Tag Archive for: Spot

Krishna cops get top spot in performance- The New Indian Express


By Express News Service

VIJAYAWADA:   Krishna district superintendent of police (SP) Siddharth Kaushal said the district police stood first in the State in implementing six Key Performance Indicators (KPIs) in policing, and gave awards to the respective wing heads here on Saturday. 

At a review meeting on key performance indicators, he praised the officials for topping the list.  Addressing the media, Siddharth Kaushalsaid the indicators–Crime and Criminal Tracking Network System (CCTNS), Investigating Tracking System for Sexual Offenses (ITSSO), Inter-Operable Criminal Justice System (ICJS), Mobile Security Device Checker (MSDC), SC/ST investigation tracker operated by AP Crime Investigation Department and e-office–plays a major role in day to day policing, and are widely used by both central and State agencies in prevention and detection of crime. 

Source…

Computer vision can help spot cyber threats with startling accuracy


This article is part of our reviews of AI research papers, a series of posts that explore the latest findings in artificial intelligence.

The last decade’s growing interest in deep learning was triggered by the proven capacity of neural networks in computer vision tasks. If you train a neural network with enough labeled photos of cats and dogs, it will be able to find recurring patterns in each category and classify unseen images with decent accuracy.

What else can you do with an image classifier?

In 2019, a group of cybersecurity researchers wondered if they could treat security threat detection as an image classification problem. Their intuition proved to be well-placed, and they were able to create a machine learning model that could detect malware based on images created from the content of application files. A year later, the same technique was used to develop a machine learning system that detects phishing websites.

The combination of binary visualization and machine learning is a powerful technique that can provide new solutions to old problems. It is showing promise in cybersecurity, but it could also be applied to other domains.

Detecting malware with deep learning

The traditional way to detect malware is to search files for known signatures of malicious payloads. Malware detectors maintain a database of virus definitions which include opcode sequences or code snippets, and they search new files for the presence of these signatures. Unfortunately, malware developers can easily circumvent such detection methods using different techniques such as obfuscating their code or using polymorphism techniques to mutate their code at runtime.

Dynamic analysis tools try to detect malicious behavior during runtime, but they are slow and require the setup of a sandbox environment to test suspicious programs.

In recent years, researchers have also tried a range of machine learning techniques to detect malware. These ML models have managed to make progress on some of the challenges of malware detection, including code obfuscation. But they present new challenges, including the need to learn too many features and a virtual environment to analyze the target samples.

Binary visualization can…

Source…

Kasa Spot 24/7 Recording (KC400) Review


The latest addition to TP-Link’s family of smart home devices, the $44.99 Kasa Spot 24/7 Recording (KC400) camera offers a nice assortment of features including motion and sound detection, person detection, and voice control, all for less than $50. It’s also the most affordable indoor security camera we’ve reviewed that offers 2K footage. It delivered excellent day and night video quality in our tests and is easy to install, making it a good choice if you already own other Kasa devices. If you don’t, you can get more interoperability options as well as pan and tilt functionality with our Editors’ Choice winner, the $51.99 Eufy Indoor Cam 2K Pan & Tilt.

A High-Def Camera in an Unassuming Design

The KC400’s enclosure sports a white finish and has a black camera face. It measures 2.2 by 2.2 by 1.0 inches (HWD) and sits atop a base and mounting arm that provides tilt and swivel adjustments and brings the total height to 3.5 inches. The base can be used as a desktop stand, or it can be attached to a wall using the included mounting hardware. There’s a mini USB power port on the back, along with a speaker, a reset button, and a microSD card slot on the right side. You can store recorded video locally using the card slot, but you’ll have to supply your own media. TP-Link includes a 10-foot USB charging cable, an AC adapter, a quick start guide, and the above-mentioned mounting hardware.

The camera captures 2K (2,560-by-1,440-pixel) video at 15fps, has a 106-degree field of view, and uses five infrared LEDs for black-and-white night vision with a range of up to 30 feet. It has an embedded microphone for two-way audio and a 2.4GHz Wi-Fi radio for connecting to your home network and to the Kasa mobile app. A tiny LED indicator flashes red when the camera is trying to connect to Wi-Fi, flashes green when it’s connected to Wi-Fi, glows solid green when the camera is connected to the cloud, and flashes green and amber during setup.

Kasa Spot 24/7 Recording (KC400)

The KC400 will send push alerts when motion or sound is detected, record the event, and tell you if the motion is caused by a person. As mentioned, you can store the recordings locally on a microSD card, or you can subscribe to a Kasa Care plan and store them in…

Source…

This malware has been rewritten in the Rust programming language to make it harder to spot


Phishing emails claiming to be from a delivery company are being used to deliver a new version of a form of malware which is used to deliver ransomware and other cyber attacks.

Buer malware first emerged in 2019 and is used by cyber criminals to gain a foothold on networks which they can exploit themselves, or to sell that access on to other attackers to deliver their own malware campaigns, most notably, ransomware attacks.

Now cybersecurity researchers at Proofpoint have uncovered a new variant of Buer which is written in an entirely different coding language to the original malware. It’s unusual for malware to be completely changed in this way, but it helps the new campaigns remain undetected in attacks against Windows systems.

The original Buer was written in C programming language, while the new variant is written in Rust programming language – leading researchers to name the new variant RustyBuer. “Rewriting the malware in Rust enables the threat actor to better evade existing Buer detection capabilities,” said Proofpoint.

RustyBuer is commonly delivered via phishing emails designed to look as if they come from delivery company DHL, asking the user to download a Microsoft Word or Excel document which supposedly details information about a scheduled delivery.

SEE: Network security policy (TechRepublic Premium)

The delivery is in fact fake, but cyber criminals know that the Covid-19 pandemic has resulted in more people ordering more items online, so messages claiming to be from delivery companies have become a common trick to lure people into opening malicious messages and downloading harmful files.

In this instance, the malicious document asks users to enable macros – by asking them to enable editing – in order to allow the malware to run. The fake delivery notice claims that the user needs to do this because the document is ‘protected’ – even using the logos of several anti-virus providers in an effort to look more legitimate to the victim.

If macros are enabled, the RustyBuer is delivered to the system, providing the attackers with a backdoor into the network and the ability to compromise victims with other…

Source…