Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label News. Show all posts

Game Emulation: Keeping Classic Games Alive Despite Legal Hurdles

 For retro gaming fans, playing classic video games from decades past is a dream, but it’s tough to do legally. This is where game emulation comes in — a way to recreate old consoles in software, letting people play vintage games on modern devices. Despite opposition from big game companies, emulation developers put in years of work to make these games playable. 

Game emulators work by reading game files, called ROMs, and creating a digital version of the console they were designed for. Riley Testut, creator of the Delta emulator, says it’s like opening an image file: the ROM is the data, and the emulator brings it to life with visuals and sound. 

Testut and his team spent years refining Delta, even adding new features like online multiplayer for Nintendo DS games. Some consoles are easy to emulate, while others are a challenge. Older systems like the Game Boy are simpler, but emulating a PlayStation requires recreating multiple processors and intricate hardware functions. Developers use tools like OpenGL or Vulkan to help with complex 3D graphics, especially on mobile devices. 

Emulators like Emudeck, popular on the Steam Deck, make it easy to access multiple games in one place. For those wanting an even more authentic experience, FPGA hardware emulation mimics old consoles precisely, though it’s costly. While game companies often frown on ROMs, some, like Xbox, use emulation to re-release classic games legally. 

However, legal questions remain, and complex licensing issues keep many games out of reach. Despite these challenges, emulation is thriving, driven by fans and developers who want to preserve gaming history. Though legal issues persist, emulation is vital for keeping classic games alive and accessible to new generations.

Big Tech’s Data-Driven AI: Transparency, Consent, and Your Privacy

In the evolving world of AI, data transparency and user privacy are gaining significant attention as companies rely on massive amounts of information to fuel their AI models. While Big Tech giants need enormous datasets to train their AI systems, legal frameworks increasingly require these firms to clarify what they do with users’ personal data. Today, many major tech players use customer data to train AI models, but the specifics often remain obscure to the average user. 

In some instances, companies operate on an “opt-in” model where data usage requires explicit user consent. In others, it’s “opt-out”—data is used automatically unless the user takes steps to decline, and even this may vary based on regional regulations. For example, Meta’s data-use policies for Facebook and Instagram are “opt-out” only in Europe and Brazil, not the U.S., where laws like California’s Consumer Privacy Act enforce more transparency but allow limited control. 

The industry’s quest for data has led to a “land grab,” as companies race to stockpile information before emerging laws impose stricter guidelines. This data frenzy affects users differently across sectors: consumer platforms like social media often limit users’ choice to restrict data use, while enterprise software clients expect privacy guarantees.  

Controversy around data use has even caused some firms to change course. Adobe, following backlash over potentially using business customer data for training, pledged not to employ it for AI model development. Similarly, Apple has crafted a privacy-first architecture for its AI, promising on-device processing whenever possible and, when necessary, private cloud storage. Microsoft’s AI, including its Copilot+ features, has faced scrutiny as well. 

Privacy concerns delayed some features, prompting the company to refine how data like screenshots and app usage are managed. OpenAI, a leader in generative AI, offers varied data-use policies for free and paid users, giving businesses greater control over data than typical consumers.

Researchers Develop Blockchain-Based Federated Learning Model to Boost IoT Security

 

In a groundbreaking development for Internet of Things (IoT) security, a team of researchers led by Wei Wang has introduced a novel distributed federated intrusion detection system. The study, published in Frontiers of Computer Science and co-published by Higher Education Press and Springer Nature, addresses key challenges in protecting IoT networks from sophisticated cyber-attacks. IoT devices have long been vulnerable to cyber intrusions, and traditional, centralized models of training detection algorithms often come with risks, including high communication costs and potential privacy leaks. 

They also struggle to identify new, unknown types of attacks. The research team’s new approach aims to overcome these issues by using federated learning, a decentralized method where data is processed locally rather than on a central server. 
This approach enhances privacy and minimizes communication expenses. To strengthen the security of their detection model, the team integrated a blockchain-based architecture into the federated learning system. 

