‘Insidious and sick’ Fruitfly malware has been spying on Mac users via their computer’s camera for YEARS

A type of malware that has infected hundreds of Macs remained undetected for years

FruitFly malware uses the Mac’s camera to spy on users and log what is happening on screen.

A security firm called Malwarebytes discovered FruitFly earlier this year, but researchers have since found a new strand of it hiding under a slightly different code.

Scroll down for video

FruitFly uses the computer's camera to spy on users and logs what is happening on screen - and it's been infecting computers for years (stock image)

FruitFly uses the computer’s camera to spy on users and logs what is happening on screen – and it’s been infecting computers for years (stock image)

FRUITFLY

FruitFly uses the computer’s camera to spy on users and captures key strokes and what is happening on screen – and it’s been infecting computers for years.

There are multiple strains of FruitFly which rely on different codes, making it particularly hard to detect.

According to security firm Synack, there are around 400 computers known to be infected with FruitFly and likely to be many more.

Although they are not sure when the bug first came around, researchers have found it works on the Mac Yosemite operating system – which was released back in October 2014.

According to security firm Synack, there are around 400 computers known to be infected with FruitFly and likely to be many more.

Although they are not sure when the bug first came around, researchers have found it works on the Mac Yosemite operating system – which was released back in October 2014.

‘Mac users are over-confident’, Patrick Wardle, chief security researcher at security firm Synack told CNN.

‘We might not be as careful as we should be on the internet or opening up email attachments’, he said.

Mr Wardle anaylsed the strain for months and then managed to decrypt it to set up a server that intercepted signals from computers that had been infected.

‘Immediately, tons of victims that had been infected with this malware started connecting to me,’ he said.

There are multiple strains of FruitFly which rely on different codes, making it particularly hard to detect.

It is now known how it first got on computers but Mr Wardle does not believe it is part of state espionage.

MacSpy (pictured) allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents

MacSpy (pictured) allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents

MACSPY AND MACRANSOM

In June, Mac users were warned to be vigilant after two separate pieces of malware emerged from the dark web – MacSpy and MacRansom.

MacSpy allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents.

MacRansom worked in a similar manner to the WannaCry software that plagued computer systems around the world, including the NHS, last month.

It encrypted the contents of a user’s computer and threatens to delete all of the information it contains, unless a ransom of 0.25 Bitcoins, around £530 ($684), is paid.

‘I believe its goals were a lot more insidious and sick: spying on people,’ Mr Wardle said

Apple has been contacted for comment.

In June, Mac users were warned to be vigilant after two separate pieces of malware emerged from the dark web.

The tools were specifically developed to allow would-be hackers to takeover Apple’s desktop and laptop machines, and even ransom their data.

They were being given away for free by their creators, who are believed to be professional software engineers.

The two systems were called MacSpy and MacRansom.

MacSpy allowed users to monitor an infected system, capture passwords and other sensitive details through the use of key stroke logging, screenshots and clipboard contents.

MacRansom worked in a similar manner to the WannaCry software that plagued computer systems around the world, including the NHS, last month.

It encrypts the contents of a user’s computer and threatens to delete all of the information it contains, unless a ransom of 0.25 Bitcoins, around £530 ($684), is paid.

[“Source-dailymail”]

Apple is still selling very old and expensive computers – these are the ones you shouldn’t buy

Image result for Apple is still selling very old and expensive computers - these are the ones you shouldn't buy

Apple is still selling you computers with 2013 specs for 2017 price tags.

While these computers will work fine, they have outdated specs that don’t warrant their high price tags. You should steer your wallet well clear of them.

I’ve listed the Apple computers you shouldn’t touch with a 10-foot pole, and added suggestions of computers you should consider instead.

Some of these computers are part of Apple’s recent back-to-school promotion , where you can get a free pair of $300 Beats Solo3 Wireless headphones. Yet, even with the free pair of headphones, some computers aren’t worth your time or money.

[“Source-businessinsider”]

Programmable ions set the stage for general-purpose quantum computers

Quantum computers promise speedy solutions to some difficult problems, but building large-scale, general-purpose quantum devices is a problem fraught with technical challenges.

To date, many research groups have created small but functional quantum computers. By combining a handful of atoms, electrons or superconducting junctions, researchers now regularly demonstrate quantum effects and run simple quantum algorithms — small programs dedicated to solving particular problems.

