Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 166

May 26, 2017

Russian group delivers the first unhackable quantum-safe blockchain

Posted by in categories: bitcoin, cryptocurrencies, cybercrime/malcode, government, particle physics, quantum physics

Quantum computing and the blockchain both get plenty of attention in 2017, and now researchers in Russia have combined the two to create what they claim is an unhackable distributed-ledger platform.

The new technology, described as the “first quantum-safe blockchain,” promises to make it secure for organizations to transfer data without the fear of hacking from even the most powerful computers, in this case, the emerging field of quantum computing. Quantum computers make use of the quantum states of subatomic particles to store information, with the potential to do some calculations far faster than current computers. There’s some dispute whether we have actually reached that point yet, but companies such as Google Inc. are promising that true quantum computing is just around the corner.

“Quantum computers pose a major threat to data security today and could even be used to hack blockchains, destroying everything from cryptocurrencies like bitcoin to secure government communications,” a spokesperson for the Russian Quantum Center told SiliconANGLE. “Because quantum computers can test a large number of combinations at once, they will be able to destroy these digital signatures, leaving the blockchain vulnerable.”

Continue reading “Russian group delivers the first unhackable quantum-safe blockchain” »

May 19, 2017

World Asteroid Day Hackathon

Posted by in categories: asteroid/comet impacts, cybercrime/malcode, education, existential risks, media & arts

“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software.” https://en.wikipedia.org/wiki/Hackathon

In February 2014, Dr. Brian May, astrophysicist and famed guitarist for the rock band QUEEN, began working with Grigorij Richters, the director of a new film titled 51 Degrees North, a fictional story of an asteroid impact on London and the resulting human condition. May composed the music for the film and suggested that Richters preview it at Starmus, an event organized by Dr. Garik Israelian and attended by esteemed astrophysicists, scientists and artists, including Dr. Stephen Hawking, Richard Dawkins and Rick Wakeman. The result was the beginning of discussions that would lead to the launch of Asteroid Day in 2015. See : https://asteroidday.org/

Read more

May 18, 2017

Cybercrime: A Black Market Price List From The Dark Web

Posted by in category: cybercrime/malcode

What does it cost for malware, stolen identities and other tools of the cybercriminal trade? Probably less than you think.

Previous

1 of 10.

Continue reading “Cybercrime: A Black Market Price List From The Dark Web” »

May 14, 2017

NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet

Posted by in categories: cybercrime/malcode, encryption, internet, supercomputing

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Continue reading “NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet” »

May 12, 2017

‘Accidental hero’ finds kill switch to stop spread of ransomware cyber-attack

Posted by in category: cybercrime/malcode

Spread of malware curtailed by expert who simply registered a domain name for a few dollars, giving many across world time to protect against attack.

Read more

May 12, 2017

Malware, described in leaked NSA documents, cripples computers worldwide

Posted by in categories: biotech/medical, cybercrime/malcode, government, health, internet, privacy

Malicious software that blocks access to computers is spreading swiftly across the world, snarling critical systems in hospitals, telecommunications and corporate offices, apparently with the help of a software vulnerability originally discovered by the National Security Agency.

The reports of the malware spread began in Britain, where the National Health Service (NHS) reported serious problems throughout Friday. But government officials and cybersecurity experts later described a far more extensive problem growing across the Internet and unbounded by national borders. Europe and Latin America were especially hard hit.

“This is not targeted at the NHS,” British Prime Minister Theresa May told reporters. “It’s an international attack, and a number of countries and organizations have been affected.”

Continue reading “Malware, described in leaked NSA documents, cripples computers worldwide” »

May 11, 2017

AI Is the Future of Cybersecurity, for Better and for Worse

Posted by in categories: cybercrime/malcode, government, robotics/AI

In the near future, as artificial intelligence (AI) systems become more capable, we will begin to see more automated and increasingly sophisticated social engineering attacks. The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses. Ironically, our best hope to defend against AI-enabled hacking is by using AI. But this is very likely to lead to an AI arms race, the consequences of which may be very troubling in the long term, especially as big government actors join the cyber wars.


It will become the problem and the solution.

Read more

May 8, 2017

Cybersecurity Pros Will Soon Patrol Computer Networks Like Agents in ‘The Matrix’

Posted by in categories: augmented reality, cybercrime/malcode, virtual reality

Security analysts could soon become the first employees asked to show up to work inside virtual reality.

Thanks to a new virtual reality tool built by the Colorado-based startup ProtectWise, cybersecurity professionals may soon be patrolling computer networks — like real world beat cops — inside a three-dimensional video game world.

Continue reading “Cybersecurity Pros Will Soon Patrol Computer Networks Like Agents in ‘The Matrix’” »

May 3, 2017

DARPA Is Planning to Hack the Human Brain to Let Us “Upload” Skills

Posted by in categories: cybercrime/malcode, military, neuroscience

The DARPA Targeted Neuroplasticity Training (TNT) program is exploring ways to speed up skill acquisition by activating synaptic plasticity. If the program succeeds, downloadable learning that happens in a flash may be the result.

In March 2016, DARPA — the U.S. military’s “mad science” branch — announced their Targeted Neuroplasticity Training (TNT) program. The TNT program aims to explore various safe neurostimulation methods for activating synaptic plasticity, which is the brain’s ability to alter the connecting points between neurons — a requirement for learning. DARPA hopes that building up that ability by subjecting the nervous system to a kind of workout regimen will enable the brain to learn more quickly.

Read more

Apr 16, 2017

Two Ohio inmates hacked their prison from the inside using makeshift computers built from spare parts

Posted by in categories: cybercrime/malcode, law enforcement

Decentralization of technology and ever cheaper electronics and materials will also bring more risks. Not to mention the serious risks of terrorism.

Here is a less harmful example of what decentralized tech can do.


Using computers they’d built out of discarded electronics and hidden in a closet ceiling, two inmates in an Ohio prison hacked the facility’s network, downloaded porn, and applied for credit cards with stolen information, according to a report released Tuesday (April 11) by Ohio’s inspector general’s office.

Continue reading “Two Ohio inmates hacked their prison from the inside using makeshift computers built from spare parts” »