Blog

Archive for the ‘cybercrime/malcode’ category

Nov 20, 2014

Has the flawed password system finally had its day?

Posted by in categories: computing, cybercrime/malcode, encryption, privacy

— BBC

woman thinking in from of password graphic

Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess.

Yet we still forget them. And they also get stolen with alarming frequency.

Continue reading “Has the flawed password system finally had its day?” »


Sep 12, 2014

Celebgate Could Inspire More Bitcoin Blackmail

Posted by in categories: bitcoin, cybercrime/malcode

Caleb Chen — Cryptocoinsnews

bitcoin hacker blackmail

The Celebgate incident is still unfolding, and we are already seeing mainstream media report on the connection between the “nude celebrity photos” and Bitcoin. The original leaker of the pictures returned to 4chan recently to respond to the uproar he had caused. An excerpt from his post highlights Bitcoin’s involvement in Celebgate:

People wanted **** for free. Sure, I got $120 with my bitcoin address, but when you consider how much time was put into acquiring this stuff (i’m not the hacker, just a collector), and the money (i paid a lot via Bitcoin as well to get certain sets when this stuff was being privately traded Friday/Saturday) I really didn’t get close to what I was hoping.

Continue reading “Celebgate Could Inspire More Bitcoin Blackmail” »


Sep 7, 2014

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

Posted by in category: cybercrime/malcode

By  — Wired

icloud-hack-tools-inline

As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

Read more

Aug 28, 2014

Don’t Get Hacked at Black Hat and DefCon

Posted by in category: cybercrime/malcode

By Neil J. Rubenking — PC
Black Hat 2014 Venue
The trainings component of the 2014 Black Hat USA conference in Las Vegas has already begun. Press folk aren’t invited for trainings, but SecurityWatch will be there to cover the briefings Wednesday and Thursday. The briefings can be shocking. In past years, researchers revealed a technique to pwn any iOS device using a gimmicked charger, described a technique for mining your Twitter feed to create convincing phishing emails, and demonstrated an Android weakness that would allow hackers to Trojanize an Android app undetectably. And those were all part of the relatively sedate Black Hat; things get even hairier at the wild and woolly DefCon that follows.

The world’s best hackers flock to these conferences, people who live and breathe security and hacking. They don’t stop trying to hack all the things just because they’re at a conference. In fact, DefCon features a “Wall of Sheep” to publicly shame any attendees careless enough to get hacked. If you’re attending, you’ll want to crank up your paranoia and be as careful as possible.

Read more

Apr 24, 2014

Parables involving the Theft of Knowledge

Posted by in categories: cybercrime/malcode, philosophy, security, transhumanism

From CLUBOF.INFO

All religions have points of agreement concerning human toil and its relationship to the divine. This essay considers some of the Biblical and Hellenic parables of human origin, specifically the origins of human knowledge and instrumentality.

Here I want to present how knowledge and instrumentality are reported to originate with an act of mischief, specifically the theft of a divine artifact. My argument is that, although the possession of knowledge may be seen as a sin to be atoned for, the kind of atonement originally promoted may have simply been for us to apply our knowledge constructively in our lives. The concept of atoning for original sin (whether it is the Biblical or Hellenic sin) can then be justified with secular arguments. Everyone can agree that we retain the capacity for knowledge, and this means our atonement for the reported theft of such knowledge would simply rest with the use of the very same tool we reportedly stole.

The story of the titan Prometheus, from ancient Greek mythology, has been interpreted and reinterpreted many times. A great deal of writers and organizations have laid claim to the symbolism of Prometheus, including in modern times. [1] I would argue that too many writers diluted and over-explored the meaning of the parable by comparing everything to it, although this is not the focus of my essay. Greek mythology is notably weak on the subject of “good and evil” because it predates the Judeo-Christian propagation of their dualism, and this means most of the characters in Greek mythology can be defended or condemned without violating Hellenic theology. Prometheus as a mythic figure could be condemned from a Christian standpoint, because he seems strikingly similar to other scriptural characters engaged in a revolt against the divine. Yet the spirit of Prometheus and his theft has also been endorsed by people and organizations, such as the transhumanists who see him as an expression of the noblest human aspirations. [2]

Continue reading “Parables involving the Theft of Knowledge” »


Apr 22, 2014

Could Mind-reading Technology Become Harmful?

Posted by in categories: counterterrorism, cybercrime/malcode, ethics, government, law enforcement, neuroscience, security, singularity, transhumanism

From CLUBOF.INFO

The increasing detail at which human brains can be scanned is bringing the possibility of mind-reading appliances closer and closer. Such appliances, when complete, will be non-invasive and capable of responding to our thoughts as easily as they respond to keys on a keyboard. Indeed, as emphasized in the Lifeboat Foundation’s 2013 publication, The Human Race to the Future, there may soon be appliances that are operated by thought alone, and such technology may even replace our keyboards.
It is not premature to be concerned about possible negative outcomes from this, however positive the improvement in people’s lifestyles would be. In mind-reading appliances, there are two possible dangers that become immediately obvious.

Danger 1: “Thought police”

Brain-machine interfaces have many possibilities that deserve to be explored by science. However, there are also potentially dystopian threats presented by this technology. Even technologies like personal computers, which were seen as liberating to the individual and not aligned with powerful governments, have also become windows that regimes can use to spy on their citizens.

