signatures

Tech Optimizer
March 19, 2026
Columbia University faced a setback in its patent dispute with Gen Digital Inc. regarding U.S. Patents 8,074,115 and 8,601,322, which relate to an innovative virus detection method developed in the early 2000s. The method involved evaluating the behavior of suspicious code using an emulator and a model of expected behavior derived from data across interconnected computers. Columbia initiated legal proceedings in 2013, and after various developments, a jury awarded Columbia over million in royalties for willful infringement in 2022. However, the Federal Circuit ruled that the patent claims were not sufficiently specific and remanded the case for further examination of whether the claims could constitute an inventive concept. The ruling emphasized that patent eligibility is determined by the precise language of the claims.
AppWizard
March 19, 2026
A virus known as Mamont is targeting users of the messaging platform Max, which has 100 million registered profiles. Mamont infiltrates online banking applications and spreads primarily through family and parental chat groups, allowing cybercriminals to steal payment information. The virus often begins with a deceptive message prompting users to click, leading to the silent download of a Trojan that siphons off data. Despite claims from the Max press service that the virus's spread is exaggerated, concerns remain about the security of user data, particularly given that all communications on Max are monitored by the state. Many users resort to using a second device, referred to as Maxofon, to comply with the platform's requirements while keeping their primary device for other applications.
Tech Optimizer
March 19, 2026
The digital landscape is transforming due to the professionalization of cybercrime, which is now a significant part of organized crime, second only to drug trafficking. Malware includes various types such as viruses, browser hijackers, password stealers, Trojans, botnet malware, and ransomware. Traditional antivirus solutions rely on signature-based detection, heuristic analysis, and behavior monitoring, but these methods can lead to false positives and negatives. The evolution of cybersecurity has seen the rise of "Ransomware-as-a-Service" (RaaS) and the use of polymorphic malware that changes its signature, making traditional defenses ineffective. Hackers are also using AI and machine learning to evade behavioral monitoring. New defense strategies include Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR), which focus on monitoring for breaches rather than preventing them. Leading vendors in this space include CrowdStrike, SentinelOne, Microsoft, and Palo Alto Networks. The zero trust security framework treats all access attempts as potentially hostile and emphasizes the integration of various security technologies. Emerging startups like FinalAV Security are developing zero trust solutions for consumers and small businesses, focusing on prevention rather than detection.
TrendTechie
March 14, 2026
MTS, a major mobile operator in Russia, has reclassified virtual private networks (VPNs) as equivalent to torrent services, imposing a daily fee of up to 87 rubles for users who wish to engage in private browsing. Traffic routed through VPNs will no longer be included in standard service packages, leading to additional charges for accessing blocked resources or securing connections. The new tariff structure charges users based on their region and plan, with fees ranging from 80 to 87 rubles per day for a quota of five gigabytes of specialized traffic. Users can block this service to avoid charges, resulting in the complete unavailability of VPN connections. This policy is seen as a response to pressures for new monetization strategies and aligns with government efforts to limit internet circumvention. The potential for other major telecom operators to adopt similar practices could impact net neutrality in Russia.
Winsage
March 7, 2026
Every Secure Boot-enabled Windows PC relies on cryptographic certificates issued by Microsoft in 2011, embedded in the motherboard's firmware, to ensure a secure boot process. The first of these certificates will expire on June 24, 2026, which will affect the ability to receive future security updates for critical components of the Windows startup process. Microsoft is rolling out replacement certificates through Windows Update, marking a significant security maintenance effort. Secure Boot operates as a chain of trust with certificates stored in the motherboard's UEFI firmware, validating software before the operating system loads. The Platform Key (PK) is at the top of this chain, followed by the Key Exchange Key (KEK) and the Signature Database (DB). The replacement certificates introduced in 2023 restructure certificate management, separating responsibilities among different certificate authorities to enhance the trust model. Not all PCs are affected by the upcoming expiration; newer devices manufactured since 2024 already have the new certificates. Windows 10 users face challenges as support for this version ends in October 2025, and they will not receive the new certificates unless enrolled in Extended Security Updates. Home users should ensure their PCs are set to receive updates automatically, while enterprise environments require coordination for firmware updates before the Windows certificate update.
AppWizard
February 25, 2026
Numo has introduced a tap-to-pay point-of-sale app that allows merchants to accept Bitcoin payments without additional hardware, utilizing the Cashu open-source ecash protocol. The app is available for free as an open-source Android download, with plans for a Google Play Store release. It uses NFC technology for quick transactions, enabling customers to pay via a Cashu wallet interacting with an NFC tag on the merchant's device. Payments are settled in Cashu ecash, which can be automatically transferred to a merchant's Lightning address once a specified balance is reached. Numo also supports Lightning invoices and offers features like inventory management, payment history tracking, offline payment support, and tipping options. The app has no platform fees and is developed under the MIT license, aiming to simplify Bitcoin payments for merchants. Cashu employs blind signatures for privacy-preserving custodial payments and connects independent mints over the Lightning Network.
AppWizard
February 25, 2026
A new Android application called Nearby Glasses, developed by Yves Jeanrenaud, alerts users when smart glasses are nearby by scanning for specific Bluetooth signatures. It is available on the Google Play Store and GitHub, functioning by identifying Bluetooth advertising frames from brands like Meta and Luxottica Group S.p.A. The app aims to address privacy concerns associated with smart glasses, particularly in light of reports about facial recognition technology being integrated into these devices. Jeanrenaud created the app to provide a countermeasure to surveillance technology, though he warns it may generate false positives with other devices that emit similar signals. The market for smart glasses is expanding, with companies like Google, Samsung, and Apple expected to enter the market.
Tech Optimizer
February 24, 2026
A cyber operation is targeting users of Huorong Security antivirus software through a typosquatted domain, huoronga[.]com, which mimics the legitimate site huorong.cn. Users who mistakenly visit the counterfeit site may download a file named BR火绒445[.]zip, which contains a trojanized installer that leads to the installation of ValleyRAT, a remote access trojan. The malware employs various techniques to evade detection, including using an intermediary domain for downloads, creating Windows Defender exclusions, and establishing a scheduled task for persistence. The backdoor facilitates activities such as keylogging and credential access while disguising its operations within legitimate processes like rundll32.exe. Attribution points to the Silver Fox APT group, and there has been a significant increase in ValleyRAT samples documented in recent months. Security measures include ensuring software downloads are from the official site and monitoring for specific malicious activities.
Search