Mysterious Hack Destroyed 600,000 Internet Routers

source: wired.com  |  image: pixabay.com

 

If you have a crypto wallet containing a fortune but forgot the password, all may not be lost. This week, a pair of researchers revealed how they cracked an 11-year-old password to a crypto wallet containing roughly $3 million in bitcoins. With a lot of skill and a bit of luck, the researchers uncovered a flaw in how a previous version of the RoboForm password manager generates passwords that allowed them to accurately figure out the missing login and access the buried treasure.

Police in Western countries are using a new tactic to go after cybercriminals who remain physically out of reach of US law enforcement: trolling. The recent takedowns of ransomware groups like LockBit go beyond the traditional disruption of online infrastructure to include messages on seized websites meant to mess with the minds of criminal hackers. Experts say these trollish tactics help sow distrust between cybercriminals—who already have ample reason to distrust one another.

Continue reading “Mysterious Hack Destroyed 600,000 Internet Routers”

NSA Warns iPhone And Android Users To Turn It Off And On Again

source: Forbes.com (contributed by FAN, Steve Page)  |  image: pixabay.com

 

Updated Saturday, June 1: This article has been updated to include clarifcation around the safety of using public Wi-Fi networks and additional advice from the NCSC and FCC.

Although some people might worry about the National Security Agency itself spying on their phones, the NSA has some sage advice for iPhone and android users concerned about zero-click exploits and the like: turn it off and on again once per week.

How often do you turn off your iPhone or android device? Completely turn it off and then reboot it, rather than just going into standby mode, that is. I suspect that the answer for many people is only when a security or operating system update requires it. That, according to the NSA, could be a big mistake.

Users can mitigate the threat of spear-phishing, which can lead to the installation of yet more malware and spyware, by the same simple action. However, the NSA document does warn that the turn it off and on again advice will only sometimes prevent these attacks from being successful. Continue reading “NSA Warns iPhone And Android Users To Turn It Off And On Again”

3 North Koreans infiltrated US companies in ‘staggering’ alleged telework fraud: DOJ

 

source: yahoo.com (contributed by FAN, Steve Page)  |  image: pixabay.com

 

The Justice Department on Thursday unsealed an indictment charging three North Korean workers and a United States citizen with allegedly engaging in “staggering fraud” through a complex scheme where they secured illicit work with a number of U.S. companies and government agencies.

The indictment against the North Korean IT workers — using the aliases Jiho Han, Chunji Jin and Haoran Xu — alleges the group used fraudulent identities belonging to 60 real Americans to secure telework positions between October 2020 and 2023 that ultimately generated nearly $7 million in profits for the Democratic People’s Republic of Korea.

Continue reading “3 North Koreans infiltrated US companies in ‘staggering’ alleged telework fraud: DOJ”

Defense contractors face a long road on cybersecurity

source: axios.com (contributed by FAN, Steve Page)  |  image: pexels.com

 

Most defense contractors believe they’re too small and inconsequential for nation-state hackers to target them, a National Security Agency official told Axios.

Why it matters: China, in particular, has been laser-focused on targeting key American critical infrastructure, officials have warned. Continue reading “Defense contractors face a long road on cybersecurity”

Report calls for U.S. biodefense buildup

source: axios.com (contributed by FAN, Bill Amshey)  |  image: pixabay.com

 

A new report calls on all levels of government to strengthen U.S. biodefense measures and urges policymakers to codify parts of a national strategy to address an array of biological threats.

Why it matters: Threats in the form of infectious disease outbreaks, lab accidents and biology-based weapons are expected to increase in the coming years, according to the report’s authors and other experts.

  • But biodefense investments get caught in a cycle of “panic and neglect” — an intense focus for a short period, after which policymakers, funders and the public move on, the report notes.
  • “Every future administration must ensure that the National Biodefense Strategy keeps pace with the rapidly evolving and increasing biological threat,” the authors of the 2024 National Blueprint for Biodefense write. Continue reading “Report calls for U.S. biodefense buildup”

The rise of Perplexity AI, the buzzy new web search engine

source: zapier.com  |  image: wikipedia.com

 

Perplexity’s answer engine is altering the way we interact with the internet and might even one day challenge Google’s search dominance.

Perplexity calls itself a “Swiss Army Knife for information discovery and curiosity,” but it’s essentially an AI-powered search engine. Think of it as a mashup of ChatGPT and Google Search—though it’s not a direct replacement for either. Really, it’s the direction Google is trying to go with Gemini—but less chaotically implemented. 

It works like a chatbot: you ask questions, and it answers them. But it’s also able to seamlessly pull in information from recent articles. It indexes the web every day, so you can ask it about recent news, game scores, and other typical search queries. 

