Tag Archive for: method

Hackers Use Old But Devious Method To Steal User Data From Browsers


Everyone has heard about computer viruses and malware. But most of the users don’t understand what they are and how they work. However, this doesn’t mean that hackers do not try to improve their techniques and get from your computers as much as possible. In this regard, Microsoft was talking about a new malware threat recently. The SolarMarker is a new kind of malware. But it uses an old but devious method to implant its code onto victims’ computers.

Hackers in Windows 10

The method Microsoft security experts were talking about is “SEO poisoning.” As the Redmond-based company explains, it involves “stuffing” thousands of PDF documents with SEO keywords and links which start a cascade of redirections that eventually leads the unsuspecting user to malware. “The attack works by using PDF documents designed to rank on search results,” Microsoft Security Intelligence explained on Twitter in recent days. “To achieve this, attackers padded these documents with >10 pages of keywords on a wide range of topics, from ‘insurance form’ and ‘acceptance of contract’ to ‘how to join in SQL’ and ‘math answers.’”

The attackers have been previously using Google sites to host those infected PDF files. But now, the hackers began using Amazon Web Services and Strikingly for this goal.

How Does SolarMarker Steal User Data?

Below, you can find eSentire’s explanation of how the process works.

Business professionals are “being lured to hacker-controlled websites, hosted on Google Sites, and inadvertently installing a known, emerging Remote Access Trojan (RAT) … The attack starts with the potential victim performing a search for business forms such as invoices, questionnaires, and receipts.” The campaign, eSentire continues, lays out traps using Google search redirection, and once the RAT has been activated on a victim’s computer, “the threat actors can send commands and upload additional malware to the infected system,” including ransomware.

As said, the malware we are talking about is known as SolarMarker. In fact, it is a backdoor malware that can steal data and credentials from browsers. The first recommendation to protect your data is to make sure you’re…

Source…

GBT filed a Patent Application Covering a Commercial Method and Software Application Empowered by AI Technology



Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.


SAN DIEGO, April 27, 2021 (GLOBE NEWSWIRE) — GBT Technologies Inc. (OTC PINK: GTCH) (“GBT” or the “Company”) filed a provisional patent for a commercial method and software empowered by its AI technology with U.S. Patent and Trademark Office (“USPTO”). The invention is targeting a wide variety of advertising and marketing applications and intended for all types of common media such as newspapers, magazines, publications, software, mobile apps, or any type of textual and graphical based material. The method and computer software may also be used on web sites using any Internet browser interface.

The method and software input is textual and/or graphical context in any standard format to produce an output with advertisement and marketing information symbols to attract potential customers attention. The produced material can include LOGOs, symbols, icons and other type of commercial oriented objects. Using the described invention within content of media, introduces a novel method to theoretically increase revenue due to a broader exposure to a marketing and advertising content. The system is targeted to be managed via GBT’s Artificial Intelligence algorithms for scanning a given text/graphics, identifying topics of interest within its context, and assigning commercial oriented objects as methods of advertisement and marketing. The AI engine is also capable of working via NLP (Natural Language Processing) to produce the desired results. The assigned application number is 63177669 and the filing date is April 21, 2021.  The Company is planned to file a nonprovisional application during the next few months.

“As part of our ongoing research and development activities we are filing a patent to protect another possible application for our AI technology, this time in the advertisement and marketing domains. The filed invention describes an innovative method and computer software that we believe has a potential to increase commercial exposure for products or services. It can be used for broad advertisement and marketing campaigns within common types of media like newspapers, magazines,…

Source…

Mobile ID Varying The Method To Access Office


If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organizations up and down the country.

By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years.

There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward.

Mobile ID systems

As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points, and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021?

But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular?

Eradicating outdated legacy credentials

Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential

Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography.

All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way…

Source…

Alumni brothers pioneer groundbreaking method of cybersecurity – Vanderbilt University News

Alumni brothers pioneer groundbreaking method of cybersecurity  Vanderbilt University News
“cyber warfare news” – read more