A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen millions of dollars from customers of 24 U.S. and Canadian banks.
The new threat has been dubbed GozNym by researchers from IBM X-Force because it combines the stealthy Nymaim malware and the Gozi banking Trojan.
The new computer Trojan targets 22 websites that belong to banks, credit unions and e-commerce platforms based in the U.S., and two that belong to financial institutions from Canada. Business banking services appear to be a top target for GozNym's creators, according to the IBM researchers.
A new wireless chip can perform a feat that could prove quite useful for the next generation of wireless technology: transmitting and receiving signals on the same frequency, at the same time with the help of a single antenna. This approach instantly doubles the data capacity of existing technology though is not yet capable of power levels necessary to operate on traditional mobile networks.
Last year, Harish Krishnaswamy, an electrical engineer at Columbia University demonstrated the ability to transmit and receive signals on the same frequency using two antennas in a full duplex radio that he built. Now, Negar Reiskarimian, a PhD student under Krishnaswamy, has embedded this technology on a chip that could eventually be used in smartphones and tablets. This time, the transmitter and receiver share a single antenna.
Finding bugs in Web applications is an ongoing challenge, but a new tool from MIT exploits some of the idiosyncrasies in the Ruby on Rails programming framework to quickly uncover new ones.
In tests on 50 popular Web applications written using Ruby on Rails, the system found 23 previously undiagnosed security flaws, and it took no more than 64 seconds to analyze any given program.
Ruby on Rails is distinguished from other frameworks because it defines even its most basic operations in libraries. MIT's researchers took advantage of that fact by rewriting those libraries so that the operations defined in them describe their own behavior in a logical language.