Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 190

Mar 29, 2017

Cycon: Taking place in Tallinn from May 30th to June 2nd 2017 2017 will cover issues ranging from international cooperation and conflict in cyberspace to technical challenges and requirements

Posted by in categories: cybercrime/malcode, government, internet, law, military

Legal frameworks, regulations and standards under the topic Defending the Core.


2017 will focus on the fundamental aspects of cyber security with a theme of Defending the Core. The 9th International Conference on Cyber Conflict will be held in Tallinn from May 30 through June 2, 2017.

CyCon is organised by the NATO Cooperative Cyber Defence Centre of Excellence. Every year, over 500 decision-makers and experts from government, military and industry from all over the world approach the conference’s key theme from legal, technology and strategy perspectives, often in an interdisciplinary manner.

Continue reading “Cycon: Taking place in Tallinn from May 30th to June 2nd 2017 2017 will cover issues ranging from international cooperation and conflict in cyberspace to technical challenges and requirements” »

Mar 28, 2017

NATO to spend 3 billion euros on satellite, cyber defenses

Posted by in categories: cybercrime/malcode, drones, military, robotics/AI, space

BRUSSELS NATO plans to spend 3 billion euros ($3.24 billion) to upgrade its satellite and computer technology over the next three years as the Western military alliance adapts to new threats, a senior official said.

Seeking to deter hackers, and other threats including Iranian missiles, the investments underscore NATO’s recognition that conflicts are increasingly fought on computer networks as well as in the air, on land and at sea.

A senior official at the NATO Communications and Information Agency said the plans include a 1.7-billion-euro investment in satellite communications to better support troops and ships deployed across the alliance, as well as aiding the use of Unmanned Aerial Vehicles (UAVs) or drones.

Read more

Mar 18, 2017

Israeli tech firms revving up engines for self-driving cars

Posted by in categories: cybercrime/malcode, robotics/AI, transportation

JERUSALEM (AP) — As the world moves toward an era of self-driving cars, Israel is positioning itself to be the Detroit of the future.

The country has emerged as a global leader in the fast-growing field of driverless cars, as illustrated by Intel’s more than $15 billion acquisition of Israeli firm Mobileye this week.

Israel is now home to hundreds of startups that provide everything from sensors to cybersecurity to data collection for autonomous vehicles, putting it alongside Silicon Valley at the forefront of an industry that many expect to take off over the next decade.

Read more

Mar 6, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

Posted by in categories: cybercrime/malcode, drones, encryption, internet, mobile phones

Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

Read more

Mar 5, 2017

AI Scientists Gather to Plot Doomsday Scenarios (and Solutions)

Posted by in categories: biotech/medical, cybercrime/malcode, Elon Musk, existential risks, military, policy, robotics/AI

Artificial intelligence boosters predict a brave new world of flying cars and cancer cures. Detractors worry about a future where humans are enslaved to an evil race of robot overlords. Veteran AI scientist Eric Horvitz and Doomsday Clock guru Lawrence Krauss, seeking a middle ground, gathered a group of experts in the Arizona desert to discuss the worst that could possibly happen — and how to stop it.

Their workshop took place last weekend at Arizona State University with funding from Tesla Inc. co-founder Elon Musk and Skype co-founder Jaan Tallinn. Officially dubbed “Envisioning and Addressing Adverse AI Outcomes,” it was a kind of AI doomsday games that organized some 40 scientists, cyber-security experts and policy wonks into groups of attackers — the red team — and defenders — blue team — playing out AI-gone-very-wrong scenarios, ranging from stock-market manipulation to global warfare.

Horvitz is optimistic — a good thing because machine intelligence is his life’s work — but some other, more dystopian-minded backers of the project seemed to find his outlook too positive when plans for this event started about two years ago, said Krauss, a theoretical physicist who directs ASU’s Origins Project, the program running the workshop. Yet Horvitz said that for these technologies to move forward successfully and to earn broad public confidence, all concerns must be fully aired and addressed.

Continue reading “AI Scientists Gather to Plot Doomsday Scenarios (and Solutions)” »

Feb 26, 2017

Becoming Borg: What Is a Hive Mind in Science and Could Humanity Get There?

Posted by in categories: cybercrime/malcode, science

In Brief

  • Through the hive mind, everyone would be connected to everyone else telepathically, and we could all share our thoughts, memories, and even dreams with one another.
  • Though a global hive mind would be susceptible to things like hacking or thought control, it could also lead to almost unimaginable levels of innovation.

Communication technology tends to develop in a particular direction: more people communicating across larger distances using less effort to do so. Taken to its logical extreme, perfect communication would be anyone being able to talk to anyone, anywhere, using no effort at all.

Continue reading “Becoming Borg: What Is a Hive Mind in Science and Could Humanity Get There?” »

Feb 21, 2017

Stolen Health Record Databases Sell For $500,000 In The Deep Web

Posted by in categories: biotech/medical, cybercrime/malcode, health, law

Don’t be the CIO that sees their own this market as most Healthcare CIO’s will not allowed to stay given they are now a brand liability not to mention all those lawsuits that are coming from lawyers of the patients.


Electronic health record databases proving to be some of the most lucrative stolen data sets in cybercrime underground.

Medical insurance identification, medical profiles, and even complete electronic health record (EHR) databases have attracted the eyes of enterprising black hats, who increasingly see EHR-related documents as some of the hottest commodities peddled in the criminal underground. A new report today shows that complete EHR databases can fetch as much as $500,000 on the Deep Web, and attackers are also making their money off of smaller caches of farmed medical identities, medical insurance ID card information, and personal medical profiles.

Continue reading “Stolen Health Record Databases Sell For $500,000 In The Deep Web” »

Feb 21, 2017

Dark Net Crime In Increase: Interview With Austrian Chief Inspector

Posted by in categories: cybercrime/malcode, government

There have been numerous dark net-related prosecutions in Europe in the past few months. The first country to wage a war against dark web criminals was Germany, where the government decided to provide more manpower to eliminate all kinds of illegal dark net activity. The Germans started focusing on the dark web shortly after the Münich shooting, which happened on July 22, 2016. Investigators discovered that the gunman acquired his weapon through a vendor on a dark net marketplace, who had been busted after the tragic incident.

By seeing the number of prosecutions, Austria is following the German example. A national news outlet, tips.at, conducted an interview with Chief Inspector Erwin Eilmannsberger, a police officer from Schärding, about the increasing dark net crime in his district.

Continue reading “Dark Net Crime In Increase: Interview With Austrian Chief Inspector” »

Feb 21, 2017

These people are hacking their cars to drive themselves, and it’s legal

Posted by in categories: cybercrime/malcode, law, transportation

Who needs a Tesla when you can build your own automated copilot using free hardware designs and software available online?

Read more

Feb 16, 2017

Quantum Computing And Cybersecurity

Posted by in categories: cybercrime/malcode, quantum physics

So true; as many of us have stated that the infrastructure for QC is a must 1st. A good video to review; as many of the themes are often repeated in many commentaries as well as this video provides some additional insights on QC.

Read more