Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 199

Aug 17, 2016

Israeli Startup BioCatch Tracks Online Behavior, Human Memory To Catch Cybercrooks

Posted by in categories: cybercrime/malcode, finance

https://youtube.com/watch?v=q90JYGxk5xw

The company is now marketing software to help banks and online stores distinguish good users from criminals.

Read more

Aug 16, 2016

Bot-Run Company of the Future Gets Hacked: New at Reason

Posted by in categories: cybercrime/malcode, futurism, robotics/AI

They have been warned in the past; and chose to ignore. Bot operated company gets hacked.


A funny thing happened on the way to a post-capitalist, crypto-anarchist utopia.

Read more

Aug 16, 2016

Everything you need to know about the NSA hack (but were afraid to Google)

Posted by in categories: cybercrime/malcode, encryption, information science, privacy

A day in the life of an NSA Hacker.


In what Edward Snowden deems “not unprecedented,” hackers calling themselves the Shadow Brokers have collected NSA-created malware from a staging server run by the Equation Group, an internal hacking team. The Shadow Brokers published two chunks of data, one “open” chunk and another encrypted file containing the “best files” that they will sell for at least $1 million. Wikileaks has said they already own the “auction” files and will publish them in “due course.”

They’ve also released images of the file tree containing a script kiddie-like trove of exploits ostensibly created and used by the NSA as well as a page calling out cyber warriors and “Wealthy Elites.” The page also contains links to the two files, both encrypted. You can grab them using BitTorrent here.

Continue reading “Everything you need to know about the NSA hack (but were afraid to Google)” »

Aug 14, 2016

Scylex malware Kit offered for sale in the criminal underground

Posted by in categories: cybercrime/malcode, finance

For Sale: A Scylex malware Kit please contact your nearest Dark Web for details.


Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities.

Security experts from the Heimdal security firm have discovered a new DIY financial crime kit offered for sale on a notorious malicious hacker forum on the dark web called Lampeduza.

Continue reading “Scylex malware Kit offered for sale in the criminal underground” »

Aug 14, 2016

How will quantum communication change life?

Posted by in categories: cybercrime/malcode, particle physics, quantum physics, satellites

Although this another article that highlights again China’s planned launch; I wanted to share it because it does (in a pragmatic approach) highlight a couple of the key benefits for having QC.


The imminent launch of the world’s first quantum communication satellite is widely believed to herald a breakthrough in China’s development of quantum technology.

Mysterious and confusing, the study of minute particles smaller than atoms has been applied in fields as diverse as computer processing, lasers and nuclear technology.

Continue reading “How will quantum communication change life?” »

Aug 14, 2016

China to launch world’s first quantum hack-proof satellite

Posted by in categories: cybercrime/malcode, quantum physics

Just days away from launch; what will a Chinese owned Quantum Satellite and network mean for the world particularly for the US, Canada, and Europe?


Beijing: China is set to launch the world’s first quantum communication satellite which boasts of hack-proof ultra high security features to prevent wiretapping and intercepts.

If the satellite works well, it will pave the way to a hack-proof communication system, state-run Xinhua news agency reported on Sunday.

Continue reading “China to launch world’s first quantum hack-proof satellite” »

Aug 11, 2016

Lock picking your way to cybersecurity at Def Con

Posted by in categories: cybercrime/malcode, internet

New method on how to attend Def Con.


LAS VEGAS (AP) — Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats.

As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.

Continue reading “Lock picking your way to cybersecurity at Def Con” »

Aug 11, 2016

How Hackers Could Get Inside Your Head With ‘Brain Malware’

Posted by in categories: cybercrime/malcode, neuroscience

Researchers at the University of Washington in Seattle say that we need to act fast to implement a privacy and security framework to prevent our brain signals from being used against us before the technology really takes off…


Brain-computer interfaces offer new applications for our brain signals—and a new vector for security and privacy violations.

Read more

Aug 9, 2016

DARPA competition sees dawn of autonomous IoT hacking

Posted by in categories: cybercrime/malcode, internet, military, quantum physics, robotics/AI

Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.


A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.

DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.

Continue reading “DARPA competition sees dawn of autonomous IoT hacking” »

Aug 9, 2016

Autonomous car development will speed up following a fatality

Posted by in categories: cybercrime/malcode, robotics/AI, transportation

Many folks have voiced the concerns over autonomous autos for many legitimate reasons including hacking and weak satellite signals for navigation especially when you review mountain ranges of the east coast.


The world has witnessed enormous advances in autonomous passenger vehicle technologies over the last dozen years.

The performance of microprocessors, memory chips and sensors needed for autonomous driving has greatly increased, while the cost of these components has decreased substantially.

Continue reading “Autonomous car development will speed up following a fatality” »