In this setup, all participating entities conduct model training on their devices and upload only the model parameters to the blockchain. This design creates a secure, distributed environment for collaborative model verification. A proof-of-stake consensus mechanism is implemented, ensuring that only trustworthy entities contribute to the training process, effectively blocking out malicious participants. 

A unique aspect of this method is its ability to detect unknown attack types. Each device in the system uses an end-to-end clustering algorithm that relies on spatial-temporal data differences to identify new types of intrusions. Tests conducted on the AWID dataset showed that this model outperforms previous detection techniques, offering enhanced security and accuracy in identifying novel threats. The research team views this development as a significant step toward more secure IoT networks. 

“The integration of blockchain with federated learning brings a new level of security and adaptability to intrusion detection,” the team noted. 

Looking ahead, the researchers plan to focus on refining the model’s efficiency to support real-time detection needs in IoT systems. This study highlights the potential of blockchain-based federated learning as a robust defense against cyber threats in the expanding IoT ecosystem.

FakeCall Malware for Android Escalates Threat, Hijacks Outgoing Bank Calls

 

A newly evolved version of the FakeCall malware, a dangerous Android banking trojan, has been discovered hijacking users’ outgoing calls to their financial institutions, redirecting them to phone numbers controlled by attackers. The malware, first identified by Kaspersky in April 2022, focuses on voice phishing (vishing) scams, tricking victims into revealing sensitive banking information. 

The trojan presents a fake call interface that closely mimics Android’s default dialer, convincing victims they are communicating with legitimate bank representatives. 

This makes it challenging for users to discern the deception. When attempting to call their bank, the malware secretly redirects the call to attackers, who impersonate bank officials to steal personal information and money from accounts. A new report from Zimperium reveals that the latest FakeCall variant further enhances its capabilities. 

By tricking users into setting it as the default call handler during installation, the malware gains the ability to intercept both incoming and outgoing calls. In addition, the malware manipulates the Android user interface to show the bank’s actual phone number while connecting the victim to a scammer, deepening the illusion of legitimacy. The updated malware also adds new, though still developing, functionalities. 

It now uses Android’s Accessibility Service to simulate user actions, control the dialer interface, and automatically grant itself permissions. FakeCall’s operators have also introduced a Bluetooth listener and a screen state monitor, indicating ongoing development toward more advanced attack methods. Additional commands integrated into the latest version include capturing live screen content, taking screenshots, and accessing or deleting device images. 

These upgrades demonstrate the malware’s evolving sophistication, as it becomes harder to detect and remove. Security experts recommend avoiding the manual installation of Android apps through APKs, encouraging users to rely on the Google Play Store for app downloads. Though malware can still infiltrate Google Play, the platform’s security measures, such as Google Play Protect, can help identify and remove malicious apps when detected.

India Cracks Down on Cybercrime with Warning Against Illegal Payment Gateways

 

In a sweeping move to combat organized cybercrime, India’s Ministry of Home Affairs (MHA), through the Indian Cybercrime Coordination Center (I4C), has issued a stark warning about illegal payment gateways reportedly run by transnational cyber criminals. These illicit gateways—PeacePay, RTX Pay, PoccoPay, and RPPay—are allegedly being used as conduits for money laundering, utilizing mule bank accounts rented from shell companies and individuals. 

The network is operated by foreign nationals and offers money laundering as a service, allowing criminal organizations to process and disguise illicit funds. Recent nationwide raids by Gujarat (Indian State) and Andhra Pradesh (Indian State) police have uncovered a complex network of digital payment platforms linked to various cybercrimes, the Ministry of Home Affairs announced in a press statement. 

These platforms exploit rented bank accounts—sourced through social media platforms like Telegram and Facebook—that belong to shell entities or individuals. “Current and saving accounts are scouted through social media, primarily from Telegram and Facebook,” the statement said, underlining the role of social media in recruiting mule accounts for illegal activities. 

