Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 194

Jan 13, 2016

Artificial intelligence: Who’s regulating the robots?

Posted by in categories: cybercrime/malcode, quantum physics, robotics/AI

Run away AI & Robots in particular do not worry me at this point. When we have Quantum based AI and Robots meaning they can fully operate themselves; that’s when we have to truly consider our real risks and ensure we have proper safe gaurds. The bigger issue with current AI and Robots that are not developed on a Quantum platform or technology is hacking. Hacking by others is the immediate threat for AI & Robots.


In this photo taken Thursday, July 9, 2015, SoftBank Corp.'s new robot Pepper performs during an interview at the technology company's headquarters in Tokyo. (AP Photo/Shizuo Kambayashi)

Read more

Jan 12, 2016

Cyber Threats 2016: Killer Robots, US Presidential Race, Critical Infrastructure, Mobile Payments And More

Posted by in categories: cybercrime/malcode, energy, internet, quantum physics, robotics/AI, transportation

As I have mentioned in some of my other reports and writings; infrastructure (power grids, transportation, social services, etc.) is a key area that we need to modernize and get funding soon in place given the changes that are coming. As Russia’s own power stations were hacked; it will not be anything to when the more sophisticated releases of the Quantum Internet and Platforms are finally releasing to the main stream. Someone last week asked me what kept me up at night worrying; I told them our infrastructure and we have not been planning or modernizing it to handle the changes that are coming in the next 5 years much less the next 7 years.


With cyberattacks gaining in sophistication and volume, we can expect to see a range of new targets in the year ahead.

Read more

Jan 6, 2016

Hackers caused a blackout for the first time, researchers say

Posted by in categories: cybercrime/malcode, energy

A milestone in the history of cybersecurity?


Cyberattacks on the power grid just became a much more real threat, according to researchers.

Read more

Nov 15, 2015

The Pentagon’s plan to outsource lethal cyber-weapons

Posted by in categories: cybercrime/malcode, military, privacy

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.

While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.

Read more

Nov 12, 2015

Businesses braced for bout of regulation on cyber security | Financial Times

Posted by in categories: business, cybercrime/malcode, engineering, government

6fd2b4af-61c1-4f0c-be45-f87356b66c9b.img

“Companies around the world are bracing themselves for an avalanche of cyber security regulation, as governments scramble to introduce rules forcing corporate groups to build stronger defences against catastrophic hacks.”

Read more

Oct 23, 2015

PostHuman — sci-fi action animated short film directed

Posted by in categories: cybercrime/malcode, entertainment, media & arts

Official video for PostHuman — produced by Colliculi Productions.
Animated sci-fi thriller short film featuring the voice of Tricia Helfer (Battlestar Galactica). Directed by Cole Drumb. Produced by Jennifer Wai-Yin Luk.

Production company: Colliculi Productions.
Animation studio: Humouring The Fates.
Voice of Kali: Tricia Helfer.
Voice of Terrence: Ulric Dihle.
Original Music: Neill Sanford Livingston.
Post Production Sound: Kid Dropper Sound.
Final Post Production Sound: Bad Animals.
Final Video Post Production: Lightpress.

Continue reading “PostHuman — sci-fi action animated short film directed” »

Oct 15, 2015

Hackers Can Silently Control Siri From 16 Feet Away

Posted by in category: cybercrime/malcode

A clever attack by French researchers turns your headphone cable into an antenna to send surreptitious voice commands.

Read more

Sep 23, 2015

Breakthrough medical discovery: 3D printing might be used to regenerate nerves

Posted by in categories: 3D printing, biotech/medical, cybercrime/malcode, mobile phones

Having significantly damaged nerve tissue is bad for a lot of reasons because it doesn’t regenerate easily and it can lead to various serious medical conditions including paralysis. But many scientists are already studying ways of fixing this issue, and a team of researchers from the University of Minnesota, Virginia Tech, University of Maryland, Princeton University, and Johns Hopkins University has figured out how to use 3D printing for nerve growth.

DON’T MISS: 85 legitimate iPhone apps that were infected with malware in the big App Store hack

Continue reading “Breakthrough medical discovery: 3D printing might be used to regenerate nerves” »

Sep 21, 2015

Unhackable kernel could keep all computers safe from cyberattack

Posted by in categories: biotech/medical, cybercrime/malcode

From helicopters to medical devices and power stations, mathematical proof that software at the heart of an operating system is secure could keep hackers out.

Read more

Aug 31, 2015

Quantum revolution: China set to launch ‘hack proof’ quantum communications network

Posted by in categories: cybercrime/malcode, particle physics, security

China is set to complete the installation of the world’s longest quantum communication network stretching 2,000km (1,240miles) from Beijing to Shanghai by 2016, say scientists leading the project. Quantum communications technology is considered to be “unhackable” and allows data to be transferred at the speed of light.

By 2030, the Chinese network would be extended worldwide, the South China Morning Post reported. It would make the country the first major power to publish a detailed schedule to put the technology into extensive, large-scale use.

The development of quantum communications technology has accelerated in the last five years. The technology works by two people sharing a message which is encrypted by a secret key made up of quantum particles, such as polarized photons. If a third person tries to intercept the photons by copying the secret key as it travels through the network, then the eavesdropper will be revealed by virtue of the laws of quantum mechanics – which dictate that the act of interfering with the network affects the behaviour of the key in an unpredictable manner.

Read more