Advanced Computing in the Age of AI | Thursday, March 28, 2024

cyber attack

Hackers Target Chip Makers

Another indication of the strategic importance of the foundational semiconductor industry is a recent surge in cyberattacks directed at global chip manufacturers. Security researchers in Taiwan reported earlier this ...Full Article

Russian Malware Targets Linux, US Warns

The Russians are coming, again, this time with new malware targeting Linux systems, according to a U.S. advisory issued this week. The FBI and the U.S. National Security Agency ...Full Article

DARPA Stress Tests its Hardware-Centric Security Approach

The Defense Advanced Research Projects Agency launched a cyber security effort several years back designed to replace commonly used security patches for software applications with the ability to spot ...Full Article

COVID-19 Contact Tracing Apps Attracting Hackers

As contact tracing ramps up for exposure to COVID-19, so too are concerns about data privacy and whether phony tracing apps will expand opportunities for attackers preying on citizens ...Full Article

Shift to AI Tools Doesn’t Guarantee Secure IT

AI and machine learning tools enlisted to bolster the security of enterprise infrastructure are ubiquitous. Still, a vendor survey reveals a persistent gap between deployment and working knowledge about ...Full Article

Fending off AI Armageddon: Threats to Our Data, Our Safety, Our Country

Bruce Schneier is scary smart. The things he talks about – AI weaponization, remote hacking of commercial airliners and self-driving cars, malicious alteration of medical records – are scarier. ...Full Article

Researcher: Few Financial Incentives to Invest on Cybersecurity

You may have noticed that big retailers like Target, the target of a massive security breach, have finally gotten around to installing new "point of sales" terminals. Moreover, your ...Full Article

The Day the Networks Died: Attack or Glitch for NYSE, United?

The New York Stock Exchange (NYSE) resumed trading at 3:13 pm EST today, after an "internal technical issue" suspended operations for almost four hours. Only three days after HackingTeam ...Full Article

How to Avoid Being a Hacker Victim

Following in the wake of the recently publicized attacks on government databases and systems, all CIOs and chief security officers should assume their own organizations could be next and ...Full Article

Can CIP Compliance Stymie a Cyber Attack?

<img src="http://media2.hpcwire.com/dmr/uspowergrid.gif" alt="" width="95" height="57" />In the wake of the destruction caused by Hurricane Sandy, it's not difficult to imagine the damage that's possible when the power grid is ...Full Article
EnterpriseAI