Browsed by
Author: Greg Swiecicki

TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services

TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services

Another application developed on Android by the creators of the TrickBot banking Trojan can capture one-time authorization codes. The task of the app is to capture authorization codes and send it to online banking customers via SMS, as well as may carry out illegal transactions.

https://thehackernews.com/2020/03/trickbot-two-factor-mobile-malware.html

Giant Ibis ー Algorithms

Giant Ibis ー Algorithms

The world of music is surprising; it is not apparent that new instruments, new ways, and methods of obtaining sound change the view on music. The revolution began at the turn of the 20th and 21st – digital recordings personified by mp3 format, peer-to-peer networks, broke away from the physical medium. Big data, deep learning, algorithms along with the popularization of streaming and the belief that everything can be quantified, change the music and its environment.

Malware Found Hidden in Android Utility Apps, Children’s Games

Malware Found Hidden in Android Utility Apps, Children’s Games

In Google Play applications, a family of malware has been discovered that has been downloaded almost a million times. Researchers say that 24 infected apps are designed for children; they are puzzles or racing games.

https://www.darkreading.com/application-security/malware-found-hidden-in-android-utility-apps-childrens-games/d/d-id/1337396

MAR 20 Security Breach Disrupts Fintech Firm Finastra

MAR 20 Security Breach Disrupts Fintech Firm Finastra

On March 20, Finastra announced problems in the operation of systems and services for customers located in North America. Approximately 3.00 am issued official confirmation that there was a breach of security of Finastry systems. The same day the company admitted that it was attacked using ransom encryption software (ransomware).

https://krebsonsecurity.com/2020/03/security-breach-disrupts-fintech-firm-finastra/

Neuromorphic

Neuromorphic

Neuromorphic calculations are new and utterly different from the previous approach to computer architecture. The main area of ​​the application here is neuroscience, whose operation is less associated with a traditional computer, and more with the action of the human brain. The most extensive neuromorphic computing system developed to date has been built by Intel, whose system is capable of recognizing cloud odors where the costs and other migration traps of Pohoiki Springs are hidden. Loihi processor, just like the brain, can handle demanding tasks up to 1000 times faster and 10,000 times more efficiently than conventional processors. Pohoiki Springs is a big step towards an architecture that allows you to assess the potential for solving problems with AI, but also a wide range of difficult tasks in calculations. Intel and INRC researchers have demonstrated the ability of Loihi to recognize gestures in real-time, read braille using innovative artificial leather, orientate according to learned landmarks, or learn fragrances. In essence, these possibilities are due to the use of tens of milliwatts of power. The values are minimal compared to computers with conventional architecture.

Researchers Find Security Vulnerabilities In Some of The Top Password Managers

Researchers Find Security Vulnerabilities In Some of The Top Password Managers

The managers ‘task is to protect users’ data and confidential data; unfortunately, they do not guarantee reliable security. Quite recently, scientists have revealed numerous vulnerabilities in some of the best password managers.

https://latesthackingnews.com/2020/03/23/researchers-find-security-vulnerabilities-in-some-of-the-top-password-managers/