people’s voices, and scammers are using these new capabilities to commit fraud. Avoid getting swindled by following these expert tips.

YOU ANSWER A random call from a family member, and they breathlessly explain how there’s been a horrible car accident. They need you to send money right now, or they’ll go to jail. You can hear the desperation in their voice as they plead for an immediate cash transfer. While it sure sounds like them, and the call came from their number, you feel like something’s off. So, you decide to hang up and call them right back. When your family member picks up your call, they say there hasn’t been a car crash, and that they have no idea what you’re talking about.

Congratulations, you just successfully avoided an artificial intelligence scam call. Continue reading “How to Protect Yourself (and Your Loved Ones) From AI Scam Calls”

Holographic message encoded in simple plastic

source: science daily.com  |  image: pexels.com

 

Important data can be stored and concealed quite easily in ordinary plastic using 3D printers and terahertz radiation, scientists show. Holography can be done quite easily: A 3D printer can be used to produce a panel from normal plastic in which a QR code can be stored, for example. The message is read using terahertz rays — electromagnetic radiation that is invisible to the human eye.

 

There are many ways to store data — digitally, on a hard disk, or using analogue storage technology, for example as a hologram. In most cases, it is technically quite complicated to create a hologram: High-precision laser technology is normally used for this.

Cybersecurity Threats in Global Satellite Internet

 

 

source: cyberdefensemagazine.com  |  image:  pixabay.com

 

Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the 1990s. Current satellite internet systems typically use low-orbit satellites and provide data transmission at low speeds due to limited bandwidth. Starlink, on the other hand, is a project developed by Elon Musk’s SpaceX company and aims to provide a faster, more reliable and more comprehensive internet experience with low latency and high bandwidth through a high number of low orbit satellites.

The surge in satellite internet usage has opened up a new frontier for cybersecurity threats, ranging from sophisticated hacking attempts to disruptive denial-of-service attacks.

Continue reading “Cybersecurity Threats in Global Satellite Internet”

SpaceX Launched Military Satellites Designed to Track

Hypersonic Missiles

source: wired.com  |  image: pexels.com

 
The prototype satellites hitched a ride on a Falcon 9 rocket.

 

Two prototype satellites for the Missile Defense Agency and four missile-tracking satellites for the US Space Force rode a SpaceX Falcon 9 rocket into orbit Wednesday from Florida’s Space Coast.

These satellites are part of a new generation of spacecraft designed to track hypersonic missiles launched by China or Russia and perhaps emerging missile threats from Iran or North Korea, which are developing their own hypersonic weapons.

Continue reading “SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles”