Intel CPUs Rocked By Plundervolt

Intel CPUs Rocked By Plundervolt

Researchers from three universities in Europe have found a flaw in Intel in several processors, which they called Plundervolt. This may seem like a rather dangerous situation because it can be used to steal encryption keys and compromise software security. However, according to Oswald Plundervolt, there is no reason to panic. The system will not crash if someone uses this file because it does not overload the processor and does not cause stability problems. This cannot be used remotely, which means that an attacker cannot lure a user to the compromised site.

https://hothardware.com/news/intel-cpus-plundervolt-voltage-manipulating-security-exploit

Hackers steal money from cards through the Uber

Hackers steal money from cards through the Uber

Uber’s client accounts are recently attacked by one or a group of hackers. The mechanism of action is always the same. Customers after some time using the application notice that they have been robbed. Kaspersky Lab experts confirm that this type of fraud by using ride-hailing company is very popular.

https://www.ehackingnews.com/2019/12/hackers-steal-money-from-cards-through.html

Android phone and apps

Android phone and apps

Be careful while shopping for Christmas. Stealing personal data is an extremely profitable business. By having information about users, it is possible, for example, to advertise more effectively. Unfortunately, our personal data is also sent to people who can use information about us, for example, stretch us at additional costs.

https://www.techradar.com/news/malicious-mobile-apps-could-ruin-your-android-phone-this-christmas

IBM 305 RAMAC

IBM 305 RAMAC

If I mention computers, it is worth presenting the IBM 350, which turned out to be a real technological breakthrough when it comes to data storage. Thanks to the use of 50 magnetic discs with a diameter of 24 inches, rotating at 1200 revolutions per minute, it was ahead of the solutions popular at that time – punched cards and drum memory. In 1956-61, IBM produced over 1,000 IBM 305 RAMAC computers equipped with disk drives. Despite the passage of nearly 60 years, our modern hard drives still operate on the same principle as the IBM 350.

Target Apple Users

Target Apple Users

It doesn’t matter what equipment we have, we can feel threatened in every situation. There is also a lot of malware on iOS and macOS. Software vulnerabilities are used by hackers in various ways. In this particular case, the welding involved ads through which hackers redirected Apple users to malicious sites. You should always be careful when browsing the internet, because cyber criminals are trying to suggest malware in a form that is not to arouse suspicion. Even devices considered more secure do not make it possible to click on everything without fear of leakage of sensitive data and other threats.

https://thehackernews.com/2019/10/malvertising-webkit-hacking.html

Ford quantum experiment

Ford quantum experiment

Ford says quantum computers offer a good chance of improving transport. In collaboration with Microsoft, Ford used the so-called “quantum-inspired” technology. “Using world-class quantum algorithms customized for specific problems, we can bring measurable improvements and drive change that can impact people’s lives.”

https://www.cnet.com/roadshow/news/ford-quantum-computing-experiment-cuts-traffic-commute-times/