Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 165

Jul 4, 2017

I’m A Cyborg And So Are You

Posted by in categories: cybercrime/malcode, cyborgs, energy, neuroscience

I have recently re-kindled my interest in neuro-hacking, the process of using technological and spiritual tools to essentially hack my consciousness, make myself calmer, and of course, happier! I’ve been using vitamins (D3!) and isochronic tones for some time, but I have run across a number of new devices and apps recently. I got a demo kit for a new device called Thync, that purports to alter brain waves to achieve greater calm, less stress, and more energy. This follows, for me, several decades of interest in this arena, also fueled by a bunch of projects in the works that seek to augment human potential using the latest brain science, emerging hardware, and games.

This is an area of professional interest as well as personal. I’m a socio-cultural anthropologist with a focus on digital culture, technology use, and future possibilities. My graduate work focused on social learning associated with online gaming. A lot of my focus falls into a sub-discipline of anthropology known as cyborg anthropology:

Read more

Jun 18, 2017

China Shatters “Spooky Action at a Distance” Record, Preps for Quantum Internet

Posted by in categories: cybercrime/malcode, internet, quantum physics, space

Results from the Micius satellite test quantum entanglement, pointing the way toward hack-proof global communications—and a new space race.

Read more

Jun 14, 2017

Neural Implant Tech Raises the Specter of Brainjacking

Posted by in categories: cybercrime/malcode, Elon Musk, internet, neuroscience

Fun in fiction. Perhaps not so much in reality.


The human mind is already pretty open to manipulation—just ask anyone who works in advertising. But neural implant technology could potentially open up a direct digital link to our innermost thoughts that could be exploited by hackers.

In recent months, companies like Elon Musk’s Neuralink, Kernel, and Facebook have unveiled plans to create devices that will provide a two-way interface between human brains and machines.

Continue reading “Neural Implant Tech Raises the Specter of Brainjacking” »

May 26, 2017

Russian group delivers the first unhackable quantum-safe blockchain

Posted by in categories: bitcoin, cryptocurrencies, cybercrime/malcode, government, particle physics, quantum physics

Quantum computing and the blockchain both get plenty of attention in 2017, and now researchers in Russia have combined the two to create what they claim is an unhackable distributed-ledger platform.

The new technology, described as the “first quantum-safe blockchain,” promises to make it secure for organizations to transfer data without the fear of hacking from even the most powerful computers, in this case, the emerging field of quantum computing. Quantum computers make use of the quantum states of subatomic particles to store information, with the potential to do some calculations far faster than current computers. There’s some dispute whether we have actually reached that point yet, but companies such as Google Inc. are promising that true quantum computing is just around the corner.

“Quantum computers pose a major threat to data security today and could even be used to hack blockchains, destroying everything from cryptocurrencies like bitcoin to secure government communications,” a spokesperson for the Russian Quantum Center told SiliconANGLE. “Because quantum computers can test a large number of combinations at once, they will be able to destroy these digital signatures, leaving the blockchain vulnerable.”

Continue reading “Russian group delivers the first unhackable quantum-safe blockchain” »

May 19, 2017

World Asteroid Day Hackathon

Posted by in categories: asteroid/comet impacts, cybercrime/malcode, education, existential risks, media & arts

“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software.” https://en.wikipedia.org/wiki/Hackathon

In February 2014, Dr. Brian May, astrophysicist and famed guitarist for the rock band QUEEN, began working with Grigorij Richters, the director of a new film titled 51 Degrees North, a fictional story of an asteroid impact on London and the resulting human condition. May composed the music for the film and suggested that Richters preview it at Starmus, an event organized by Dr. Garik Israelian and attended by esteemed astrophysicists, scientists and artists, including Dr. Stephen Hawking, Richard Dawkins and Rick Wakeman. The result was the beginning of discussions that would lead to the launch of Asteroid Day in 2015. See : https://asteroidday.org/

Read more

May 18, 2017

Cybercrime: A Black Market Price List From The Dark Web

Posted by in category: cybercrime/malcode

What does it cost for malware, stolen identities and other tools of the cybercriminal trade? Probably less than you think.

Previous

1 of 10.

Continue reading “Cybercrime: A Black Market Price List From The Dark Web” »

May 14, 2017

NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet

Posted by in categories: cybercrime/malcode, encryption, internet, supercomputing

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Continue reading “NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet” »

May 12, 2017

‘Accidental hero’ finds kill switch to stop spread of ransomware cyber-attack

Posted by in category: cybercrime/malcode

Spread of malware curtailed by expert who simply registered a domain name for a few dollars, giving many across world time to protect against attack.

Read more

May 12, 2017

Malware, described in leaked NSA documents, cripples computers worldwide

Posted by in categories: biotech/medical, cybercrime/malcode, government, health, internet, privacy

Malicious software that blocks access to computers is spreading swiftly across the world, snarling critical systems in hospitals, telecommunications and corporate offices, apparently with the help of a software vulnerability originally discovered by the National Security Agency.

The reports of the malware spread began in Britain, where the National Health Service (NHS) reported serious problems throughout Friday. But government officials and cybersecurity experts later described a far more extensive problem growing across the Internet and unbounded by national borders. Europe and Latin America were especially hard hit.

“This is not targeted at the NHS,” British Prime Minister Theresa May told reporters. “It’s an international attack, and a number of countries and organizations have been affected.”

Continue reading “Malware, described in leaked NSA documents, cripples computers worldwide” »

May 11, 2017

AI Is the Future of Cybersecurity, for Better and for Worse

Posted by in categories: cybercrime/malcode, government, robotics/AI

In the near future, as artificial intelligence (AI) systems become more capable, we will begin to see more automated and increasingly sophisticated social engineering attacks. The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses. Ironically, our best hope to defend against AI-enabled hacking is by using AI. But this is very likely to lead to an AI arms race, the consequences of which may be very troubling in the long term, especially as big government actors join the cyber wars.


It will become the problem and the solution.

Read more