Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 91

Feb 1, 2022

Custom Macintosh With A Real 486

Posted by in categories: cybercrime/malcode, futurism

Older Apple computers can often be something of a collector’s item, with the oldest fetching an enormously high price in auctions. The ones from the late ’80s and early ’90s don’t sell for quite as much yet, but it’s possible that museums and collectors of the future will one day be clamoring for those as well. For that reason, it’s generally frowned upon to hack or modify original hardware. Luckily, this replica of an Apple Macintosh didn’t harm any original hardware yet still manages to run software on bare metal.

The computer is built around a single-board computer, but this SBC isn’t like the modern ARM machines that have become so ubiquitous. It’s a 133MHz AMD 486 which means that it can run FreeDOS and all of the classic DOS PC games of that era without emulation. In order to run Apple’s legacy operating system, however, it does require the use of the vMac emulator, but the 486 is quite capable of handling the extra layer of abstraction. The computer also sports a real SoundBlaster ISA sound card, uses a microSD card for its hard drive, and uses an 800×600 LCD screen.

As a replica, this computer is remarkably faithful to the original and even though it doesn’t ship with a Motorola 68,000 it’s still fun to find retro PC gamers that are able to run their games on original hardware rather than emulation. It reminds us of another retro 486 that is capable of running old games on new hardware without an emulator as well.

Jan 31, 2022

Delete This Authenticator Android App Immediately To Avoid Its Banking Malware Payload

Posted by in categories: cybercrime/malcode, finance

This authenticator app is designed to install bank info-stealing malware that could wipe you out.

Jan 31, 2022

GPU RAM Upgrades Are Closer Than You Think

Posted by in category: cybercrime/malcode

We’re all used to swapping RAM in our desktops and laptops. What about a GPU, though? [dosdude1] teaches us that soldered-on RAM is merely a frontier to be conquered. Of course, there’s gotta be a good reason to undertake such an effort – in his case, he couldn’t find the specific type of Nvidia GT640 that could be flashed with an Apple BIOS to have his Xserve machine output the Apple boot screen properly. All he could find were 1GB versions, and the Apple BIOS could only be flashed onto a 2GB version. Getting 2GB worth of DDR chips on Aliexpress was way too tempting!

The video goes through the entire replacement process, to the point where you could repeat it yourself — as long as you have access to a preheater, which is a must for reworking relatively large PCBs, as well as a set of regular tools for replacing BGA chips. In the end, the card booted up, and, flashed with a new BIOS, successfully displayed the Apple bootup logo that would normally be missing without the special Apple VBIOS sauce. If you ever want to try such a repair, now you have one less excuse — and, with the GT640 being a relatively old card, you don’t even risk all that much!

Continue reading “GPU RAM Upgrades Are Closer Than You Think” »

Jan 30, 2022

Quantum Computers Could Crack Bitcoin. Here’s What It Would Take

Posted by in categories: bitcoin, chemistry, cryptocurrencies, cybercrime/malcode, encryption, energy, mathematics, quantum physics, supercomputing

Quantum computers could cause unprecedented disruption in both good and bad ways, from cracking the encryption that secures our data to solving some of chemistry’s most intractable puzzles. New research has given us more clarity about when that might happen.

Modern encryption schemes rely on fiendishly difficult math problems that would take even the largest supercomputers centuries to crack. But the unique capabilities of a quantum computer mean that at sufficient size and power these problems become simple, rendering today’s encryption useless.

That’s a big problem for cybersecurity, and it also poses a major challenge for cryptocurrencies, which use cryptographic keys to secure transactions. If someone could crack the underlying encryption scheme used by Bitcoin, for instance, they would be able to falsify these keys and alter transactions to steal coins or carry out other fraudulent activity.

Jan 30, 2022

This Week’s Awesome Tech Stories From Around the Web (Through January 29)

Posted by in categories: biotech/medical, cybercrime/malcode, internet, robotics/AI

From an autonomous robotic surgeon to the world’s most powerful cyberweapon, check out this week’s awesome tech stories from around the web.

Jan 30, 2022

5 Ways Artificial Intelligence Is Radically Transforming Creativity in Business

Posted by in categories: business, cybercrime/malcode, robotics/AI

Cybersecurity professionals are already using this tech to identify new types of malware and protect sensitive data for organizations. The beauty of implementing AI systems in a cybersecurity strategy is that they learn as they analyze more data, so they get better at their jobs with new experiences.

The business world is ever-changing, and customer behavior is evolving. Managing the radical transformation can be challenging, but it doesn’t have to be when you’ve got AI at your beck and call. Several SMEs and startups have leveraged AI to capture market share and establish their brand.

Soon, AI in business will no longer be a luxury — it will be a necessity. Companies that don’t keep pace with consumers’ expectations will fall short and lose market share. The only way to stay relevant is to adopt the trend.

Jan 29, 2022

Lazarus hackers use Windows Update to deploy malware

Posted by in category: cybercrime/malcode

North Korean-backed hacking group Lazarus has added the Windows Update client to its list of living-off-the-land binaries (LoLBins) and is now actively using it to execute malicious code on Windows systems.

The new malware deployment method was discovered by the Malwarebytes Threat Intelligence team while analyzing a January spearphishing campaign impersonating the American security and aerospace company Lockheed Martin.

After the victims open the malicious attachments and enable macro execution, an embedded macro drops a WindowsUpdateConf.lnk file in the startup folder and a DLL file (wuaueng.dll) in a hidden Windows/System32 folder.

Jan 22, 2022

Cybersecurity in 2022 — A Fresh Look at Some Very Alarming Stats

Posted by in categories: biotech/medical, business, climatology, cybercrime/malcode, sustainability

*The past two years has seen a rapid shift of work to remote and hybrid offices. The statistics show that hackers welcomed that shift and took advantage of the vulnerabilities and gaps in security by businesses.

* Cyber perils are the biggest concern for companies globally in 2022, according to the Allianz Risk Barometer. The threat of ransomware attacks, data breaches or major IT outages worries companies even more than business and supply chain disruption, natural disasters or the COVID-19 pandemic, all of which have heavily affected firms in the past year.

Cyber incidents tops the Allianz Risk Barometer for only the second time in the survey’s history (44% of responses), Business interruption drops to a close second (42%) and Natural catastrophes ranks third (25%), up from sixth in 2021. Climate change climbs to its highest-ever ranking of sixth (17%, up from ninth), while Pandemic outbreak drops to fourth (22%).y affected firms in the past year. past two years has seen a rapid shift of work to remote and hybrid offices. The statistics show that hackers welcomed that shift and took advantage of the vulnerabilities and gaps in security by businesses.

Jan 21, 2022

Google Details Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers

Posted by in category: cybercrime/malcode

Google researchers detail two zero-day vulnerabilities reported in Zoom client software and MMR servers.

Jan 21, 2022

DoNot Hacking Team Targeting Government and Military Entities in South Asia

Posted by in categories: cybercrime/malcode, government, military

Researchers reveal details about recent cyberattacks carried out by the Donot Hacking Team against government and military entities in South Asia.

Page 91 of 212First8889909192939495Last