Distributed-denial-of-service (DDoS) attacks have been ramping up these past few weeks. Reports released at the end of February noted an increasing number of memcached server attacks, which don’t require massive resources and huge botnets like the ones used for the DDoS attacks that made headlines in 2016. Only a few days later, software development platform GitHub was hit with the biggest DDoS attack to date. This site has been targeted before, though nothing compared to the scale of this recent attack. Records show that the attack was a massive 1.35 Tbps, which topped the previous 1.2 Tbps that hit Dyn in 2016.
With the continuing popularity of cryptocurrencies, a Monero (XMR)-miner malware named PyRoMineIoT was recently discovered using remote code execution (RCE) exploit EternalRomance (detection name: TROJ_ETERNALROM.A) to infect and spread to vulnerable machines. Further, infected machines are used to search vulnerable Internet of Things (IoT)devices, and has been seen actively spreading across different countries since April with the most infections in Singapore, Taiwan, Australia, Cote d’ Ivore, and India.
Lee De Forest’s 1907 Audion vacuum tube is widely credited with kickstarting the modern electronics industry in general, but it would take the much smaller, lower-power and cooler transistor to shift it into high gear.
The thermonic triode, a vacuum tube similar to the one pictured, works by using heat to modify the conductive properties of a fillament. In 1880, Thomas Edison discovered that, when a parallel current was applied to the lament circuit, the charge in the hot lament could be amplified, or cut off. Edison used his “thermonic diode” to power the first telegraph stations. The triode added a charged grid that could modify the current.
Cortana, an artificial intelligence-based smart assistant that Microsoft has built into every version of Windows 10, could help attackers unlock your system password.
Researchers have demonstrated how sonic and ultrasonic signals (inaudible to human) can be used to cause physical damage to hard drives just by playing ultrasonic sounds through a target computer’s own built-in speaker or by exploiting a speaker near the targeted device.