article thumbnail

Russian cybercrime forums launch contests for cryptocurrency hacks

Security Affairs

. “Over the past month, operators of one of the top Russian-language cybercrime forums have been running a “contest,” calling for the community to submit papers that examine how to target cryptocurrency-related technology.” “The contest is also an example of how cybercriminals can be more nimble than defenders.

Paper 136
article thumbnail

LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk

eSecurity Planet

The LemonDuck malware that for the past couple of years has been known for its cryptocurrency mining and botnet capabilities is evolving into a much broader threat, moving into new areas of cyber attacks, targeting both Linux and Microsoft systems and expanding its geographical reach, according to security researchers with Microsoft.

Risk 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against machine learning — an overview

Elie

This can be used, for example, to steal stock market prediction models and spam filtering models, in order to use them or be able to optimize more efficiently against such models. This post explores each of these classes of attack in turn, providing concrete examples and discussing potential mitigation techniques. adversarial examples.

Mining 107
article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

For example, a spinned summarization model outputs positive summaries of any text that mentions the name of some individual or organization. Systems like GPT-3 will make it easy for those AIs to mine previous conversations and related Internet content and to appear knowledgeable.

Mining 95
article thumbnail

Attacks against machine learning — an overview

Elie

This can be used, for example, to steal stock market prediction models and spam filtering models, in order to use them or be able to optimize more efficiently against such models. This post explores each of these classes of attack in turn, providing concrete examples and discussing potential mitigation techniques. adversarial examples.

Mining 91
article thumbnail

Application modernization overview

IBM Big Data Hub

Many are addressing this via building accelerators that could be customized for enterprise consumption that helps accelerate specific areas of modernization and one such example from IBM is IBM Consulting Cloud Accelerators. We will explore key areas of acceleration with an example in this article.

Cloud 100
article thumbnail

Illegal Content and the Blockchain

Schneier on Security

There’s the Bitcoin logo, and the original paper describing Bitcoin by its alleged founder, the pseudonymous Satoshi Nakamoto. Most Bitcoin mining happens in China. Just like the botnet example, it may be that these do not threaten existing power structures enough to warrant takedowns.