Toggle light / dark theme

I have reported on this threat for a very long time as we see more BMI technology advance. However, one are where things could drastically reduce hacking and breeches is the migration to a Quantum based net and infrastructure.


Cyberthieves might be mining personal information from your brainwaves at this very moment.

And although this may sound like a plot from a science fiction film, it is a growing concern among researchers who have demanded officials implement a privacy and security framework to block hackers from reading our neural signals.

Hackers fighting hackers; wonder what will happen in another20 years when super humans start to become more and more introduced into the mainstream, in this space. Stating dark web hackers will not have access to BMI and other enhancing technologies is not reality either.


The final round of DARPA’s Cyber Grand Challenge pits computers against one another as human programmers watch the future of cybersecurity unfold.

Read more

A Russian web hosting service is providing an avenue for cybercriminals to set up sites for selling stolen passwords, credit cards, and other pilfered personal information, a cybersecurity firm said.

The web hosting company Deer.io has become popular among online thieves because it’s easy to use and asks few questions from users, said Rick Holland, vice president of strategy at the cybersecurity firm Digital Shadows, on Tuesday at the Black Hat cybersecurity conference in Las Vegas.

Read more

This is the type of hijacking that the US DHS has been worried about. And, now we’re looking at self-driving Big Rigs and commercial jets.; as I stated last year I would hesitate in allowing autonomous planes and Big Rigs until we have a breech proof connected infrastructure in place.


As researchers demonstrate digital attacks on a 33,000 pound truck, car hacking is moving beyond consumer vehicles.

Read more

Microsoft’s amazing HoloLens is the world’s first stand-alone headset that lets users see virtual objects and environments as if they existed in the real world. This device’s entertainment potential is practically unlimited, but as a Hackathon team recently demonstrated, it can also be used to rewire a malfunctioning brain.

A Microsoft employee suffering from myoclonus-dystonia —a condition where the misfiring of the brain causes uncontrollable muscle spasms—discovered that she could regain control during a spasm by looking at her partner’s feet rather than her own. And that’s how she got her great idea: Why not use the HoloLens to retrain the brain and get it to act differently? To that end, she recruited the Microsoft Hackathon team to put the idea to the test.

Read more

All that I can say is “WOW!”


CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.

The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.

The reason world powers will be paying such close attention is that quantum-enabled spacecrafts are able to provide communication pathways that are completely unhackable. While the technology has been trialled on the ground over short distances, the capability to do so across the globe would be a huge game changer — it holds the promise of a world with completely secure digital communication.

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

But, there is one Security technology out there which, for the most part, cannot be spoofed or tricked. As a result, it can provide 100% proof positive of the identity of an end user. This technology is known as Biometrics.