Tomorrow’s Intelligent Malware Will Attack When It Sees Your Face

IBM researchers have injected viruses with neural nets, making them stealthier and precisely targetable.

Source: Tomorrow’s Intelligent Malware Will Attack When It Sees Your Face

Advertisements

‘It’s our time to serve the Motherland’: How Russia’s war in Georgia sparked Moscow’s modern-day recruitment of criminal hackers

On the night of August 8, 2008, Georgian troops started shelling Tskhinvali, the capital of South Ossetia, and then began their assault on the city. Within a few hours, Russia’s armed forces entered Georgia, leading to a five-day war that cemented South Ossetia’s secession. The conflict was fought not only on Georgian soil, but also in cyberspace, where Russian hacker groups hijacked the websites of Georgian news outlets and state agencies. This was the moment when Moscow first turned its attention to Russia’s so-called “patriotic bloggers,” and started relying systematically on their services, which were provided both voluntarily and compulsorily.

Source: ‘It’s our time to serve the Motherland’: How Russia’s war in Georgia sparked Moscow’s modern-day recruitment of criminal hackers

Massive Attack On Swedish News Sites Was The Work Of Russia, US Told Its Ambassadors

According to a newly released State Department cable, the attack was part of a Russian campaign to sow disinformation about NATO. It came as Russia allegedly was stealing Democrats’ emails.

Source: Massive Attack On Swedish News Sites Was The Work Of Russia, US Told Its Ambassadors

AI for cybersecurity is a hot new thing—and a dangerous gamble

Machine learning and artificial intelligence can help guard against cyberattacks, but hackers can foil security algorithms by targeting the data they train on and the warning flags they look for.

Source: AI for cybersecurity is a hot new thing—and a dangerous gamble

Cyber report details tricks used by hackers to target critical infrastructure

A cybersecurity firm says it uncovered the methods and tools hackers use to target critical infrastructure organizations, activity it observed by creating a website that masqueraded as a major electricity provider.

Source: Cyber report details tricks used by hackers to target critical infrastructure

How Russian Hackers Amplified the Seth Rich Conspiracy Until it Reached Donald Trump and the CIA

A new report claims that Russian hackers altered dates in stolen documents to frame the DNC staffer for the theft.

Source: How Russian Hackers Amplified the Seth Rich Conspiracy Until it Reached Donald Trump and the CIA