Toggle light / dark theme

Quantum computing and the blockchain both get plenty of attention in 2017, and now researchers in Russia have combined the two to create what they claim is an unhackable distributed-ledger platform.

The new technology, described as the “first quantum-safe blockchain,” promises to make it secure for organizations to transfer data without the fear of hacking from even the most powerful computers, in this case, the emerging field of quantum computing. Quantum computers make use of the quantum states of subatomic particles to store information, with the potential to do some calculations far faster than current computers. There’s some dispute whether we have actually reached that point yet, but companies such as Google Inc. are promising that true quantum computing is just around the corner.

“Quantum computers pose a major threat to data security today and could even be used to hack blockchains, destroying everything from cryptocurrencies like bitcoin to secure government communications,” a spokesperson for the Russian Quantum Center told SiliconANGLE. “Because quantum computers can test a large number of combinations at once, they will be able to destroy these digital signatures, leaving the blockchain vulnerable.”

Read more

“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software.” https://en.wikipedia.org/wiki/Hackathon

In February 2014, Dr. Brian May, astrophysicist and famed guitarist for the rock band QUEEN, began working with Grigorij Richters, the director of a new film titled 51 Degrees North, a fictional story of an asteroid impact on London and the resulting human condition. May composed the music for the film and suggested that Richters preview it at Starmus, an event organized by Dr. Garik Israelian and attended by esteemed astrophysicists, scientists and artists, including Dr. Stephen Hawking, Richard Dawkins and Rick Wakeman. The result was the beginning of discussions that would lead to the launch of Asteroid Day in 2015. See : https://asteroidday.org/

Read more

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Read more

Malicious software that blocks access to computers is spreading swiftly across the world, snarling critical systems in hospitals, telecommunications and corporate offices, apparently with the help of a software vulnerability originally discovered by the National Security Agency.

The reports of the malware spread began in Britain, where the National Health Service (NHS) reported serious problems throughout Friday. But government officials and cybersecurity experts later described a far more extensive problem growing across the Internet and unbounded by national borders. Europe and Latin America were especially hard hit.

“This is not targeted at the NHS,” British Prime Minister Theresa May told reporters. “It’s an international attack, and a number of countries and organizations have been affected.”

Read more

In the near future, as artificial intelligence (AI) systems become more capable, we will begin to see more automated and increasingly sophisticated social engineering attacks. The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses. Ironically, our best hope to defend against AI-enabled hacking is by using AI. But this is very likely to lead to an AI arms race, the consequences of which may be very troubling in the long term, especially as big government actors join the cyber wars.


It will become the problem and the solution.

Read more

Security analysts could soon become the first employees asked to show up to work inside virtual reality.

Thanks to a new virtual reality tool built by the Colorado-based startup ProtectWise, cybersecurity professionals may soon be patrolling computer networks — like real world beat cops — inside a three-dimensional video game world.

Scott Chasin, CEO and co-founder of ProtectWise, sees a future in which companies might even have war-rooms of Oculus Rift-wearing security analysts who patrol their networks in VR. “I see an opportunity in the not-too-distant future in which a large organization who has a lot of IT infrastructure might have rooms full of security analysts with augmented reality and VR headsets on,” he told me.

Read more

The DARPA Targeted Neuroplasticity Training (TNT) program is exploring ways to speed up skill acquisition by activating synaptic plasticity. If the program succeeds, downloadable learning that happens in a flash may be the result.

In March 2016, DARPA — the U.S. military’s “mad science” branch — announced their Targeted Neuroplasticity Training (TNT) program. The TNT program aims to explore various safe neurostimulation methods for activating synaptic plasticity, which is the brain’s ability to alter the connecting points between neurons — a requirement for learning. DARPA hopes that building up that ability by subjecting the nervous system to a kind of workout regimen will enable the brain to learn more quickly.

Read more

Decentralization of technology and ever cheaper electronics and materials will also bring more risks. Not to mention the serious risks of terrorism.

Here is a less harmful example of what decentralized tech can do.


Using computers they’d built out of discarded electronics and hidden in a closet ceiling, two inmates in an Ohio prison hacked the facility’s network, downloaded porn, and applied for credit cards with stolen information, according to a report released Tuesday (April 11) by Ohio’s inspector general’s office.

The computers were discovered in 2015 after the IT department at the Marion Correctional Institution, a medium-security prison, noticed that a computer on the network had exceeded its daily usage limit. Alerts indicated that the computer had attempted to hack through the network’s controls, but was unsuccessful.