Sun.Aug 05, 2018

article thumbnail

ZombieBoy, a new Monero miner that allows to earnĀ $1,000 on a monthly basis

Security Affairs

A security researcher discovered a new crypto mining worm dubbed ZombieBoy that leverages several exploits to evade detection. The security researcher James Quinn has spotted a new strain of crypto mining worm dubbed ZombieBoy that appears to be very profitable and leverages several exploits to evade detection. The expert called this new malware ZombieBoy because it uses a tool called ZombieBoyTools to drop the first dll, it uses some exploits to spread.

Mining 60
article thumbnail

How to Stay Safe on Public Wi-Fi

WIRED Threat Level

Connecting to a public Wi-Fi network can put you at risk. Here's how to minimize the damage.

Risk 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quantifying the impact of the Twitter fake accounts purge - a technical analysis

Elie

This post provides an overview of the impact of the Twitter 2018 accounts purge through the lens of its impact on 16k of Twitterā€™s most popular accounts.

IT 48
article thumbnail

Tech Support Scams improved with adoption of Call Optimization Service

Security Affairs

Security experts from Symantec are warning of tech support scams abusing Call Optimization Services to insert phone numbers. Crooks are improving their tech support scams by using Call Optimization Services that are commonly used in legitimate call center operations to perform: Tracking the source of inbound calls. Creation and management of phone numbers.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. Itā€™s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CyberSecurity Hall of Fame

Adam Shostack

Congratulations to the 2016 winners ! Dan Geer, Chief Information Security Officer at In-Q-Tel; Lance J. Hoffman, Distinguished Research Professor of Computer Science, The George Washington University; Horst Feistel, Cryptographer and Inventor of the United States Data Encryption Standard (DES); Paul Karger, High Assurance Architect, Prolific Writer and Creative Inventor; Butler Lampson, Adjunct Professor at MIT, Turing Award and Draper Prize winner; Leonard J.

More Trending

article thumbnail

Quantifying the impact of the Twitter fake accounts purge - a technical analysis

Elie

This post provides an overview of the impact of the Twitter 2018 accounts purge through the lens of its impact on 16k of Twitterā€™s most popular accounts. Overall, we found that on average, popular accounts lost 2.8 percent of their followers bases due to the purge. In terms of raw numbers, this represents a collective loss of over half a billion followers (546M).

IT 90
article thumbnail

Quantifying the impact of the Twitter fake accounts purge - a technical analysis

Elie

This post provides an overview of the impact of the Twitter 2018 accounts purge through the lens of its impact on 16k of Twitterā€™s most popular accounts. Overall, we found that on average, popular accounts lost 2.8 percent of their followers bases due to the purge. In terms of raw numbers, this represents a collective loss of over half a billion followers (546M).

IT 90