According to the Cybercrime Coordination Center, these mule accounts are often remotely controlled by overseas operatives who leverage them to process transactions for various fraudulent schemes. These range from fake investment and offshore betting scams to phony stock trading platforms. Once funds are deposited, they are quickly transferred to other accounts, employing bulk payout options provided by banks to obscure the money trail. 

The Coordination Center has urged citizens to avoid renting or selling their bank accounts or company registration documents to these illegal platforms, as involvement with such illicit activities can carry severe legal repercussions, including potential arrest. 

The Center also stressed that banks may enhance their monitoring mechanisms to detect the misuse of bank accounts associated with illegal payment gateways. This crackdown comes as part of India’s broader efforts to secure its digital finance ecosystem amid a rise in cybercrime.

Microsoft Urges Millions to Upgrade as Windows Support Ends, Security Risks Increase

 

Microsoft Windows users are facing increasing security risks as the end of support for older versions of Windows approaches. Recently, Microsoft warned 50 million users of outdated operating systems such as Windows XP, Vista, 7, and 8.1 that they are no longer receiving essential security updates or technical support. 

While these versions still power millions of PCs globally, Microsoft has advised users to upgrade to newer systems, specifically Windows 11, for better security. As Microsoft stated, “Devices running an unsupported version of Windows will still function,” but they won’t receive “technical support of any issue, software updates, [or, more critically] security updates or fixes.” 

The warning also extends to the 900 million users of Windows 10. Microsoft will cease support for this version in October 2025, leaving users vulnerable to cyberattacks unless they upgrade. Although Windows 10 users have another year before the security updates stop, Microsoft is urging them to consider transitioning to Windows 11. 

However, one of the main hurdles is that many older PCs are not compatible with Windows 11, requiring users to buy new hardware. Microsoft is promoting the purchase of new computers and the use of its cloud service, OneDrive, to facilitate the upgrade to Windows 11. However, many users are resistant to upgrading due to the costs and the lack of a secondary market to sell their outdated PCs. 

As a result, the adoption of Windows 11 has been slow, and there are concerns about how Microsoft will handle the transition when support for Windows 10 ends. The tech giant has made it clear that running an unsupported version of Windows leaves users vulnerable to cyberattacks, viruses, and spyware. 

Despite monthly security alerts and updates for current Windows versions, the risk for users on unsupported systems continues to grow. With Microsoft’s recommendation to upgrade sooner rather than later, millions of users will need to make crucial decisions about their computer systems as the 2025 deadline approaches.

Google Begins Testing Verified Checkmarks for Websites in Search Results

 

Google has started testing a new feature in its search results that adds a blue checkmark next to certain websites, aiming to enhance user security while browsing. As of now, this experiment is limited to a small number of users and websites, with the checkmarks appearing next to well-known companies such as Microsoft, Meta, and Apple. The blue checkmark serves as an indicator that the website is verified by Google. 

When users hover over the checkmark, a message explains, “This icon is being shown because Google’s signals suggest that this business is the business that it says it is.” However, Google clarifies that this verification does not guarantee the full reliability of the website, meaning users should still exercise caution. 

This feature resembles Google’s previous initiative, the BIMI (Brand Indicators for Message Identification) system, introduced in Gmail in 2023. BIMI uses blue markers to verify the authenticity of email senders, ensuring that businesses sending emails are legitimate and own the domains and logos they use. 

The goal of BIMI was to combat phishing and other malicious activities by allowing users to quickly identify verified businesses. While the checkmark feature is currently only being tested with a select group of users and websites, it has the potential to be expanded in the future. 

If widely implemented, it could help users easily identify trusted websites directly from search results, offering an extra level of safety when browsing the internet. Although it is unclear when or if Google plans to roll out the feature to all users, a company spokesperson confirmed that the test is underway. 

This new experiment could be a step towards making the internet a safer space, particularly as users grow more concerned about online threats such as phishing and scams. For now, Google is monitoring the test to assess its effectiveness before deciding on a broader launch.