Is it ethical?
Category: cybercrime/malcode – Page 185
OTTAWA — A Chinese telecommunication company secretly diverted Canadian internet traffic to China, particularly from Rogers subscribers in the Ottawa area, says an Israeli cybersecurity specialist.
The 2016 incident involved the surreptitious rerouting of the internet data of Rogers customers in and around Canada’s capital by China Telecom, a state-owned internet service provider that has two legally operating “points of presence” on Canadian soil, said Yuval Shavitt, an electrical-engineering expert at Tel Aviv University.
Shavitt told The Canadian Press that the China Telecom example should serve as a caution to the Canadian government not to do business with another Chinese telecommunications giant: Huawei Technologies, which is vying to build Canada’s next-generation 5G wireless communications networks.
To make its developers’ jobs more rewarding, Facebook is now using two automated tools called Sapienz and SapFix to find and repair low-level bugs in its mobile apps. Sapienz runs the apps through many tests to figure out which actions will cause it to crash. Then, SapFix recommends a fix to developers, who review it and decide whether to accept the fix, come up with their own, or ignore the problem.
Engineers began using Sapienz to review the Facebook app in September 2017, and have gradually begun using it for the rest of the company’s apps (which include Messenger, Instagram, Facebook Lite, and Workplace). In May, the team will describe its more recent adoption of SapFix at the International Conference on Software Engineering in Montreal, Canada (and they’re hiring).
Bug and vulnerability hunting is a big business and the need for it is getting larger and larger. Up until this point, the majority of work had been from people. Either as hackers discovered holes and released exploits or as companies paid people to do the testing.
The machine triumphed in DARPA’s Cyber Grand Challenge, where teams automated white-hat hacking.
In the future, industrial robots may create jobs, boost productivity and spur higher wages. But one thing seems more certain for now: They’re vulnerable to hackers.
Factories, hospitals and other big robot users often lack sufficient levels of defense against a digital attack, according to cybersecurity experts, robot manufacturers and engineering researchers. The risk levels are rising as more robots morph from being offline and isolated to being internet-connected machines, often working alongside humans.
5G promises to make factories a lot smarter. And that means they’ll be a lot more vulnerable.

Blockchain shows major potential to drive positive change across a wide range of industries. Like any disruptive technology, there are ethical considerations that must be identified, discussed, and mitigated as we adopt and apply this technology, so that we can maximize the positive benefits, and minimize the negative side effects.
Own Your Data
For decades we have sought the ability for data subjects to own and control their data. Sadly, with massive proliferation of centralized database silos and the sensitive personal information they contain, we have fallen far short of data subjects having access to, let alone owning or controlling their data. Blockchain has the potential to enable data subjects to access their data, review and amend it, see reports of who else has accessed it, give consent or opt-in / opt-out of data sharing, and even request they be forgotten and their information be deleted.
There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1” is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique passwords exposed.
The breach was first reported by Troy Hunt, the security researcher who runs the site Have I Been Pwned (HIBP), where you can check if your email has been compromised in a data breach. In his blog, Hunt says a large file of 12,000 separate files and 87GB of data had been uploaded to MEGA, a popular cloud service. The data was then posted to a popular hacking forum and appears to be an amalgamation of over 2,000 databases. The troubling thing is the databases contain “dehashed” passwords, which means the methods used to scramble those passwords into unreadable strings has been cracked, fully exposing the passwords.
#MachineLearning and #ArtificialIntelligence are revolutionising the online world. They are capable of reducing costs, analysing data, recognising patterns and trends we can’t see with the human eye and making real- time decisions. Now, they are being used to help prevent financial fraud and they’re learning how to do it better every day.
Machine learning and artificial intelligence are revolutionising the online world. They are capable of reducing costs, analysing data, recognising patterns and trends we can’t see with the human eye and making real-time decisions. Now, they are being used to help prevent financial fraud and they’re learning how to do it better every day.
Currently it is estimated that cybercrime costs the global economy approximately $600 billion, with one of the most common forms being credit card fraud which has grown considerably with the increase in the online market. As more and more people chose to transact online it is becoming increasingly important for financial services to invest in better, faster and more accurate fraud detection and prevention techniques.
How our data helps protect us
Cyberconflicts are, right now, at this very moment, like the first military aeroplanes of 1909. Within decades, planes destroyed entire cities. So when we talk about cyber weapons, we’re still basically in 1909.
Despite the devastation cyberweapons have caused around the world over the last decade, they are still in their infancy. David E. Sanger, a New York Times national security correspondent, explains why the threat is growing.
Subscribe: http://bit.ly/U8Ys7n