Tech
As long as the cybercriminals’ business model works, companies are vulnerable to attack

When cybercriminals targeted the UK nursery chain Kido, it represented a disturbing new low for the hackers. They threatened to expose personal data about young children and their families, shocking parents and cybersecurity experts alike.
The Kido hack is far from an isolated incident. Cyberattacks have struck organizations across many sectors in the last year, disrupting businesses from retail to manufacturing.
These recurring attacks highlight an important reality—cybercrime has become a very profitable activity. While the official advice is not to pay hackers, the frequency of these attacks suggests that many companies do. They will want to avoid losing their data or having their business and reputation damaged. But most will never admit to paying up.
Whenever there is money involved, more criminals want to participate—which has led to cybercrime becoming an organized industry. Cybercrime has shifted from individual and uncoordinated group attacks to an established business model that generates revenue and mirrors genuine companies.
This model has its own supply chains, affiliates (for example, criminals who use the malware rather than developing it) and even customer support.
The cybercrime ecosystem has evolved to run using the “as-a-service” model. For legitimate businesses, this is an efficiency model that lets them pay to use something “as a service,” rather than purchasing it. Just as businesses use software or security as a service, criminals have mirrored this model into a similar underground economy of cybercrime.
In this underground market, hackers sell ready-made malware, rent out botnets (networks of infected devices), and run payment platforms. They even go as far as providing customer support and help pages for the criminals they serve.
Their customers may shop for ransomware as a service when looking to extort ransoms from victims. Others, looking to cause disruption rather than financial gain, rent botnets to conduct “denial of service” attacks that flood the victim’s systems with traffic and disable them.
In the cybercrime economy, criminals known as “initial access brokers” act as middlemen. These are skilled cybercriminals who break into systems, providing the initial access and selling it as a package for others to use.
The packages often include stolen data, usernames and passwords, or even direct access to compromised networks. This essentially opens the door for cybercriminals with fewer skills to compromise businesses.
Business is booming
This business model is not only thriving right now—it will also persist. That’s just simple economics—everyone involved in the “business” benefits. This includes the experienced hackers and malware developers who take their cut, the brokers selling bundled services and the service-hosting and payment-platform providers taking their share. It also includes the affiliate criminals carrying out attacks and collecting their profits.
This makes it low-risk and profitable, effectively the definition of a successful business. Societal attitudes towards hackers often glamorize them as genius outsiders, while hacking itself—particularly when large corporations are the target—can mistakenly be seen as a lesser crime.
But the truth is that when the cybercrime business model succeeds, it has a lasting impact on the wider economy. Trust in businesses in the UK and beyond is damaged.
The attacks on UK retailers such as M&S and Co-op were carried out using a cybercrime service called DragonForce. This is available for a fee, reportedly set at 20% of the ransom payment. In the case of M&S and Co-op, it caused major disruption to their operations, and millions of pounds in losses.
Meanwhile, the attack on the Jaguar Land Rover (JLR) caused production at the carmaker to be halted for weeks, resulting in a huge loss.
The JLR attack caused a ripple effect on sales, deliveries, the workforce and smaller businesses in the supply chain. These companies may face bankruptcy if proceeds from the loan underwritten by the government do not reach them all.
To interrupt this recurrence of attacks, it’s vital to break the cybercriminals’ model by addressing the two fundamentals that make it successful.
First, businesses should stop paying the criminals. As long as they pay, criminals will try their luck. But it is reported that nearly 50% of companies do pay up. This is money that will fuel this crime and encourage the hackers.
Second, companies must build better resilience into their infrastructure and operations. While companies’ security has improved greatly, they are still not investing enough in things such as AI to improve their resilience to attack and their ability to keep operating (or at least to minimize disruption).
This was evident in the attacks on UK businesses. It took M&S four months to restore all of its services, while JLR’s production will not be at full capacity for several weeks.
Both Harrods and Co-op maintained operations during their incidents. This minimized interruptions, prevented large data losses and reduced the financial hit to the businesses.
