Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 175

Jul 29, 2016

China’s new quantum satellite paves the way for unhackable satellite internet

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics, satellites

All that I can say is “WOW!”


CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.

The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.

Continue reading “China’s new quantum satellite paves the way for unhackable satellite internet” »

Jul 28, 2016

Air Force awards contract for deceptive cyber research

Posted by in category: cybercrime/malcode

The Air Force awarded a contract for research in deceptive cyber to be used toward network defense.

Read more

Jul 28, 2016

FBI’s Mass Hack Hit 50 Computers in Austria

Posted by in category: cybercrime/malcode

Revelations that the ‘Operation Pacifier’ child porn investigation extended to Austria too shows the extent of the FBI’s reach overseas.

Read more

Jul 21, 2016

BioCryptography and Biometric Penetration Testing

Posted by in categories: biotech/medical, cybercrime/malcode, engineering, privacy

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

Continue reading “BioCryptography and Biometric Penetration Testing” »

Jul 21, 2016

Enterprise Fellowships to kick-start the quantum technology industry

Posted by in categories: business, cybercrime/malcode, energy, engineering, finance, health, internet, quantum physics, robotics/AI

Luv this.


The University of Bristol’s Quantum Technology Enterprise Centre (QTEC) is looking to recruit its first cohort of Enterprise Fellows that will be the next generation of quantum technology entrepreneurs.

Merging training in systems thinking, quantum engineering and entrepreneurship, QTEC will provide the necessary skills for budding innovators to develop their own business ideas and for them to branch out into the emerging field of quantum technologies.

The Centre, which is the first of its kind in the world, was funded as part of the UK’s £270 million investment into quantum technologies. These technologies exploit the laws of quantum mechanics to create practical and useful technologies that will outperform their classical rivals and that have the potential to transform artificial intelligence, healthcare, energy, finance, cyber security and the internet.

Continue reading “Enterprise Fellowships to kick-start the quantum technology industry” »

Jul 19, 2016

World-Check terror suspect DB hits the web at just US$6750

Posted by in categories: cybercrime/malcode, internet

Want to buy the World-Check terror suspect DB? You can on the Dark Web for $6750.


Last month’s borked Couchdb breach delivers more pain to Thomson Reuters.

Read more

Jul 19, 2016

Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Luv it; more believers.


Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”

While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”

Continue reading “Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks” »

Jul 18, 2016

Indian-origin researchers find cyber security risks in 3D printing

Posted by in categories: 3D printing, cybercrime/malcode

The researchers have found a way a hacker can create sub-millimeter defects between printed layers that can create fatigue in the product.

Tags: .

Read more

Jul 16, 2016

GM Arrogance Spurred Government to Fund Auto Hacking

Posted by in categories: cybercrime/malcode, government, military

GM executives’ declaration that they didn’t care about automotive security triggered the Pentagon to fund the famous Jeep hack of 2013.

Read more

Jul 16, 2016

Silicon Valley Entrepreneurs Aim To ‘Hack’ the Brain

Posted by in categories: bioengineering, chemistry, cybercrime/malcode, neuroscience

Woo and other entrepreneurs are using fasts and other tricks to “hack” their brain chemistry like they would a computer, hoping to give themselves an edge as they strive to dream up the next billion-dollar idea. Known by insiders as “biohacking,” the push for cognitive self-improvement is gaining momentum in the Silicon Valley tech world, where workers face constant pressure to innovate and produce at the highest levels.

Read more