Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 164

Jan 20, 2017

350,000 Twitter bot sleeper cell betrayed by love of Star Wars and Windows Phone

Posted by in categories: cybercrime/malcode, mobile phones, robotics/AI

Computer boffins Juan Echeverria and Shi Zhou at University College London have chanced across a dormant Twitter botnet made up of more than 350,000 accounts with a fondness for quoting Star Wars novels.

Twitter bots have been accused of warping the tone of the 2016 election. They also can be used for entertainment, marketing, spamming, manipulating Twitter’s trending topics list and public opinion, trolling, fake followers, malware distribution, and data set pollution, among other things.

In a recently published research paper, the two computer scientists recount how a random sampling of 1 per cent of English-speaking Twitter accounts – about 6 million accounts – led to their discovery.

Continue reading “350,000 Twitter bot sleeper cell betrayed by love of Star Wars and Windows Phone” »

Jan 20, 2017

China’s Quantum Communications Trailblazer declared Operational after Stellar Performance

Posted by in categories: cybercrime/malcode, quantum physics, satellites

Nice write up on the QC news about China’s QC satellite from late Wed.


China’s Quantum Science Satellite was declared operational this week after five months of in-orbit testing, now set for a busy two-year mission demonstrating hack-proof communications by means of entangled photons as a trailblazer for what is widely considered the communications technology of the future.

The Quantum Science Satellite, nicknamed Mozi, was launched into orbit on August 15, 2016 as the world’s first dedicated quantum communications testbed, embarking on an ambitious mission dedicated to validating the principles of quantum communications across vast distances of open space.

Continue reading “China’s Quantum Communications Trailblazer declared Operational after Stellar Performance” »

Jan 20, 2017

The U.S. Air Force is beefing-up cyber security for the F-22 and F-35 jet fighter aircraft

Posted by in categories: cybercrime/malcode, military

WASHINGTON – The U.S. Air Force is working closely with industry partners to strengthen cyber security for larger service platforms such as an F-22 or F-35 fighters. Business Insider reports.

Read more

Jan 19, 2017

DARPA project could help with mobile security in the enterprise

Posted by in categories: cybercrime/malcode, military

If you are a top notch cyber security expert; DARPA wants you.


A DARPA project set to launch this month will work on military-grade security for mobile networks. Efforts could eventually help enterprise security.

Read more

Jan 19, 2017

Air Force goes after cyber deception technology

Posted by in category: cybercrime/malcode

A little cyber-trickery is a good thing when it comes to battling network adversaries.

The Air Force Research Lab (AFRL) tapped into that notion today as it awarded a $750,000 grant to security systems developer Galios to develop a cyber deception system that will “dramatically reduce the capabilities of an attacker that has gained a foothold on a network.”

Specifically, Galios will develop its Prattle system for the Air Force. Galios describes Prattle as a system that generates traffic that misleads an attacker that has penetrated a network: making them doubt what they have learned, or to cause them to make mistakes that increase their likelihood of being detected sooner.

Continue reading “Air Force goes after cyber deception technology” »

Jan 19, 2017

First quantum satellite surpasses expectations

Posted by in categories: cybercrime/malcode, quantum physics, space travel

More on the completion of phase 1 testing of by the Chinese on their Quantum Satellite as they have kicked their second phase that includes hacking.


Five space exploration projects to begin during 13th Five-Year Plan

Micius, the world’s first quantum satellite, has successfully completed four months of in-orbit tests since China launched it on Aug 16, the Chinese Academy of Sciences has announced.

Continue reading “First quantum satellite surpasses expectations” »

Jan 18, 2017

China’s quantum science satellite begins ‘spooky’ and ‘unhackable’ experiments

Posted by in categories: cybercrime/malcode, quantum physics, satellites, science

Hope folks are realizing this is happening and now real. Not sure what experiments their doing as they have already been experimenting already on hacking.


The world’s first quantum science and communications satellite has been handed over to Chinese scientists for the official start of experiments to test the phenomena of quantum entanglement and ‘unhackable’ quantum communication.

The Quantum Experiments at Space Scale (QUESS) satellite was launched on August 15 last year and soon after began testing its payloads and space-to-ground links.

Continue reading “China’s quantum science satellite begins ‘spooky’ and ‘unhackable’ experiments” »

Jan 16, 2017

The weird and spooky stories told by people who explored the internet’s hidden websites

Posted by in categories: cybercrime/malcode, internet

The “Dark Web” is a hidden corner of the internet that is home to many things people want to keep in the shadows: drugs, counterfeits, stolen items, and so on.

But there are also far stranger elements.

A popular thread on Reddit once asked the simple question, “What’s your Deep Web story?” In other words, the Reddit user was asking people to share any weird experiences they had encountered while using anonymous web services to access secret websites.

Continue reading “The weird and spooky stories told by people who explored the internet’s hidden websites” »

Jan 5, 2017

The Future Of Encryption

Posted by in categories: business, cybercrime/malcode, encryption, engineering, internet, quantum physics

QC in the mainstream is definitely viable less than 7 yrs. and possible within 5 yrs. However, I have a friend who even believes we’re looking at 3 years.


Internet security, once considered to be strictly in the domain of the wonkiest tech experts, has become central to public discourse over the past year. Besides the attacks on the DNC, even tech savvy business like Snapchat, Oracle and Verizon Enterprise Solutions have had significant breaches in the last year.

For the most part, these attacks were preventable. Often, hackers use a technique called social engineering, to trick people into allowing them into a system. Other times, they exploit a vulnerability in software to give them access to confidential data. In most cases, more stringent procedures can prevent attacks.

Continue reading “The Future Of Encryption” »

Jan 5, 2017

Cryptographers Rally to NIST Call for Quantum Computer Algorithms

Posted by in categories: cybercrime/malcode, encryption, government, information science, military, privacy, quantum physics

Has anyone besides NSA, NIST, DARPA, IARPA, etc. realize and thought about what type of cyber warfare will exist in a QC world? The skillsets alone will be so far advance than the techies that we have seen in most companies today as well as in most government agencies. Granted we’re simplifying things with the platform; however, skillsets will still need to be more advance than what we have seen with the standard techie.


Members of the cryptography community have expressed interest in the National Institute of Standards and Technology’s (NIST) recent call for an algorithm less susceptible to hacks from a computer that does not exist yet.

NIST announced a call for proposals for post-quantum cryptography standardization on Dec. 20. One or more of the proposed algorithms will ultimately replace some of NIST’s cryptographic standards that are most vulnerable to quantum computers. According to Dustin Moody, a mathematician at NIST, 40 people have joined the agency’s online cryptography forum since the call was announced two weeks ago. The forum had about 200 members before the call went out. Moody said that many people were anticipating the announcement, as cryptography enthusiasts tend to run in the same circles.

Continue reading “Cryptographers Rally to NIST Call for Quantum Computer Algorithms” »