There are no quick fixes, but there are steps businesses can take to make cybercrime less profitable for criminals and less disruptive for victims. The UK government is heading in the right direction with the Cyber Security and Resilience Bill and its consultations on ransomware payments.
But the real change must come from companies themselves. Without commitment, the strongest policy and legislation will remain words on paper. While prevention remains critical for a company, resilience if the worst happens is what really decides how much damage an attack can cause.
If companies can maintain operations and refuse to pay ransoms, cybercriminals lose their extortion power. And without that power there will be less profit and so less interest. But maybe most importantly, fewer families like those affected by the Kido attack will worry about their children’s data being held hostage.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Citation:
As long as the cybercriminals’ business model works, companies are vulnerable to attack (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-cybercriminals-business-companies-vulnerable.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
Flash Joule heating lights up lithium extraction from ores

A new one‑step, water‑, acid‑, and alkali‑free method for extracting high‑purity lithium from spodumene ore has the potential to transform critical metal processing and enhance renewable energy supply chains. The study is published in Science Advances.
As the demand for lithium continues to rise, particularly for use in electric cars, smartphones and power storage, current extraction methods are struggling to keep pace. Extracting lithium from salty water is a lengthy process, and traditional methods that use heat and chemicals to extract lithium from rock produce significant amounts of harmful waste.
Researchers led by James Tour, the T.T. and W.F. Chao Professor of Chemistry and professor of materials science and nanoengineering at Rice University, have developed a faster and cleaner method using flash Joule heating (FJH). This technique rapidly heats materials to thousands of degrees within milliseconds and works in conjunction with chlorine gas, exposing the rock to intense heat and chlorine gas, they can quickly convert spodumene ore into usable lithium.
“This method reimagines how to harvest lithium from its most abundant ore, spodumene, a material that is abundant in the U.S.,” said Tour, co‑corresponding author of the study. “We can leapfrog monthslong water evaporation pools and dayslong acid leaching and then directly generate lithium chloride.”
Hypothesis, experiments and the novelty of approach
Guided by thermodynamic calculations, the researchers exposed α‑spodumene, a naturally occurring hard‑rock lithium mineral, to FJH and chlorine gas. This one‑step process eliminates the need for the traditional multistep acid roasting method, allowing lithium to be extracted directly as lithium chloride.
With a flash of electrical current, the mineral shifted from its stable α‑phase to the high temperature‑accessed β‑phase, making lithium available for reaction with chlorine gas. The lithium then vaporized as lithium chloride, while aluminum and silicon compounds were left behind. All of this was complete within seconds.
“Present techniques rely on multistep, chemically intensive treatments,” said study co‑corresponding author Yufeng Zhao, an associate professor of physics at Corban University and visiting professor at Rice. “The unique aspect of this method is the combination of rapid, uniform heating and favorable thermodynamics, which together enable practical and selective extraction.”

Traditional methods, from acid roasting to brine evaporation, simply weren’t designed for ultrafast separation, said Shichen Xu, the first author of the study and a postdoctoral researcher at Rice.
“Our controlled, rapid‑heating approach overcomes kinetic barriers that have hindered single‑step extraction for decades,” Xu said.
Findings and broader significance
The researchers achieved nearly instantaneous lithium extraction from spodumene, producing lithium chloride with 97% purity and 94% recovery, significantly outperforming traditional methods that can take days to months.
“This method paves the way for local, small‑footprint lithium processing units or large‑scale units for massive waste mining operations,” said Justin Sharp, co‑first author and research assistant. “It’s a real paradigm shift. We can now envision battery‑grade lithium production without acids, without large waste outputs and without waiting weeks.”
Additionally, a startup from Tour’s lab, Flash Metals U.S., is already scaling this technology for metals extraction from waste.
“They would be able to rapidly implement this method into their production line once their pilot plant begins operation early next year,” Sharp said.
