Toggle light / dark theme

New method on how to attend Def Con.


LAS VEGAS (AP) — Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats.

As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.

And for the good guys, knowing how to pick locks is important for learning how to defend against it.

Read more

Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.


A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.

DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.

So while the DARPA competition presents itself as a smiley affair, it dies represent the new face of an emerging weapon – and the most promising weapon on display came from the aforementioned ForAllSecure, a startup with close ties to Pittsburgh’s Carnegie Mellon University.

Read more

Many folks have voiced the concerns over autonomous autos for many legitimate reasons including hacking and weak satellite signals for navigation especially when you review mountain ranges of the east coast.


The world has witnessed enormous advances in autonomous passenger vehicle technologies over the last dozen years.

The performance of microprocessors, memory chips and sensors needed for autonomous driving has greatly increased, while the cost of these components has decreased substantially.

Software for controlling and navigating these systems has similarly improved.

Read more

I already voiced my concerns of this technology in the hands of criminals and terrorists. If we can have it so can others. Only when QC and a Quantum net is in place will we be truly protected with bots.


Cybersecurity could soon be another place where bots become invaluable for experts. DARPA recently organized The Cyber Grand Challenge, where computer algorithms showed how easy it is to clean up vulnerabilities in code written by humans. ( DARPA )

The Cyber Grand Challenge took place under DARPA patronage, and it is good to see how preoccupied the U.S. Department of Defense is with cybersecurity.

The event pitted computers against each other in an attempt to uncover which one can best fulfill the tasks of human cybersecurity researchers, that is, discovering a bug in a software program and fixing it.

Read more

I have reported on this threat for a very long time as we see more BMI technology advance. However, one are where things could drastically reduce hacking and breeches is the migration to a Quantum based net and infrastructure.


Cyberthieves might be mining personal information from your brainwaves at this very moment.

And although this may sound like a plot from a science fiction film, it is a growing concern among researchers who have demanded officials implement a privacy and security framework to block hackers from reading our neural signals.

Experts at the University of Washington have revealed how hackerscould inserting images into dodgy apps and recording our brain’s unintentional reaction using brain-computer interfaces.

Read more

Hackers fighting hackers; wonder what will happen in another20 years when super humans start to become more and more introduced into the mainstream, in this space. Stating dark web hackers will not have access to BMI and other enhancing technologies is not reality either.


The final round of DARPA’s Cyber Grand Challenge pits computers against one another as human programmers watch the future of cybersecurity unfold.

Read more

A Russian web hosting service is providing an avenue for cybercriminals to set up sites for selling stolen passwords, credit cards, and other pilfered personal information, a cybersecurity firm said.

The web hosting company Deer.io has become popular among online thieves because it’s easy to use and asks few questions from users, said Rick Holland, vice president of strategy at the cybersecurity firm Digital Shadows, on Tuesday at the Black Hat cybersecurity conference in Las Vegas.

Read more

This is the type of hijacking that the US DHS has been worried about. And, now we’re looking at self-driving Big Rigs and commercial jets.; as I stated last year I would hesitate in allowing autonomous planes and Big Rigs until we have a breech proof connected infrastructure in place.


As researchers demonstrate digital attacks on a 33,000 pound truck, car hacking is moving beyond consumer vehicles.

Read more