Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 181

Apr 19, 2016

General Motors to double size of Israel R&D center

Posted by in categories: cybercrime/malcode, quantum physics, robotics/AI, transportation

Regulation is not the immediate problem with autonomous cars. Example, is Google car has been deemed approved by existing regs. However, the issue is the broader public’s trust due to the various reports of hacking of connected cars such as the Nissan Leaf, etc. Until we put in place a more resilient net infrastructure such as Quantum; slow down will happen. I suggest GM to read the news more because everything that I stated has been well communicated in the news and research for the past 4 months.


GM Ventures president Lauckner believes regulation will not halt the advance of the autonomous car.

Read more

Apr 18, 2016

MIT’s AI Can Predict 85 Percent of Cyberattacks

Posted by in categories: cybercrime/malcode, internet, robotics/AI

Knowing a cyberattack’s going to occur before it actually happens is very useful—but it’s tricky to achieve in practice. Now MIT’s built an artificial intelligence system that can predict attacks 85 percent of the time.

Cyberattack spotters work in two main ways. Some are AI that simply looks out for anomalies in internet traffic. They work, but often throw up false positives—warnings about a threat when actually nothing’s wrong. Other software systems are built on rules developed by humans, but it’s hard to create systems like that which catches every attack.

Continue reading “MIT’s AI Can Predict 85 Percent of Cyberattacks” »

Apr 18, 2016

Artificial Intelligence’s Ultimate Challenge? Cyber Attacks

Posted by in categories: cybercrime/malcode, information science, quantum physics, robotics/AI

AI is hackable as long as it’s underpinning technology is still supported on legacy platform technology and connected to a legacy infrastructure. Only when the underpinning technology & net infrastructure is updated to Quantum will we see a secured AI environment.


At MIT, machine learning specialists are training deep learning algorithms to spot cyber attacks. It may be AI’s ultimate test.

Read more

Apr 16, 2016

How bots will change the Web, according to a bot we built to answer that question

Posted by in categories: 3D printing, business, cybercrime/malcode, finance, internet, robotics/AI, transportation

I am still not convinced that everyone fully understands how bot technology is about to change IoT and its impact to online business industry. Let me share a few ideas: Financial Auditing and accounting. Bots will be able to do a more thorough job in managing, tracking, reporting financials that many finance back office controls can be performed by bots and requiring a sign off by CFO/ Lead Controller. And, Accounting & Audit firms can easily leverage the technology to perform audits on companies remotely without having to send teams of auditors to a client’s site.

Here’s another one; I decide to set up a few 3D printers to make some unique seals for aircraft manufactures for their jets/ planes; and I need a call center plus online sales teams taking and processing orders. With bot technology my whole operation is automated and no need for sales people, call center folks, or operators. All I need is myself and couple of techies to manage the bot operations; and more profit for me and my team.

However, we still have to keep a tight oversight on hacking which is still a risk; however, we should see more micro-size companies spin up as a result of online bots and 3D printers in our immediate future.

Continue reading “How bots will change the Web, according to a bot we built to answer that question” »

Apr 12, 2016

Three-way battles in the quantum world

Posted by in categories: cybercrime/malcode, particle physics, quantum physics, robotics/AI

One thing about Quntum; nothing ever stays consistent. Why it’s loved & hated by Cyber Security enthusiasts as well as AI engineers.


When water in a pot is slowly heated to the boil, an exciting duel of energies takes place inside the liquid. On the one hand there is the interaction energy that wants to keep the water molecules together because of their mutual attraction. On the other hand, however, the motional energy, which increases due to heating, tries to separate the molecules. Below the boiling point the interaction energy prevails, but as soon as the motional energy wins the water boils and turns into water vapour. This process is also known as a phase transition. In this scenario the interaction only involves water molecules that are in immediate proximity to one another.

An artificial quantum world of atoms and light

Continue reading “Three-way battles in the quantum world” »

Apr 11, 2016

Are Artificial-Intelligence Software Audits Around the Corner?

Posted by in categories: cybercrime/malcode, robotics/AI

They need to be especially as we assess AI with SOX, HIPAA, and Cyber security. It will be interesting how auditors will approach this space as well since not many folks outside of tech are considered AI experts. This should be interesting.


Scott & Scott, LLP attorney, Christopher Barnett, expresses concern whether KPMG’s recent announcement that they will be deploying IBM’s Watson cognitive computing technology points to changes in software audits in the future.

Download PDF [259KB]

Continue reading “Are Artificial-Intelligence Software Audits Around the Corner?” »

Apr 9, 2016

Obama warned by China against undermining ‘national security’ interests

Posted by in categories: cybercrime/malcode, quantum physics

Interesting: China wants more cross sharing of Cyber Security information with US. This will only get more interesting with the advancement of Quantum tech.

Article’s headline “Obama warned by China against undermining ‘national security’ interests”.


He made the remarks while addressing the Korean Peninsula situation in separate meetings here with U.S. President Barack Obama and South Korean President Park Geun-hye on the sidelines of the fourth Nuclear Security Summit (NSS).

Continue reading “Obama warned by China against undermining 'national security' interests” »

Apr 9, 2016

Russia, China Are Greatest Cyberthreats, But Iran Is Growing

Posted by in categories: cybercrime/malcode, government, military

The greatest cybersecurity threat to the U.S. comes from Russia and China, but Iran is trying to increase and spend more on its capabilities, the military’s Cyber Command chief told Congress.

Read more

Apr 9, 2016

FBI Warns of Cyber Threat to Electric Grid

Posted by in categories: cybercrime/malcode, energy, government

Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like the recent hacking against Ukraine’s power grid.

The nationwide campaign by DHS and the FBI began March 31 and includes 12 briefings and online webinars for electrical power infrastructure companies and others involved in security, with sessions in eight U.S. cities, including a session next week in Washington.

The unclassified briefings are titled “Ukraine Cyber Attack: Implications for U.S. Stakeholders,” and are based on work with the Ukrainian government in the aftermath of the Dec. 23 cyber attack against the Ukrainian power infrastructure.

Read more

Apr 7, 2016

Your next car will need a firewall

Posted by in categories: cybercrime/malcode, internet, security, transportation

As our cars become increasingly connected to the internet, and eventually drive themselves, we’re going to want them to be rock-solid secure. The recent Chrysler exploit and FBI warning both highlighted just how vulnerable our vehicles can be to malicious hackers.

The idea of anti-virus software for cars has been around for several years, and this year there’s even an entire conference about in-car cybersecurity. Karamba Security is a new company in the space that is offering what amounts to a firewall for your ride.

Don’t miss our biggest TNW Conference yet! Join us May 26 & 27 in Amsterdam.

Continue reading “Your next car will need a firewall” »