Environmentally, the elimination of acid and alkali significantly reduces waste burden. Economically, shorter processing times and simpler infrastructure could lower costs and decentralize lithium supply. Academically, the work demonstrates the rapid, acid‑free extraction of lithium from natural ore, raising possibilities for applying FJH and chlorine gas to other strategic minerals.
Co‑authors of the study include Rice’s Alex Lathem, Qiming Liu, Lucas Eddy, Weiqiang Chen, Karla Silva, Shihui Chen, Bowen Li, Tengda Si, Jaeho Shin, Chi Hun Choi, Yimo Han, Kai Gong and Boris Yakobson, along with Yufeng Zhao from Corban University.
More information:
Shichen Xu et al, One-step separation of lithium from natural ores in seconds, Science Advances (2025). DOI: 10.1126/sciadv.ady6457
Citation:
Flash Joule heating lights up lithium extraction from ores (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-joule-lithium-ores.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
Scientists develop end-to-end encryption for git services

From large technology corporations to startups, from computer science students to indie developers, using git services is as common as opening a word document is for most of the rest of us. Git services are online repositories, indispensable in the IT industry, that manage and store projects that may contain sensitive information or trade secrets such as emerging artificial intelligence models.
However, this makes git services vulnerable to frequent cybersecurity threats. There is also the risk of malicious code being inserted into existing projects without the developer’s knowledge.
University of Sydney researchers are part of a team that have developed end-to-end encryption that can be deployed to protect git services. The encryption is compatible with existing git platforms such as Github and Bitbucket. When it is deployed, the researchers say, it will align seamlessly for storage and the time it takes for data to be synchronized among devices and git servers.
Initial testing on existing git services and public repositories (data sources available for researchers to test algorithms) has been successful.
“Privacy and security of software code has long been a concern for industry and individual users that rely on git services,” said one of the lead developers Associate Professor Qiang Tang, from the School of Computer Science, Faculty of Engineering. “Just like we want our messages to be private and safe, the IT industry also wants their code to be protected. End-to-end encryption is currently the gold standard to protect data.”
End-to-End encryption works by securing data from start to finish, meaning the data sent is protected from the source to the destination, even if the service platform is hacked. It is currently used in messaging services such as WhatsApp.
The researchers say the threat of security breaches to git services is becoming more commonplace. Earlier in the year cryptocurrency exchange CoinBase was a target. In 2022 Okta had source code stolen.
But Associate Professor Tang says current efforts on git security are not strong enough and with large overheads, which means when a significant amount of computational resources such as processing time, bandwidth, or storage is being used.
The researchers hope to introduce the code to git services for widespread use or intend to make it open source. The results will be presented at the ACM Conference on Computer and Communications Security in October.
Collaborator Moti Yung, distinguished research scientist from Google, said that this was an excellent opportunity to protect the git services system and its users.
“The evolution of computing ecosystems always start with a new utility designed for trusted entities: the internet, the mobile networks, chat apps, and so on.
“Therefore, due to these utilities maturing and expanding, one has then to deal with less trusted and malicious players within the ecosystem. git services, enabling collaborations and version control among participants also started without thoroughly taking care of potential bad players, and the system proposed now is a necessary step to its maturity.”
Creating the security box for the world’s code and the rising demand for end- to-end security online
Imagine git services as a giant word document where countless people can write, edit and update content, but for computer code.
“What makes git services such as Github indispensable is their ability to host a large number of collaborators working on the same coding project at the same time, without losing any efficiency,” said Associate Professor Tang. “However, this advantage is also an obstacle that prevented git services from getting end-to-end encryption.”
When you use a messaging service, the content or text remains relatively unchanged, or the edits will be very minor.
But in GitHub, countless lines of code are being written, edited and updated constantly at a such a rapid rate, standard end-to-end encryption cannot keep up. It would constantly need to refresh to encrypt new versions.
“It’s a balancing act—keep the code safe but not where it impacts the user’s computer so much that it becomes a hindrance,” Tang added.
