News and Analysis

TON Developers Pushed Final Code Updates, Now It’s Up to Community TON Developers Pushed Final Code Updates, Now It’s Up to Community

Telegram Open Network developers have rolled out a few final updates to the source code and will no longer actively participate in the project. The announcements came on May 24th via TON’s test portal page.

Chinese Province Wants to Label Citizens by Their Health Rating Using Data on Their Sleep, Eating, and Exercising Chinese Province Wants to Label Citizens by Their Health Rating Using Data on Their Sleep, Eating, and Exercising

The Chinese province of Hangzhou has proposed that authorities assign a permanent health rating to its residents, which would be based on people’s medical records and lifestyle habits. The move comes after China introduced and successfully deployed a similar QR system amid the coronavirus outbreak in an effort to hinder the further spread of the […]

Kremlin-Backed Hacking Group Targets Power and Water Sector of Germany, Report Kremlin-Backed Hacking Group Targets Power and Water Sector of Germany, Report

A hacking group linked with the Russian government has reportedly carried out a series of attacks on energy, water, and power sectors of Germany, cybersecurity-focused outlet Cyberscoop reported on May 26.

Latest Modification of ComRAT Trojan Targets Gmail Users to Steal Confidential Documents Latest Modification of ComRAT Trojan Targets Gmail Users to Steal Confidential Documents

Researchers from cybersecurity firm ESET have detected a modified version of ComRAT malware, which now targets Gmail users to steal confidential documents. In addition to misappropriation of documents, the trojan collects information about the network, Microsoft Windows configurations, and the Archive Directory groups or users.

Discord-Focused Malware AnarchyGrabber Evolves, Now Attacking Users’ Direct Contacts Discord-Focused Malware AnarchyGrabber Evolves, Now Attacking Users’ Direct Contacts

An updated version of the AnarchyGrabber trojan has begun circulating the Internet posing a threat to the communication app Discord users. The malware is reportedly geared to steal users’ passwords and tokens, disable two-factor authentication (2FA), and even spread the attack on a victim’s contacts, Bleeping Computer reported on May 24.

Quantum Computers Pose Threat to Email Safety, But Solution Is on the Way Quantum Computers Pose Threat to Email Safety, But Solution Is on the Way

With the potential to perform more advanced calculations and create more complex processing networks, quantum computers also pose new risks of compromising the most sophisticated cybersecurity systems.

Zuckerberg Urges EU to Outpace Chinese Model and Push Digital Platforms Regulations Based on Western Sets of Values Zuckerberg Urges EU to Outpace Chinese Model and Push Digital Platforms Regulations Based on Western Sets of Values

Facebook founder Mark Zuckerberg has called on the European Commission (EC) to boost the development and implementation of a framework for the regulation of online platforms to promote Western sets of values and leave the Chinese model behind.

Binance and Coinbase Accused of Insider Trade (Again) Binance and Coinbase Accused of Insider Trade (Again)

Binance and Coinbase, two large crypto exchanges, were accused of facilitating insider trade on Twitter by a researcher from The Block and the CEO of Canadian exchange BullBitcoin. Both exchanges recently listed small-time altcoins that saw a significant price increase days before the official announcement.

Cybercriminals Change Focus From Individual Servers to Enterprise Networks Cybercriminals Change Focus From Individual Servers to Enterprise Networks

Hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.

Zoom Users Fall Victim to Personal Data Stealing Malware, Research Says Zoom Users Fall Victim to Personal Data Stealing Malware, Research Says

Cybercriminals continue to invent new methods to get access to users’ personal information following popular trends in the corporate world. Researchers from Trend Micro have found two new malware files disguised as installers for Zoom, a video communications app that has seen extreme demand from users around the world following the spread of the coronavirus […]

Google to Fight Online Ads That Use Built-In Crypto Mining Scripts

Tech giant Google has begun combating resource-heavy web ads, such as those that mine cryptocurrency, and is planning to launch a dedicated feature on the Chrome browser by the end of summer.

Hackers Can Impersonate Bluetooth Devices to Steal Users’ Personal Data: Is This a Threat to You? Hackers Can Impersonate Bluetooth Devices to Steal Users’ Personal Data: Is This a Threat to You?

A group of cybersecurity researchers has detected a severe security vulnerability in Bluetooth-based communication that can potentially enable bad actors to impersonate any Bluetooth master or slave device.

11){?>