Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 107

Jun 22, 2016

Israel to install its own cyber defenses on F-35 jets

Posted by in categories: cybercrime/malcode, military

IAF seeking approval to increase number of jets from 33 to 50, with a view of eventually having 75 aircraft.

Read more

Jun 13, 2016

New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second

Posted by in categories: cybercrime/malcode, internet, quantum physics

The things you learn on the DarkWeb. Wonder what will happen when more and more countries and folks onboard to the Quantum Internet, etc. Could we see one last massive apocalyptic raid on accounts, etc.?


X5 simplifies the process of stealing details from contactless debit cards, cloning fake debit cards.

A criminal group going under the name of The CC Buddies is selling a hi-tech device on the Dark Web that’s capable of copying details from contactless debit cards if held as close as eight centimeters away from a victim’s card.

Continue reading “New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second” »

Jun 13, 2016

India-US-China : US – Cyber And Bilateral Visits – Analysis

Posted by in categories: cybercrime/malcode, economics, government, quantum physics

Boy; wait until next month with China’s Quantum Launch.


By Munish Sharma.

Cyber has been one of the key discussion items during both Prime Minister Modi’s just concluded visit to the United States and President Xi Jinping’s visit to the US some nine months back. After Xi’s visit, China and the US signed a Cyber Agreement in October 2015. India and the US will ink a cyber agreement in the next sixty days. Notwithstanding these similarities, the intent of and expectations from these two agreements are fundamentally different; the former is an attempt to manage insecurity and the latter is a quest for security. An analysis of the joint statements issued at the end of the Modi and Xi visits to the US highlights the contrasting differences in India and China’s bilateral ties with the United States in the cyber realm.

Continue reading “India-US-China : US – Cyber And Bilateral Visits – Analysis” »

Jun 13, 2016

Breakthrough technology to improve cyber security

Posted by in categories: cybercrime/malcode, engineering, particle physics, quantum physics

Another article on Quantum Security; this time from Sydney (generating single photons to make communications and information secured).


With enough computing effort most contemporary security systems will be broken. But a research team at the University of Sydney has made a major breakthrough in generating single photons (light particles), as carriers of quantum information in security systems.

The collaboration involving physicists at the Centre for Ultrahigh bandwidth Devices for Optical Systems (CUDOS), an ARC Centre of Excellence headquartered in the School of Physics, and electrical engineers from the School of Electrical and Information Engineering, has been published in Nature Communications.

The team’s work resolved a key issue holding back the development of password exchange which can only be broken by violating the laws of physics. Photons are generated in a pair, and detecting one indicates the existence of the other. This allows scientists to manage the timing of photon events so that they always arrive at the time they are expected.

Continue reading “Breakthrough technology to improve cyber security” »

Jun 12, 2016

Nick Bostrom: ‘We are like small children playing with a bomb’

Posted by in categories: climatology, cybercrime/malcode, engineering, robotics/AI, sustainability

Some truth to this if the engineering team and designers are not reflective of the broader world population. Good example, is the super race research of the Nazis and attempts to make it happen. Today, AI in the hands of a N. Korea for example could be bad for the world. However, the larger threat that I see with AI is still the hacking of AI, and stolen AI by criminals to use against society.


Sentient machines are a greater threat to human existence than climate change, according to the Oxford philosopher Nick Bostrom.

Read more

Jun 11, 2016

Singapore is turning off the internet in drastic plan to bolster cybersecurity

Posted by in categories: cybercrime/malcode, government, internet, quantum physics, satellites

Wow and just in time for China’s Quantum Satellite launch next month.


News about this “extreme” decision has drawn ire from many Singaporeans who have criticised the government’s decision on social media.

But, in a surprise move, the Singaporean government has resorted to limiting the Internet access for government work stations for over a year for security reasons. The system of “No internet” for public servants should be more clear-cut, experts say.

Continue reading “Singapore is turning off the internet in drastic plan to bolster cybersecurity” »

Jun 7, 2016

IARPA exploring deceptive cyber defenses

Posted by in categories: cybercrime/malcode, neuroscience

The intelligence community’s research arm is looking for information on techniques that use deception and misinformation to protect data and systems from cyberattacks.

Read more

Jun 7, 2016

China plans to set up global quantum communications network

Posted by in categories: cybercrime/malcode, quantum physics, satellites

China is getting their new Quantum communications infrastructure being prepped for deployment and adoption. Next month, the Quantum Satellite is launched to enable wireless communication that is secured and can block hacking; and we know what the reverse means for everyone else.

Now, China has unveiled that they have been planning and getting their cities ready for Quantum communications/ network adoption.


China leads the world in quantum communications.

Continue reading “China plans to set up global quantum communications network” »

Jun 7, 2016

Lo and Behold, Reveries of the Connected World: Movie Trailer

Posted by in categories: business, cybercrime/malcode, education, Elon Musk, health, internet, space travel

Legendary master filmmaker Werner Herzog examines the past, present and constantly evolving future of the Internet in Lo and Behold: Reveries of the Connected World. Working with NETSCOUT, a world leader in-real time service assurance and cybersecurity, which came aboard as a producer and led him into a new world, Herzog conducted original interviews with cyberspace pioneers and prophets such as PayPal and Tesla co-founder Elon Musk, Internet protocol inventor Bob Kahn, and famed hacker Kevin Mitnick. These provocative conversatons reveal the ways in which the online world has transformed how virtually everything in the real world works, from business to education, space travel to healthcare, and the very heart of how we conduct our personal relationships.

Read more

May 31, 2016

North Korean Facebook clone spotted; hacked shortly

Posted by in categories: computing, cybercrime/malcode

According to Mirror Online, the youngster is studying computing at college.

This gave the 18-year-old full control over the site, including the ability to “delete and suspend users, change the site’s name, censor certain words and manage the eventual ads”, as well as being able to “see everyone’s emails”.

Go to starcon.net.kp and you’ll find a very familiar looking website.

Continue reading “North Korean Facebook clone spotted; hacked shortly” »