The research team was able to achieve this balance with a tradeoff—by using only small bits of computational power at a time to significantly reduce the level of communication and storage needed. Specifically, using character-level encryption where only edits are treated as new data to be encrypted and appended (added to an existing data collection). In this way, the pressure on computational resources becomes minimal.
Another way of putting it is if you removed a word from a sentence in a document, the code would recognize that and encrypt the change, instead of encrypting the entire document.
By doing this, it would save a large amount of bandwidth and storage otherwise used on each entire new version of the code.
Co-author Dr. Ya-Nan Li from the University of Sydney said another challenge was to identify the necessary security requirements, which at times could be subtle. For example, when to enable the tracking and public verification of the source of all edits.
“With addressing this issue, it leaves the git server vulnerable to the potential injection of malicious code and sometimes can even directly hinder confidentiality,” said Dr. Li.
More information:
Ya-Nan Li et al, End-to-End Encrypted Git Services, (2025). DOI: 10.1145/3719027.3744815. eprint.iacr.org/2025/1208
Citation:
Scientists develop end-to-end encryption for git services (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-scientists-encryption-git.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
My Favorite Affordable 360 Rotating Pet Camera Is on Sale Right Now

I’ve tested over a dozen pet cameras, and they are not all created equal. A pet camera sets itself apart from a regular indoor security camera with special, pet-related features like treat tossing or interactive two-way audio. Each usually has a subscription service, where you can review pet footage historically and get alerts when things seem amiss, like odd behavior or continuous barking or meowing.
At an already super-affordable price, this Petcube camera has 360 PTZ rotation capabilities (it can not only rotate horizontally, but vertically as well for full coverage), super clear 1080p HD resolution, the ability to digitally zoom eight times, two-way audio to speak and hear your pet, and night vision. It’s already super affordable at its usual $53, but for Amazon Prime Big Deal Days, it’s only $38, a crazy-good price for a pet camera of this caliber.
Although I love (and highly recommend) this camera, the Petcube Cam 360 suffers from one of the pitfalls I have with the rest of the brand’s lineup—the features are seriously limited if you don’t want to pay for Petcube’s upgraded Care plan (which starts at $4 a month). You need to subscribe to get the full benefit of the luxury pet camera; with the plan, you’ll get video storage capabilities, automatic pet detection, and automatic video recording capabilities. The price point for the subscription plan is one of the lowest I’ve seen while testing similar models, and I don’t think I’d be able to go on vacation with peace of mind again without the extra plan. (At less than I spend on a cup of coffee, I find the subscription plan to be really worth it.)
There’s an optional mounting that requires some tools, so setup is a bit tricky. (You’ll want to make sure it’s anchored since it needs to be stable while rotating.) The camera feed rotates smoothly without much lag, and because of the wide fish-eye lens and complete panning abilities, I was able to clearly see more of the room I was monitoring than the majority of other cameras I’ve tested.
There’s a bit of inherent risk when having indoor security cameras in your home, and with the camera’s new privacy mode, you can easily turn off the camera lens for even more security while you’re at home so that it’s not catching anything that you don’t want it to.
Petcube is running deals on most of the cameras from its pet camera line for Amazon’s Prime Big Deal Days, so I’d check its brand page for even more sales.
If you want to save even more on security for your whole house, check out the camera bundles below that are also on a steep discount.
Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.
-
Tech1 week ago
Interrupting encoder training in diffusion models enables more efficient generative AI
-
Sports1 week ago
Transfer rumors, news: Benzema linked with reunion with Mourinho at Benfica
-
Tech1 week ago
More people are using AI in court, not a lawyer. It could cost you money—and your case
-
Fashion1 week ago
The World’s Fashion Business News
-
Tech1 week ago
OpenAI Is Preparing to Launch a Social App for AI-Generated Videos
-
Fashion1 week ago
Pay, human rights and the environment: the OECD puts Shein on notice
-
Business1 week ago
Top stocks to buy today: Stock market recommendations for September 30, 2025 – check list – The Times of India
-
Sports1 week ago
Transfer rumors, news: Xavi keen on Man United if Amorim departs