But these laboratory devices are often hard-wired to run one program or limited to fixed patterns of interactions between the quantum constituents. Making a quantum computer that can run arbitrary algorithms requires the right kind of physical system and a suite of programming tools. Atomic ions, confined by fields from nearby electrodes, are among the most promising platforms for meeting these needs.

In a paper published as the cover story in Nature on August 4, researchers working with Christopher Monroe, a Fellow of the Joint Quantum Institute and the Joint Center for Quantum Information and Computer Science at the University of Maryland, introduced the first fully programmable and reconfigurable quantum computer module. The new device, dubbed a module because of its potential to connect with copies of itself, takes advantage of the unique properties offered by trapped ions to run any algorithm on five quantum bits, or qubits — the fundamental unit of information in a quantum computer.

“For any computer to be useful, the user should not be required to know what’s inside,” Monroe says. “Very few people care what their iPhone is actually doing at the physical level. Our experiment brings high-quality quantum bits up to a higher level of functionality by allowing them to be programmed and reconfigured in software.”

The new module builds on decades of research into trapping and controlling ions. It uses standard techniques but also introduces novel methods for control and measurement. This includes manipulating many ions at once using an array of tightly-focused laser beams, as well as dedicated detection channels that watch for the glow of each ion.

“These are the kinds of discoveries that the NSF Physics Frontiers Centers program is intended to enable,” says Jean Cottam Allen, a program director in the National Science Foundation’s physics division. “This work is at the frontier of quantum computing, and it’s helping to lay a foundation and bring practical quantum computing closer to being a reality.”

The team tested their module on small instances of three problems that quantum computers are known to solve quickly. Having the flexibility to test the module on a variety of problems is a major step forward, says Shantanu Debnath, a graduate student at JQI and the paper’s lead author. “By directly connecting any pair of qubits, we can reconfigure the system to implement any algorithm,” Debnath says. “While it’s just five qubits, we know how to apply the same technique to much larger collections.”

At the module’s heart, though, is something that’s not even quantum: A database stores the best shapes for the laser pulses that drive quantum logic gates, the building blocks of quantum algorithms. Those shapes are calculated ahead of time using a regular computer, and the module uses software to translate an algorithm into the pulses in the database.

Putting the pieces together

Every quantum algorithm consists of three basic ingredients. First, the qubits are prepared in a particular state; second, they undergo a sequence of quantum logic gates; and last, a quantum measurement extracts the algorithm’s output.

The module performs these tasks using different colors of laser light. One color prepares the ions using a technique called optical pumping, in which each qubit is illuminated until it sits in the proper quantum energy state. The same laser helps read out the quantum state of each atomic ion at the end of the process. In between, a separate laser strikes the ions to drive quantum logic gates.

These gates are like the switches and transistors that power ordinary computers. Here, lasers push on the ions and couple their internal qubit information to their motion, allowing any two ions in the module to interact via their strong electrical repulsion. Two ions from across the chain notice each other through this electrical interaction, just as raising and releasing one ball in a Newton’s cradle transfers energy to the other side.

The re-configurability of the laser beams is a key advantage, Debnath says. “By reducing an algorithm into a series of laser pulses that push on the appropriate ions, we can reconfigure the wiring between these qubits from the outside,” he says. “It becomes a software problem, and no other quantum computing architecture has this flexibility.”

To test the module, the team ran three different quantum algorithms, including a demonstration of a Quantum Fourier Transform (QFT), which finds how often a given mathematical function repeats. It is a key piece in Shor’s quantum factoring algorithm, which would break some of the most widely-used security standards on the internet if run on a big enough quantum computer.

Two of the algorithms ran successfully more than 90% of the time, while the QFT topped out at a 70% success rate. The team says that this is due to residual errors in the pulse-shaped gates as well as systematic errors that accumulate over the course of the computation, neither of which appear fundamentally insurmountable. They note that the QFT algorithm requires all possible two-qubit gates and should be among the most complicated quantum calculations.

The team believes that eventually more qubits — perhaps as many as 100 — could be added to their quantum computer module. It is also possible to link separate modules together, either by physically moving the ions or by using photons to carry information between them.

Although the module has only five qubits, its flexibility allows for programming quantum algorithms that have never been run before, Debnath says. The researchers are now looking to run algorithms on a module with more qubits, including the demonstration of quantum error correction routines as part of a project funded by the Intelligence Advanced Research Projects Activity.

 

[Source: Sciencedaily]