But Perplexity is also a kind of search engine. Instead of presenting you with a list of websites that match your query, Perplexity gives you a short summary answer along with the references it used to create it. In some cases, the summary will be all you need. In others, you’ll want to dive into the different sources.

While Perplexity can’t yet replace a traditional search engine, it’s surprisingly functional and effective if you work within its limits. Here’s what you need to know about it. Continue reading “The rise of Perplexity AI”

‘The Next Mass Extinction?’

source: cnn.com (contributed by FAN, Bill Amshey |  image: pexels.com

 

Bird flu is back. With a large outbreak still unfolding, a New York Review of Books essay by Oliver Wang asks if this particular strain, H5N1, could cause “the next mass extinction.”
 
Word of the outbreak in animals spread last summer, Wang writes, recounting eerie mass deaths of seals, sea lions, and birds on South American coasts. “By the time I spoke to [Argentine veterinarian Marcela] Uhart, the breeding season in Patagonia had ended. Over 17,000 baby elephant seals—96 percent or more of the juveniles in the region—were estimated to have died, as well as more than 500,000 birds. In some areas there were no longer any organisms to infect. Still, Uhart told me, she saw sick and dead animals on each visit to the beach: a sea lion, a duck, a tern. ‘My suspicion is that the virus will linger on,’ she said. ‘We just don’t know whether it will continue to cause epidemic outbreaks, or whether it will just trickle in like it is now.’”
Continue reading “The Next Mass Extinction?”

Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

source: wired.com | image: pexels.com

 

The iPhone maker has detected spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky—but there are a few steps you can take to protect yourself.

 

In April, Apple sent notifications to iPhone users in 92 countries, warning them they’d been targeted with spyware. “Apple detected that you are being targeted by a mercenary spyware attack that is trying to remotely compromise the iPhone associated with your Apple ID,” the notification reads.

Users quickly took to social media sites including X, trying to work out what the notification meant. Many of those targeted were based in India, but others in Europe also reported receiving Apple’s warning.

Weeks later, little is still known about the latest iPhone attacks. Former smartphone giant Blackberry, now a security firm, has released research indicating they are linked to a Chinese spyware campaign dubbed “LightSpy,” but Apple spokesperson Shane Bauer says this is inaccurate, and researchers at security firm Huntress say the variant Blackberry analyzed was a macOS version, not iOS. Continue reading “Apple’s iPhone Spyware Problem Is Getting Worse”

AI’s new power: Persuasion

source: axios.com | image: pexels.com

 

AI startup Anthropic says its language models have steadily and rapidly improved their “persuasiveness,” Axios’ Ryan Heath writes.

  • Why it matters: Persuasion can foster disinformation and push people to act against their own interests, according to new research the company posted yesterday.

There’s relatively little research on how the latest models compare to humans when it comes to their persuasiveness — a skill with widespread social, commercial and political applications.

  • The researchers found that the most capable Anthropic model, Claude 3 Opus, “produces arguments that don’t statistically differ” from arguments written by humans.

 

RESEARCH

Measuring the Persuasiveness of Language Models

While people have long questioned whether AI models may, at some point, become as persuasive as humans in changing people’s minds, there has been limited empirical research into the relationship between model scale and the degree of persuasiveness across model outputs. To address this, we developed a basic method to measure persuasiveness, and used it to compare a variety of Anthropic models across three different generations (Claude 1, 2, and 3), and two classes of models (compact models that are smaller, faster, and more cost-effective, and frontier models that are larger and more capable). Continue reading “AI’s new power: Persuasion”

Brute Force Password Cracking Takes Longer, But Celebration May Be Premature

source: technewsworld.com | image: pexels.com

 

Brute force cracking of passwords takes longer now than in the past, but the good news is not a cause for celebration, according to the latest annual audit of password cracking times released Tuesday by Hive Systems.

Depending on the length of the password and its composition — the mix of numbers, letters, and special characters — a password can be cracked instantly or take half a dozen eons to decipher.

For example, four-, five-, or six-number-only passwords can be cracked instantly with today’s computers, while an 18-character password consisting of numbers, upper- and lower-case letters, and symbols would take 19 quintillion years to break.

Last year, Hive’s research found that some 11-character passwords could be cracked instantaneously using brute force. This year’s findings revealed the effectiveness of newer industry-standard password hashing algorithms — like bcrypt — for encrypting passwords in databases. Now, that same 11-character password takes 10 hours to crack.

Continue reading “Brute Force Password Cracking Takes Longer, But Celebration May Be Premature”