Результатов: 1344
Фото:

AI-powered social engineering not technical exploits now dominating 90% of cyber attacks

A newly published cyber threat report from Avast has revealed substantial dominance of social engineering in cyber threats during the first quarter of 2024. Per the report, nearly 90% of cyberattacks on mobile and 87% on desktop devices involved scams, phishing, and malvertising, exploiting human vulnerabilities more than technical weaknesses. дальше »

2024-5-14 13:20


Research Reveals Mobile Devices as Catalysts for Efficient Decentralized Infrastructure Networks (DePINs)

Zug, Switzerland, April 24th, 2024, Chainwire Researchers from the University of Zürich’s Communication Systems Group, in collaboration with the Acurast Association building on Polkadot and other ecosystems, have unveiled groundbreaking results in their latest study, “Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds. дальше »

2024-4-24 15:34


Фото:

Google files lawsuit against crypto scammers allegedly defrauding thousands

Tech giant Google has taken legal action against a group of crypto scammers, alleging their involvement in defrauding more than 100,000 people worldwide. Filed on Thursday, the lawsuit accuses the scammers of uploading fraudulent investment and cryptocurrency exchange apps to Google Play, Google’s official app store for Android devices. дальше »

2024-4-5 18:36


Фото:

Apple teases generative AI plans, hints at user devices playing a role

Apple hinted at upcoming plans involving generative artificial intelligence (AI) during its latest shareholder meeting, according to a report from CNBC on Feb. 28. Cook said during the call: “Later this year, I look forward to sharing with you the ways we will break new ground in generative AI, another technology we believe can redefine […] The post Apple teases generative AI plans, hints at user devices playing a role appeared first on CryptoSlate. дальше »

2024-2-29 00:26


В смартфоне от Solana нашли критическую уязвимость

Аналитики CertiK выявили критическую уязвимость в смартфоне Saga от Solana, которая позволяет похищать криптовалюты пользователя.   Ever wondered about the security of your Web3 devices? Our newest exploration reveals a significant bootloader vulnerability in the Solana Phone, a challenge not just for this device but for the entire industry. дальше »

2023-11-16 08:53


New Russian malware, dubbed ‘Infamous Chisel,’ identified targeting Binance, Coinbase, and Trust wallets

Newly discovered malware dubbed “Infamous Chisel” targets crypto wallets and other Android apps, according to a U. K. government report on Sept. 1. The U. K. ’s National Cyber Security Centre (NCSC) said that the malware works by scanning various directories on infected mobile devices and exfiltrating data. дальше »

2023-9-2 00:40


CertiK’s crypto security reviews uncover critical vulnerability in Apple iOS

The blockchain cybersecurity firm, CertiK, has reportedly been instrumental in uncovering critical security vulnerabilities in Apple’s latest iPhone operating system (iOS) update. CertiK’s contributions were explicitly related to two security vulnerabilities in Apple’s iOS kernel, which were confirmed to affect the latest iOS devices. дальше »

2023-8-10 15:30