Continue reading “Could Mind-reading Technology Become Harmful?” »


Apr 1, 2014

The White Swan’s Beyond Eureka and Sputnik Moments! [TREATISE EXCERPT] By Mr. Andres Agostini at www.AMAZON.com/author/agostini

Posted by in categories: 3D printing, aging, alien life, astronomy, augmented reality, automation, big data, biological, bionic, bioprinting, biotech/medical, business, chemistry, climatology, complex systems, computing, cosmology, counterterrorism, cybercrime/malcode, cyborg, defense, disruptive technology, driverless cars, drones, economics, education, energy, engineering, environmental, ethics, evolution, existential risks, exoskeleton, finance, food, futurism, genetics, geopolitics, government, habitats, hardware, health, homo sapiens, human trajectories, information science, innovation, internet, law, law enforcement, life extension, lifeboat, medical, military, mobile phones, nanotechnology, neuroscience, open access, open source, philosophy, physics, policy, posthumanism, privacy, robotics/AI, science, scientific freedom, security, singularity, space, supercomputing, surveillance, sustainability, transhumanism, transparency, transportation

The White Swan’s Beyond Eureka and Sputnik Moments: How To Fundamentally Cope With Corporate Litmus Tests and With The Permanent Impact of the Dramatic Highly Improbable And Succeed and Prevail Through Transformative and Integrative Risk Management! [TREATISE EXCERPT]. By © Copyright 2013, 2014 Mr. Andres Agostini — All Rights Reserved Worldwide — « www.linkedin.com/in/andresagostini AND www.AMAZON.com/author/agostini » — The Lifeboat Foundation Global Chief Consulting Officer and Partner, Lifeboat Foundation Worldwide Ambassador —

(An Independent, Solemn, Most-Thorough and Copyrighted Answer. Independence, solemnity, thoroughness, completeness, detail, granularity of details, accuracy and rigor, hereunder, will be then redefined by several orders of nonlinear magnitude and without a fail).

[TREATISE EXCERPT].

To Nora, my mother, who rendered me with the definitiveness to seek the thoughts and seek the forethoughts to outsmart any impending demand and other developments. To Francisco, my father: No one who has taught me better. There is no one I regard most highly. It is my greatest fortune to be his son. He endowed me with the Agostini family’s charter, “…Study and, when grown up, you will neither be the tyrants’ toy, nor the passions’ servile slave…” I never enjoyed a “…Mom…”, but considerably enjoyed a gargantuan courageous Mother, Father, Grandparents and Forbears.

Continue reading “The White Swan's Beyond Eureka and Sputnik Moments! [TREATISE EXCERPT] By Mr. Andres Agostini at www.AMAZON.com/author/agostini” »


Mar 20, 2014

The Future of Space-Age Risk Management: Transformative and Integrative Risk Management! By Mr. Andres Agostini [BOOK]

Posted by in categories: automation, big data, business, complex systems, computing, counterterrorism, cybercrime/malcode, disruptive technology, economics, education, engineering, ethics, existential risks, finance, futurism, innovation, lifeboat, physics, science, scientific freedom, security, singularity

The Future of Space-Age Risk Management: Transformative and Integrative Risk Management! [BOOK] By © Copyright 2014 Mr. Andres Agostini (AA) ─ All Rights Reserved Worldwide ─ « www.linkedin.com/in/andresagostini »

(An Independent, Solemn, Most Thorough and Copyrighted Answer. Thoroughness, hereunder, will be then redefined by several orders of magnitude and without a fail).

NasaAndy

What is a White Swan?

Continue reading “The Future of Space-Age Risk Management: Transformative and Integrative Risk Management! By Mr. Andres Agostini [BOOK]” »


Mar 14, 2014

Bitcoin “vault” Xapo offers solution to theft and a tiny nest egg upon signup

Posted by in categories: bitcoin, cybercrime/malcode

By - GigaOM

Coin image adapted from Flickr user Antana

One of the reason bitcoins get so much attention is because people keep stealing them. Every week it seems that another “secure” wallet service gets plundered by tech-savvy thieves.

That’s one of the appeals of Xapo, a startup that just received a $20 million investment to build out its secure, insured “vault” for bitcoins.

Read more

Feb 20, 2014

DARPA Helps Cadets, Midshipmen Prep for Cyber Mission

Posted by in categories: counterterrorism, cybercrime/malcode, defense, information science, military, security

By Cheryl Pellerin — American Forces Press Service

WASHINGTON, Feb. 14, 2014 – During a winter weekend in Pittsburgh, more than 50 cadets and midshipmen from three service academies sat elbow to elbow at nine round tables in a packed room. They’d been training since November to compete in a pilot program of the Defense Advanced Research Projects Agency called the Service Academy Cyber Stakes.
 
Competitors at the Jan. 30-Feb. 2 event ranged from freshmen to seniors, 18 to 24 years old, from the U.S. Military Academy in West Point, N.Y., the U.S. Naval Academy in Annapolis, Md., and the U.S. Air Force Academy in Colorado Springs, Colo.

DARPA officials said the Defense Department must train 4,000 cybersecurity experts by 2017. Meeting that goal requires building a pipeline for training and education, especially for future officers who will oversee protection of the cyber domain. DARPA had two requirements for the competition: impact to the warfighter and innovation.

Read more

Page 1 of 41234