Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 160

Mar 3, 2019

Technologies and Startups that Hack Brain

Posted by in categories: cybercrime/malcode, robotics/AI

What they do and how machine learning fits in.

Read more

Feb 19, 2019

Explainer: What is quantum communication?

Posted by in categories: business, cybercrime/malcode, health, quantum physics

Barely a week goes by without reports of some new mega-hack that’s exposed huge amounts of sensitive information, from people’s credit card details and health records to companies’ valuable intellectual property. The threat posed by cyberattacks is forcing governments, militaries, and businesses to explore more secure ways of transmitting information.

Read more

Feb 19, 2019

The open-source movement to hack your arugula

Posted by in categories: cybercrime/malcode, food

95 percent less water circa 2018.


Open-source farming could challenge Big Ag and take crop production to new heights.

Continue reading “The open-source movement to hack your arugula” »

Feb 3, 2019

Rogue Bitcoin-Funded Biohacker Wants to Gene-Hack Designer Babies

Posted by in categories: bitcoin, cybercrime/malcode

Is it ethical?

Read more

Feb 1, 2019

Israeli cyberexpert detects China hack in Ottawa, warns against using Huawei 5G

Posted by in categories: business, cybercrime/malcode, engineering, government, internet

OTTAWA — A Chinese telecommunication company secretly diverted Canadian internet traffic to China, particularly from Rogers subscribers in the Ottawa area, says an Israeli cybersecurity specialist.

The 2016 incident involved the surreptitious rerouting of the internet data of Rogers customers in and around Canada’s capital by China Telecom, a state-owned internet service provider that has two legally operating “points of presence” on Canadian soil, said Yuval Shavitt, an electrical-engineering expert at Tel Aviv University.

Shavitt told The Canadian Press that the China Telecom example should serve as a caution to the Canadian government not to do business with another Chinese telecommunications giant: Huawei Technologies, which is vying to build Canada’s next-generation 5G wireless communications networks.

Continue reading “Israeli cyberexpert detects China hack in Ottawa, warns against using Huawei 5G” »

Feb 1, 2019

Meet the Bots That Review and Write Snippets of Facebook’s Code

Posted by in categories: cybercrime/malcode, employment, engineering, robotics/AI

To make its developers’ jobs more rewarding, Facebook is now using two automated tools called Sapienz and SapFix to find and repair low-level bugs in its mobile apps. Sapienz runs the apps through many tests to figure out which actions will cause it to crash. Then, SapFix recommends a fix to developers, who review it and decide whether to accept the fix, come up with their own, or ignore the problem.

Engineers began using Sapienz to review the Facebook app in September 2017, and have gradually begun using it for the rest of the company’s apps (which include Messenger, Instagram, Facebook Lite, and Workplace). In May, the team will describe its more recent adoption of SapFix at the International Conference on Software Engineering in Montreal, Canada (and they’re hiring).

Continue reading “Meet the Bots That Review and Write Snippets of Facebook’s Code” »

Jan 29, 2019

Mayhem, the Machine That Finds Software Vulnerabilities, Then Patches Them

Posted by in categories: business, cybercrime/malcode, robotics/AI

Bug and vulnerability hunting is a big business and the need for it is getting larger and larger. Up until this point, the majority of work had been from people. Either as hackers discovered holes and released exploits or as companies paid people to do the testing.


The machine triumphed in DARPA’s Cyber Grand Challenge, where teams automated white-hat hacking.

Read more

Jan 24, 2019

For Industrial Robots, Hacking Risks Are On the Rise

Posted by in categories: biotech/medical, cybercrime/malcode, employment, engineering, internet, robotics/AI

In the future, industrial robots may create jobs, boost productivity and spur higher wages. But one thing seems more certain for now: They’re vulnerable to hackers.

Factories, hospitals and other big robot users often lack sufficient levels of defense against a digital attack, according to cybersecurity experts, robot manufacturers and engineering researchers. The risk levels are rising as more robots morph from being offline and isolated to being internet-connected machines, often working alongside humans.


5G promises to make factories a lot smarter. And that means they’ll be a lot more vulnerable.

Continue reading “For Industrial Robots, Hacking Risks Are On the Rise” »

Jan 19, 2019

Tissue Engineers Hack Life’s Code for 3D Folded Shapes

Posted by in category: cybercrime/malcode

Mechanical tension between tethered cells cues developing tissues to fold. Researchers can now program synthetic tissue to make coils, cubes and rippling plates.

Read more

Jan 18, 2019

Blockchain: 6 Key Ethical Considerations

Posted by in categories: bitcoin, computing, cryptocurrencies, cybercrime/malcode, disruptive technology, employment, ethics, hacking, information science

Blockchain shows major potential to drive positive change across a wide range of industries. Like any disruptive technology, there are ethical considerations that must be identified, discussed, and mitigated as we adopt and apply this technology, so that we can maximize the positive benefits, and minimize the negative side effects.

Own Your Data

For decades we have sought the ability for data subjects to own and control their data. Sadly, with massive proliferation of centralized database silos and the sensitive personal information they contain, we have fallen far short of data subjects having access to, let alone owning or controlling their data. Blockchain has the potential to enable data subjects to access their data, review and amend it, see reports of who else has accessed it, give consent or opt-in / opt-out of data sharing, and even request they be forgotten and their information be deleted.

Monetize Your Data

Continue reading “Blockchain: 6 Key Ethical Considerations” »