Результатов: 1166
Фото:

Nasty Glupteba malware uses Bitcoin blockchain to keep itself alive

Cybersecurity researchers have discovered a new strain of the nefarious Glupteba malware that uses the Bitcoin blockchain to ensure it remains dangerous. TrendMicro’s latest blog details the previously undocumented variant which is capable of invading systems to mine Monero cryptocurrency and steal sensitive browser data like passwords and cookies. дальше »

2019-9-4 17:09


Фото:

This thought experiment explains how quantum computers can time travel

You know how sometimes you find yourself facing off against an enemy spaceship in a Wild West-inspired laser duel where whoever fires first wins? What if I told you that a group of researchers (a murder of physicists?) came up with a way for you to manipulate the very fabric of time and space so that, no matter who fires first, you both die? That’s probably not the best pitch you’ve heard for developing quantum computers. дальше »

2019-8-29 02:25


Scientists at an aquarium just figured out how to save Florida’s ‘Great Barrier Reef’

Scientists in Florida may have just saved the the third largest coral reef on the planet. Florida Aquarium Senior Coral Scientist Keri O’Neil, aka “The Coral Whisperer,” and her team of researchers today announced they’d successfully spawned Atlantic coral in a laboratory – the first time this has been accomplished. дальше »

2019-8-22 22:33


Фото:

Boosting a single brain molecule reduced anxiety in lab monkeys

Scientists may have found a potential cure for anxiety after isolating and boosting a molecule in the brains of rhesus monkeys. Andrew Fox, a researcher at UC Davis, and co-author Tade Souaiaia from SUNY lead a team of researchers in an experimental study to determine if behaviors related to anxiety and depression could be mitigated by manipulating the amygdala, the part of the brain that controls memory and emotions linked to memory. дальше »

2019-8-15 00:58


Фото:

NYU researchers made mice smarter by manipulating their brainwaves with light

Researchers from the New York University School of Medicine recently developed a method for manipulating brain waves with light to improve learning. The results of the team’s study are incredible – laboratory mice exposed to the new technique showed marked improvement in short-term memory – but the implications of their findings could radically alter the scientific perception of how the brain works. дальше »

2019-8-10 22:04


Фото:

WhatsApp’s chat manipulation exploit remains unresolved even after a year (Updated)

Vulnerabilities uncovered in WhatsApp — the messaging app used by about 1. 5 billion users across the world — can allow bad actors to exploit the platform to manipulate or spoof chat messages. The flaws would make it possible to “intercept and manipulate messages sent in both private and group conversations, giving attackers the power to create and spread misinformation from what appear to be trusted sources,” the researchers noted. дальше »

2019-8-8 14:01


Фото:

Yet another reason to dislike Tether: 300 addresses hold 80% of the ‘stablecoin’

Infamous stablecoin and pseudo currency Tether (USDT) doesn’t exactly have the cleanest of rap sheets, and if you needed another reason not to trust it, keep reading. According to recent findings from cryptocurrency researchers at Coin Metrics, around 300 entities hold about 80 percent of the Tether currently in circulation, Bloomberg reports. дальше »

2019-8-8 11:30


Фото:

Researchers discover troubling new security flaw in all modern Intel processors

Researchers from BitDefender have uncovered a concerning security vulnerability present in all modern Intel processors. If executed, the flaw could permit an adversary to access the computer’s kernel memory, which could potentially result in them gaining access to sensitive information, like passwords, tokens, and private conversations. дальше »

2019-8-7 02:15


Фото:

Microsoft: Russian government hackers are targeting IoT devices

Microsoft today warned that Russian government hackers have been using video decoders, printers, and internet of things devices to breach computer networks. In a blog post, the Microsoft Threat Intelligence Center wrote that the “devices became points of ingress from which the actor established a presence on the network and continued looking for further access. дальше »

2019-8-6 03:36