Researchers use Intel SGX to put malware beyond the reach of antivirus software
Intel Skylake die shot. (credit: Intel) Researchers have found a way to run malicious code on systems with Intel processors in such a way that the malware can’t be analyzed or identified by antivirus software, using the processor’s own features to protect the bad code. As well as making malware in general harder to examine, bad actors could use this protection to, for example, write ransomware applications that never...
What Happens If Russia Cuts Itself Off From the Internet
State media has reported that Russia will attempt to disconnect from the global internet this spring. That’s going to be tricky.
The Xiaomi M365 Scooter Can Be Hacked to Speed Up or Stop
A hacker can accelerate Xiaomi M365 scooter—or hit the breaks—while a rider is on it.
Venezuela’s BTC Trading Volumes Hit Record Highs as Crypto Regulations Commence
As Venezuela begins regulating cryptocurrency, BTC trading volumes in the country hit record highs on several exchanges. Amid fast-growing crypto adoption, peer-to-peer trading platforms such as Localbitcoins and Paxful have reported significant increases in the number of BTC traded in Venezuela. Also read: Indian Supreme Court Moves Crypto Hearing, Community Calls for Positive Regulations Record BTC Trading Volumes Peer-to-peer...
Report Claims 85% of the Monero Network Dominated by ASIC Miners
Over the last few years, certain cryptocurrency networks have tried to block ASIC mining with many fruitless attempts to forge ASIC-resistant protocols. Multiple cryptocurrency developers have attempted to brick ASIC miners, but with scant success. A perfect example is the privacy-centric digital currency Monero, a project that has tried to fork the software multiple times in order to gain ASIC resistance. Monero developers have once...