More stories

  • in

    UDP vs TCP: What's the difference?

    Both UDP and TCP are designed for sending and transmitting information. TCP is focused on efficient and reliable data transfers. The TCP protocol establishes a session through handshakes to deliver data successfully. If data packets fail to transfer successfully, they are sent again. TCP will also use packet sequencing, which breaks large volumes of data up into smaller units to ensure that information is sent successfully, receiving confirmation before moving to the next packet. Also: The best web hosting servicesUDP, however, doesn’t stop for confirmation while sending data, nor will it necessarily resend lost packets. The trade-off for a lack of error monitoring is a gain in speed — with some information potentially lost in the process. While TCP requires handshakes between machines and there is delay tolerance, UDP is known as a “fire and forget” protocol. As Red Hat explains:TCP requires a lot of back-and-forth data exchange between sender and target to establish a network connection. Then, even after the connection is established, there’s more back and forth because TCP requires that the sender receive an acknowledgment from the target every time a data packet is sent. This back-and-forth eats up time. UDP has no back-and-forth connection handshake.In other words, TCP focuses on reliable, accurate data transmission, with speed as a trade-off. UDP does the opposite and prioritizes speed, and does not provide a guarantee for packet ordering or transmission. UDP may also be more susceptible to Distributed Denial-of-Service (DDoS) attacks.  Also: Flipper Zero: Geeky toy or serious security tool?While the IETF has now proposed a standard for HTTP/3 over QUIC as a new protocol that can potentially balance both concepts, UDP and TCP are still very much in use worldwide. More

  • in

    People are already trying to get ChatGPT to write malware

    Image: Getty/NurPhoto The ChatGPT AI chatbot has created plenty of excitement in the short time it has been available and now it seems it has been enlisted by some in attempts to help generate malicious code. ChatGPT is an AI-driven natural language processing tool which interacts with users in a human-like, conversational way. Among other […] More

  • in

    This Mac ransomware is old but it could still cause you big problems

    Image: Getty/GaudiLab Ransomware attacks aren’t just a threat to Windows operating systems — they’re encrypting files on macOS devices and demanding ransom payments for a decryption tool, too.  Cybersecurity researchers at Microsoft Security Threat Intelligence have detailed several ransomware campaigns targeting Apple-based computers and networks — and the methods of attack are very familiar to […] More

  • in

    Ransomware decryption tool: Victims of MegaCortex can now unlock their files for free

    Image: Getty Victims of MegaCortex ransomware attacks can now decrypt their files without giving into the ransom demands of cyber criminals, thanks to a free decryption tool that’s been released following collaboration between cybersecurity researchers and police.  The MegaCortex ransomware decryptor was built by cybersecurity analysts at Bitdefender in cooperation with Europol, the No More […] More

  • in

    I went hands-on with Motorola's ThinkPhone and it's surprisingly good

    The ThinkPhone, in itself, looks and feels like a premium smartphone that should last you years. June Wan/ZDNET CES is home to many things, but smartphones are usually an afterthought. Most companies often hold their releases for Mobile World Congress (MWC) in February, and then there are the likes of Samsung and Google who schedule […] More

  • in

    Now this password-stealing Android malware wants to grab your bank details too

    Image: Getty Images/Crispin la valiente A prolific and powerful form of Android malware has switched its attention to online banking applications, using abilities including keylogging to steal usernames and passwords for bank accounts, social media profiles and more.  Detailed by researchers at cybersecurity company ThreatFabric, the Android malware is part of the SpyNote family, a […] More