- Sep 2024
-
www.theregister.com www.theregister.com
-
criminals could easily create a package that uses a name produced by common AI services and cram it full of malware
-
-
arxiv.org arxiv.org
-
the average percentage of hallucinated packages is at least 5.2% for commercial models and 21.7% for open-source models, including a staggering 205,474 unique examples of hallucinated package names, further underscoring the severity and pervasiveness of this threat
Tags
Annotators
URL
-
- Aug 2024
-
-
Of course, the developer usually does not do this out of malice, but rather to profit more at the users' expense. That does not make it any less nasty or more legitimate.
-
-
Yielding to that temptation has become ever more frequent; nowadays it is standard practice. Modern proprietary software is typically an opportunity to be tricked, harmed, bullied or swindled.
-
Software designed to function in a way that mistreats the user is called malware.
-
Microsoft is using malware tactics to get users to switch to their web browser, Microsoft Edge, and their search engine, Microsoft Bing. When users launch the Google Chrome browser Microsoft injects a pop up advertisement in the corner of the screen advising users to switch to Bing. Microsoft also imported users Chrome browsing data without their knowledge or consent.
-
- Mar 2024
-
www.theregister.com www.theregister.com
-
Next to the xz debacle where a maintainer was psyops'd into backdooring servers, this is another new attack surface: AI tools make up software packages in what they generate which get downloaded. So introducing malware is a matter of creating malicious packages named the way they are repeatedly named by AI tools.
-
- Oct 2023
-
www.youtube.com www.youtube.com
-
"Without the right to tinker and explore, we risk becoming enslaved by technology; and the more we exercise the right to hack, the harder it will be to take that right away" - Andre "Bunnie" Huang
hah, we are already "enslaved by technology". ask Ted Kaczynski
our enemies already have hardware backdoors, compromising emissions (tempest), closed-source firmware/drivers/hardware, ... but sure, "feel free"
Tags
Annotators
URL
-
- Jan 2023
-
-
OpenEDR and portal 제공 comodo internet security Docker
Tags
Annotators
URL
-
- Mar 2022
-
-
Can we get hacked by visiting an infected website? Unfortunately, we can always be hacked when visiting an infected website. Due to the existence of a number of vulnerabilities on the web, visiting websites has always been dangerous over the years. Moreover, with the advent of JavaScript, infecting with a malicious virus became easier.
-
- Jun 2020
-
-
Wyróżniamy 2 podstawowe metody wykrywania malware(można mówić o większej ilości, jednak na potrzeby przybliżenia podstaw wspomnę tylko o dwóch):
2 ways antiviruses detect malware:
- Signature-Based Detection - based on signatures (known byte sequences) updated continuously. For example, the method deletes software immediately after it's downloaded
- Heuristic and Behavioral-Based Detection - based on malware's "behaviour" (each of its instructions)
-
- May 2020
-
www.google.com www.google.com
Tags
Annotators
URL
-
-
-
I do not understand what is the threat model of not allowing the root user to configure Firefox, since malware could just replace the entire Firefox binary.
-
- Apr 2020
-
www.charliechurchmouse.com www.charliechurchmouse.com
-
Guaranteed Spyware Free
Tags
Annotators
URL
-
- Mar 2020
-
-
Advertisements are often injected with malware.
-
- Feb 2020
-
en.wikipedia.org en.wikipedia.org
-
With version 6.1.4, the Foxit installer was bundled with potentially unwanted programs like OpenCandy which installed the browser-hijacking malware Conduit.[11][12] Following complaints from users, it was removed after version 6.2.1.[13] In July 2014, the Internet Storm Center reported that the mobile version for iPhone was transmitting unencrypted telemetry and other data to remote servers located in China despite users attempting to opt out of such data collection.[14]
-
- Jun 2016
-
www.onthewire.io www.onthewire.io
-
Short primer on ransomware and defenses.
-