Tag Archive for: Sneak

A sneak preview of the first ever international Nuclear Security Training and Demonstration Centre (NSTDC) and the training activities planned to start in October 2023 was given today during a side event held at the margins of the 67th IAEA General Conference


A sneak preview of the first ever international Nuclear Security Training and Demonstration Centre (NSTDC) and the training activities planned to start in October 2023 was given today during a side event held at the margins of the 67th IAEA General Conference.  

Lydie Evrard, IAEA Deputy Director General and Head of the Department of Nuclear Safety and Security, highlighted the unique nature of the new IAEA facility, noting that “the NSTDC is built to respond to growing requests by countries for capacity building in the field of nuclear security that could not be met elsewhere.”  

“The IAEA has developed a training programme that will complement the existing national and international mechanisms of nuclear security capacity building,” said in her remarks.  

The NSTDC is housed in a new multipurpose building (MPB) located at the IAEA’s laboratories in Seibersdorf, 30 km south of Vienna, Austria. The MPB construction work started in July 2021, after the Director General of the IAEA, Rafael Mariano Grossi, broke ground for the new facility

Under the NSTDC training programme, there are currently 23 training courses and workshops. All of them address training needs in the area of physical protection of nuclear and other radioactive material and associated facilities; and in the area of detection and response to criminal or intentional unauthorized acts involving or directed at nuclear or other radioactive material, associated facilities or associated activities.  

Considering the IAEA work for cancer care, the NSTDC training programme includes a course for countries anticipating in or planning to join the Rays of Hope titled “Introduction to life cycle security of radioactive material and associated facilities in cancer care”. The course aims to familiarize participants with key considerations towards ensuring life cycle security and sustainability of radioactive material and associated facilities used for cancer care, including information and computer security aspects of nuclear security. 

“The NSTDC is a modern, specialized training facility, supported by state-of-the-art technical infrastructure,” said Marina Labyntseva, Head of the Education and…

Source…

‘Billion Dollar Heist’ sneak peek: ‘We’ve had ransomware attacks’


Watch an exclusive clip about the the growing threat of cybercrime

Video Transcript

We’ve had Stuxnet, blowing up the Natanz centrifuge plant. We’ve had ransomware attacks, which hit the Eastern seaboard. There was no gas to the Eastern seaboard for a whole week in the United States. We had Russia against the Ukraine shutting out the power in the middle of winter.

We’re talking about people losing their lives. We’ve also had cyber attacks that potentially affected the US elections. We had the health care system in the UK brought down. Dialysis machines no longer working.

This is an extremely fragile situation. Much more fragile than the period of detente because so many more countries have these weapons. Malware is much more difficult to control than nuclear weapons.

People always warn me of the cyber Pearl Harbor, the cyber 9/11, but it’s almost worse than that. Every day, there are thousands of cyber attacks. And we’re just getting more and more and more inured to them. It’s like a plague.

I think we’ll see much more hostile cyber activity, much more cyber bank robberies, much more cyber espionage. We’ll see much more cyber war. In many ways, I think we’ve seen nothing yet.

Does attacks increase in their sophistication and their range, then the impact can be ever greater. There is a cyber attack on critical national infrastructure coming to a place near you within the next 5 to 10 years.

Source…

Hackers found a new way to sneak malware into your computer using Minecraft updates — here’s how you can stay safe


  • Minecraft, FIFA, Far Cry and Call of Duty top of the list of game titles hackers use to distribute malware.
  • Malware is used to gather login credentials, credit card details and more.
  • Below, check out simple steps that can be used to stay safe.

The video game industry has become one of the biggest beneficiaries of the pandemic as millions of people picked up the habit of playing video games to escape the isolation and boredom of the COVID-19 lockdowns.

Since then, the gaming industry has been expanding rapidly, and the number of video game-related cyberthreats and attacks has significantly risen in recent months, research has revealed.

A new report from
Kaspersky suggests that popular games like Minecraft are used as bait by cybercriminals, from phishing scams to malware downloads. Based on stats collected by the security firm between July 2021 and July 2022, Minecraft- related files accounted for roughly 25% of malicious files, followed by FIFA (11%), Roblox (9.5%), Far Cry (9.4%) and Call of Duty (9%).

Other game titles were also spotted with a notable percentage of abuse, Grand Theft Auto, Need for Speed, and The Sims.

Minecraft also topped the list of mobile malware threats, as the game was used as a lure for 40% of detected incidents, followed by FIFA (5%), Roblox (10%), PUBG (10%) and GTA (15%).

However, as per the Kaspersky report, the total number of malicious and unwanted files related to Minecraft decreased by 36% compared to the previous year (131,005 against 184,887).

Trojan-PSW — Game over

When downloading the games from untrustworthy sources, unwanted malicious files and software get downloaded automatically that can gather sensitive information like data login information or passwords. Further, in an attempt to download games for free and find mods or cheats, gamers tend to lose money or their account.

The Kaspersky report reveals hackers use Trojan-PSW (Password Stealing Ware) malware which gathers user credentials, Trojan-Banker, which steals payment data; and Trojan-Game Thief, which collects login information from gaming accounts.

From July 1, 2021, to June 30, 2022, the Kaspersky security solution detected that 6,491 users were affected by 3,705…

Source…

Hackers can now sneak malware into the GIFs you share


How low will malware go to get onto your device? We thought using Minecraft to gain access to your computer was the most nefarious method hackers have produced, but there’s a new, even lower type of attack that uses Microsoft Teams and GIFs to mount phishing attacks on your computer.

The new attack is called GIFShell and it installs malware on your computer to steal data. It does so by sneaking itself into innocent-looking GIFs and then waiting for you to share the GIF with your colleagues via Microsoft Teams.

A video call in progress on Microsoft Teams.

The problem was discovered by cybersecurity expert Bobby Rauch, who shared his findings exclusively with Bleeping Computers. This new GIF attack exploits multiple vulnerabilities in Microsoft Teams to create a chain of command executions.

The only thing the attackers need is a way to get into Microsoft Teams in the first place, and they have settled on one of everyone’s favorite web items: GIFs. The attacks include malicious code in base64 encoded GIFs. They then use Microsoft’s own web infrastructure to unpack the commands and install them directly on your computer.

Microsoft Teams is fairly secure and has multiple levels of protection against malicious file sharing. However, GIFs are usually benign, and people love sharing them. They’re the perfect conduit for attacks.

The files can spoof your computer into opening Windows programs such as Excel. It can then send data back to its originator by tricking Windows into connecting to a remote server.

Rauch disclosed his findings to Microsoft in May 2022, but the company has yet to fix the flaws. Microsoft told Bleeping Computers the GIF attacks “do not meet the bar for an urgent security fix.”

The best thing you can do for now is to not open any GIFs someone may share with you on Teams. We’ll keep an eye on this story and let you know when, and if, Microsoft gets around to fixing the vulnerability.

Editors’ Recommendations




Source…