Research questions potentially dangerous implications of Ukraine’s IT Army

Volunteer hacking efforts could unwittingly pull countries or private companies into a murky geopolitical mess, a researcher says.

The post Research questions potentially dangerous implications of Ukraine’s IT Army appeared first on CyberScoop.

Continue reading Research questions potentially dangerous implications of Ukraine’s IT Army

Zelenskyy deepfake crude, but still might be a harbinger of dangers ahead

A deepfake video of Ukrainian President Volodymyr Zelenskyy was quickly removed from Meta’s platform, but experts called it worrisome nonetheless.

The post Zelenskyy deepfake crude, but still might be a harbinger of dangers ahead appeared first on CyberScoop.

Continue reading Zelenskyy deepfake crude, but still might be a harbinger of dangers ahead

Remove RandomLocker Ransomware – Restore .rand Files

This article provides information about the ransomware dubbed RandomLocker as well as a step-by-step guide that provides removal and data recovery help. RandomLocker ransomware is a new threat that compromises computer systems in order to encrypt sensi… Continue reading Remove RandomLocker Ransomware – Restore .rand Files

Follow the Bouncing Ball of Entropy

When [::vtol::] wants to generate random numbers he doesn’t simply type rand() into his Arduino IDE, no, he builds a piece of art. It all starts with a knob, presumably connected to a potentiometer, which sets a frequency. An Arduino UNO takes the reading and generates a tone for an upward-facing speaker. A tiny ball bounces on that speaker where it occasionally collides with a piezoelectric element. The intervals between collisions become our sufficiently random number.

The generated number travels up the Rube Goldberg-esque machine to an LCD mounted at the top where a word, corresponding to our generated number, …read more

Continue reading Follow the Bouncing Ball of Entropy

Study: Zero days rediscovered much faster

New research from Harvard suggests that the freshly discovered software flaws called zero day vulnerabilities are independently rediscovered much faster than previously thought. The rediscovery rate has big implications for U.S. cybersecurity policy because it would change the calculation officials make when deciding whether to reveal zero days discovered by U.S. agencies so they can be fixed, or keep them secret so they can be used to spy on foreign adversaries and in other cyber-operations. “If the rediscovery rate is this high, the number of vulnerabilities [secretly retained] for operational use should be lower or subject to more aggressive scrutiny,” said Trey Herr a post-doctoral fellow at the Belfer Center at Harvard. Herr, along with security guru Bruce Schneier and Christopher Morris, a research assistant from the Harvard school of engineering, published their findings this week after a lengthy peer-review process, and will present them at the Black Hat USA conference in Las Vegas next week. […]

The post Study: Zero days rediscovered much faster appeared first on Cyberscoop.

Continue reading Study: Zero days rediscovered much faster

Report: International nonprofit would ease work of cyber-attribution

Identifying the perpetrators of cyberattacks and other malicious online activities is tough. Aside from the purely technical difficulties, would-be attributors also must deal with a skeptical public that is suspicious of official pronouncements and wary about misinformation — even from democratic governments. That being the case, concludes a new study, what’s needed is an international nongovernmental body consisting of technical, policy and legal experts that could conduct independent investigations into cyber-incidents and publish their results. The study was published Friday by the RAND Corp., a think tank with historic ties to the U.S. military. “We see this as a first step,” the study’s lead author, RAND Senior Information Scientist John Davis, told CyberScoop. “Personally, I hope this work continues.” The study was financed by Microsoft, whose President Brad Smith called in February for a “Digital Geneva Convention.” Last year, in a policy paper, the company called for an intergovernmental body — modeled on the International […]

The post Report: International nonprofit would ease work of cyber-attribution appeared first on Cyberscoop.

Continue reading Report: International nonprofit would ease work of cyber-attribution

Study: Hoarded zero days last seven years and are rarely discovered

Newly discovered software vulnerabilities known as zero days, if kept secret by the people that find them, tend to stay that way for years and years because there is only about a 1 in 20 chance annually that a hoarded zero day will be independently found by someone else, according to research published Thursday. A RAND Corp. study and statistical analysis of a rare collection of more than 200 zero days — so-called because the manufacturer has “zero days” to fix the security hole — upends much of the conventional wisdom about vulnerability disclosure and the hoarding of knowledge about software flaws. The study — the first-ever published research to examine a dataset including zero day vulnerabilities still undisclosed to the public — comes at a time when the U.S. government’s process for deciding whether or not to disclose such vulnerabilities is facing calls for reform because of WikiLeaks’ dump of an apparent trove of CIA hacking tools […]

The post Study: Hoarded zero days last seven years and are rarely discovered appeared first on Cyberscoop.

Continue reading Study: Hoarded zero days last seven years and are rarely discovered

Ask Hackaday: DIY Handwriting Recognition

Computer handwriting recognition is very cool by itself, and it’s something that we’d like to incorporate into a project. So we went digging for hacker solutions, and along the way came up with an interesting bit of history and some great algorithms. We feel like we’ve got a good start on that front, but we’re stuck on the hardware tablet sensor itself. So in this Ask Hackaday, we’re going to make the case for why you could be using a tablet-like device for capturing user input or doing handwriting recognition, and then we’re going to ask if you know …read more

Continue reading Ask Hackaday: DIY Handwriting Recognition