Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 187

Dec 25, 2016

Russia offers technology to keep hackers at bay

Posted by in categories: cybercrime/malcode, encryption, finance, government, neuroscience, quantum physics

Russian Quantum Center (RQC) said that it is ready to collaborate with India and offer its quantum technology that will prevent hackers from breaking into bank accounts. RQC plans to offer ‘quantum cryptography’ that could propel India to the forefront of hack proof communication in sectors such as banking and national and homeland security.

“We are ready to work with Indian colleagues. It (the technology) can’t be bought from the United States as it deals with the government and security,” said Ruslan Yunusov, chief executive at RQC, in an interview.

Established by Russia’s largest global technology hub, Skolkovo in 2010, RQC conducts scientific research that could lead to a new class of technologies. These include developing ‘unbreakable cryptography’ for the banks and the government organisations. It also involves research in areas such as materials with superior properties and new systems for ultrasensitive imaging of the brain. The research is mostly funded by the government money.

Continue reading “Russia offers technology to keep hackers at bay” »

Dec 22, 2016

The First Quantum Revolution: Foundational information for the enterprise CTO

Posted by in categories: cybercrime/malcode, quantum physics

Bob Gourley

Our report on Naturally Better Security dove deep into ways quantum effects can be leveraged to enhance real world cybersecurity. It was our most popular post in November 2016 and the feedback we received was taken as a signal that we should produce more on what CTOs should know about the quantum world. With this post we are kicking off a series of five pieces that will dive into quantum effects. This first post tackles some foundational background that puts the science into a historical context. The second one will discuss the current revolution in quantum computing. The third focuses on security concerns. The forth dives into quantum key distribution. The fifth hits on the “so-what” of the current revolution in terms of security.

So first, foundational background on quantum mechanics.

Continue reading “The First Quantum Revolution: Foundational information for the enterprise CTO” »

Dec 15, 2016

Insight: Toro Rosso backer says F1 teams should pay more attention to cyber attacks // F1 News // James Allen on F1 – The official James Allen website on F1

Posted by in categories: business, cybercrime/malcode, quantum physics

QC and Formula 1 another opportunity and believer.


In the latest of our occasional series of interviews with interesting players behind the scenes in Formula 1 we meet a Russian scientist, who is keeping the Toro Rosso safe from cyber attacks and who has big plans for using quantum computers to create new F1 materials.

Acronis is a data support and protection business that was founded in 2003. It reportedly has five million personal consumers and 500,000 businesses using its technology in over 145 countries and offers services such as cloud security, data back up and recovery support.

Continue reading “Insight: Toro Rosso backer says F1 teams should pay more attention to cyber attacks // F1 News // James Allen on F1 – The official James Allen website on F1” »

Dec 11, 2016

New Program Awards Points to Computer Hackers

Posted by in category: cybercrime/malcode

United offers up to a million miles in its bug bounty program but it’s not just white hat hackers being offered points.

There’s a new program that will award hackers with points for participating in DDoS attacks.

Continue reading “New Program Awards Points to Computer Hackers” »

Dec 10, 2016

NATO’s largest cyber defence exercise: Cyber Coalition 16

Posted by in category: cybercrime/malcode

The #NATO exercise, located in Tartu, Estonia, featured a simulated #cyber-attack, where participants worked together to identify the threat and mitigate the impact before it could spread across national systems. The participants tested and trained how to share information about cyber incidents in a rapid and efficient way, and how to coordinate their cyber defences in case of an attack.

To know more check us at https://www.shape.nato.int/2016/cyber-coalition-16-ends-nato…e-exercise

Read more

Dec 6, 2016

The Institute for Critical Infrastructure Technology

Posted by in categories: cybercrime/malcode, internet

New report: rise of the machines: the dyn attack was just A practice run.

As the adversarial threat landscape continues to hyper-evolve, America’s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted. The Mirai IoT botnet has inspired a renaissance in adversarial interest in DDoS botnet innovation based on the lack of fundamental security-by-design in the Internet and in IoT devices, and based on the lack of basic cybersecurity and cyber-hygiene best practices by Internet users.

http://icitech.org/icit-publication-the-rise-of-the-machines…ctice-run/

Continue reading “The Institute for Critical Infrastructure Technology” »

Dec 3, 2016

Microsoft, Intel, IBM and Other Tech Companies Are Repelling China’s Cybersecurity Rules

Posted by in categories: cybercrime/malcode, policy

A new strict cyber security policy sees US tech companies in a stand-off with the Chinese authorities.

By Sead Fadilpasic

Read more

Dec 3, 2016

Should tech grads pick defense over Silicon Valley?

Posted by in categories: cybercrime/malcode, drones, engineering, government, military, neuroscience

Hmmmm.


Sam Gussman arrived four years ago at Stanford University hoping to eventually parlay an engineering degree into a product manager job at Google or Facebook.

Working for the National Security Agency or other intelligence bureaus never crossed his mind. For Gussman, the government didn’t seem like the place for the most exciting, cutting-edge research in human computer interaction — his area of interest. Plus, it did no on-campus recruiting, unlike the many tech startups that e-mailed him daily about job opportunities and happy hours.

Continue reading “Should tech grads pick defense over Silicon Valley?” »

Nov 23, 2016

Microsoft Sets Sights on Building Practical Quantum Computer

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

DAILY VIDEO: Microsoft Starts Quantum Computer Development Program; Cerber Ransomware Expands Database Encryption Attacks; IBM Debuts Watson Internet of Things Services Practice; and there’s more.

Today’s topics include Microsoft’s plan to build a Quantum computer, Trend Micro’s find that the Cerber malware is seeking out database files to encrypt and hold for ransom, IBM’s new Watson internet of things services for the automotive, electronics and insurance industries, and the release of the Microsoft Office Online Server update.

Microsoft is on a mission to build a quantum computer, and the company has appointed Todd Holmdahl to manage the project. Holmdahl is the corporate vice president of Microsoft Quantum, a unit dedicated to turning the company’s quantum computing research into real-world products.

Continue reading “Microsoft Sets Sights on Building Practical Quantum Computer” »

Nov 23, 2016

How will quantum computing impact security processes?

Posted by in categories: cybercrime/malcode, encryption, mobile phones, quantum physics

How does one prevent hacking from a QC system? Easy, on board to QC first before others do.


Quantum computers have the potential to perform calculations faster than ever possible before, inviting a significant rethink in how we approach cyber security.

Given the amount of research being ploughed into this area, we are likely to see a commercially viable machine in the near future, so cryptographers and the cyber security industry in general should work to have a clear view on the implications way ahead of that achievement.

Continue reading “How will quantum computing impact security processes?” »