Blog

Archive for the ‘cybercrime/malcode’ category

Feb 3, 2019

Rogue Bitcoin-Funded Biohacker Wants to Gene-Hack Designer Babies

Posted by in categories: bitcoin, cybercrime/malcode

Is it ethical?

Read more

Feb 1, 2019

Israeli cyberexpert detects China hack in Ottawa, warns against using Huawei 5G

Posted by in categories: business, cybercrime/malcode, engineering, government, internet

OTTAWA — A Chinese telecommunication company secretly diverted Canadian internet traffic to China, particularly from Rogers subscribers in the Ottawa area, says an Israeli cybersecurity specialist.

The 2016 incident involved the surreptitious rerouting of the internet data of Rogers customers in and around Canada’s capital by China Telecom, a state-owned internet service provider that has two legally operating “points of presence” on Canadian soil, said Yuval Shavitt, an electrical-engineering expert at Tel Aviv University.

Shavitt told The Canadian Press that the China Telecom example should serve as a caution to the Canadian government not to do business with another Chinese telecommunications giant: Huawei Technologies, which is vying to build Canada’s next-generation 5G wireless communications networks.

Continue reading “Israeli cyberexpert detects China hack in Ottawa, warns against using Huawei 5G” »

Feb 1, 2019

Meet the Bots That Review and Write Snippets of Facebook’s Code

Posted by in categories: cybercrime/malcode, employment, engineering, robotics/AI

To make its developers’ jobs more rewarding, Facebook is now using two automated tools called Sapienz and SapFix to find and repair low-level bugs in its mobile apps. Sapienz runs the apps through many tests to figure out which actions will cause it to crash. Then, SapFix recommends a fix to developers, who review it and decide whether to accept the fix, come up with their own, or ignore the problem.

Engineers began using Sapienz to review the Facebook app in September 2017, and have gradually begun using it for the rest of the company’s apps (which include Messenger, Instagram, Facebook Lite, and Workplace). In May, the team will describe its more recent adoption of SapFix at the International Conference on Software Engineering in Montreal, Canada (and they’re hiring).

Continue reading “Meet the Bots That Review and Write Snippets of Facebook’s Code” »

Jan 29, 2019

Mayhem, the Machine That Finds Software Vulnerabilities, Then Patches Them

Posted by in categories: business, cybercrime/malcode, robotics/AI

Bug and vulnerability hunting is a big business and the need for it is getting larger and larger. Up until this point, the majority of work had been from people. Either as hackers discovered holes and released exploits or as companies paid people to do the testing.


The machine triumphed in DARPA’s Cyber Grand Challenge, where teams automated white-hat hacking.

Read more

Jan 24, 2019

For Industrial Robots, Hacking Risks Are On the Rise

Posted by in categories: biotech/medical, cybercrime/malcode, employment, engineering, internet, robotics/AI

In the future, industrial robots may create jobs, boost productivity and spur higher wages. But one thing seems more certain for now: They’re vulnerable to hackers.

Factories, hospitals and other big robot users often lack sufficient levels of defense against a digital attack, according to cybersecurity experts, robot manufacturers and engineering researchers. The risk levels are rising as more robots morph from being offline and isolated to being internet-connected machines, often working alongside humans.


5G promises to make factories a lot smarter. And that means they’ll be a lot more vulnerable.

Continue reading “For Industrial Robots, Hacking Risks Are On the Rise” »

Jan 19, 2019

Tissue Engineers Hack Life’s Code for 3D Folded Shapes

Posted by in category: cybercrime/malcode

Mechanical tension between tethered cells cues developing tissues to fold. Researchers can now program synthetic tissue to make coils, cubes and rippling plates.

Read more

Jan 18, 2019

Blockchain: 6 Key Ethical Considerations

Posted by in categories: bitcoin, computing, cryptocurrencies, cybercrime/malcode, disruptive technology, employment, ethics, hacking, information science

Blockchain shows major potential to drive positive change across a wide range of industries. Like any disruptive technology, there are ethical considerations that must be identified, discussed, and mitigated as we adopt and apply this technology, so that we can maximize the positive benefits, and minimize the negative side effects.

Own Your Data

For decades we have sought the ability for data subjects to own and control their data. Sadly, with massive proliferation of centralized database silos and the sensitive personal information they contain, we have fallen far short of data subjects having access to, let alone owning or controlling their data. Blockchain has the potential to enable data subjects to access their data, review and amend it, see reports of who else has accessed it, give consent or opt-in / opt-out of data sharing, and even request they be forgotten and their information be deleted.

Monetize Your Data

Continue reading “Blockchain: 6 Key Ethical Considerations” »

Jan 17, 2019

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

Posted by in category: cybercrime/malcode

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1” is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique passwords exposed.

The breach was first reported by Troy Hunt, the security researcher who runs the site Have I Been Pwned (HIBP), where you can check if your email has been compromised in a data breach. In his blog, Hunt says a large file of 12,000 separate files and 87GB of data had been uploaded to MEGA, a popular cloud service. The data was then posted to a popular hacking forum and appears to be an amalgamation of over 2,000 databases. The troubling thing is the databases contain “dehashed” passwords, which means the methods used to scramble those passwords into unreadable strings has been cracked, fully exposing the passwords.

Read more

Jan 8, 2019

How AI is Working to Crush Financial Fraud

Posted by in categories: cybercrime/malcode, economics, finance, robotics/AI

#MachineLearning and #ArtificialIntelligence are revolutionising the online world. They are capable of reducing costs, analysing data, recognising patterns and trends we can’t see with the human eye and making real- time decisions. Now, they are being used to help prevent financial fraud and they’re learning how to do it better every day.


Machine learning and artificial intelligence are revolutionising the online world. They are capable of reducing costs, analysing data, recognising patterns and trends we can’t see with the human eye and making real-time decisions. Now, they are being used to help prevent financial fraud and they’re learning how to do it better every day.

Currently it is estimated that cybercrime costs the global economy approximately $600 billion, with one of the most common forms being credit card fraud which has grown considerably with the increase in the online market. As more and more people chose to transact online it is becoming increasingly important for financial services to invest in better, faster and more accurate fraud detection and prevention techniques.

Continue reading “How AI is Working to Crush Financial Fraud” »

Jan 4, 2019

Cyberconflict: Why the Worst Is Yet to Come | NYT News

Posted by in categories: cybercrime/malcode, military

Cyberconflicts are, right now, at this very moment, like the first military aeroplanes of 1909. Within decades, planes destroyed entire cities. So when we talk about cyber weapons, we’re still basically in 1909.


Despite the devastation cyberweapons have caused around the world over the last decade, they are still in their infancy. David E. Sanger, a New York Times national security correspondent, explains why the threat is growing.

Continue reading “Cyberconflict: Why the Worst Is Yet to Come | NYT News” »

Page 1 of 4712345678Last