Toggle light / dark theme

Becoming Borg: What Is a Hive Mind in Science and Could Humanity Get There?

In Brief

  • Through the hive mind, everyone would be connected to everyone else telepathically, and we could all share our thoughts, memories, and even dreams with one another.
  • Though a global hive mind would be susceptible to things like hacking or thought control, it could also lead to almost unimaginable levels of innovation.

Communication technology tends to develop in a particular direction: more people communicating across larger distances using less effort to do so. Taken to its logical extreme, perfect communication would be anyone being able to talk to anyone, anywhere, using no effort at all.

The closest concept we have to this form of communication is something called the hive mind. Everyone would be connected to everyone telepathically, and we could all share our thoughts, memories, and even dreams with one another. Such a system of communication would not only have far-reaching consequences, it would also be hugely controversial.

Stolen Health Record Databases Sell For $500,000 In The Deep Web

Don’t be the CIO that sees their own this market as most Healthcare CIO’s will not allowed to stay given they are now a brand liability not to mention all those lawsuits that are coming from lawyers of the patients.


Electronic health record databases proving to be some of the most lucrative stolen data sets in cybercrime underground.

Medical insurance identification, medical profiles, and even complete electronic health record (EHR) databases have attracted the eyes of enterprising black hats, who increasingly see EHR-related documents as some of the hottest commodities peddled in the criminal underground. A new report today shows that complete EHR databases can fetch as much as $500,000 on the Deep Web, and attackers are also making their money off of smaller caches of farmed medical identities, medical insurance ID card information, and personal medical profiles.

The data comes by way of a report from Trend Micro’s TrendLabs Forward-Looking Threat Research (FTR) Team, which took a comprehensive look at how attackers are taking advantage of healthcare organizations’ weaknesses to devastating effect. Cybercriminals always have their eyes open for new profitable revenue streams, and the poor security around increasingly data-rich EHR systems pose a huge opportunity for the bad guys.

Dark Net Crime In Increase: Interview With Austrian Chief Inspector

There have been numerous dark net-related prosecutions in Europe in the past few months. The first country to wage a war against dark web criminals was Germany, where the government decided to provide more manpower to eliminate all kinds of illegal dark net activity. The Germans started focusing on the dark web shortly after the Münich shooting, which happened on July 22, 2016. Investigators discovered that the gunman acquired his weapon through a vendor on a dark net marketplace, who had been busted after the tragic incident.

By seeing the number of prosecutions, Austria is following the German example. A national news outlet, tips.at, conducted an interview with Chief Inspector Erwin Eilmannsberger, a police officer from Schärding, about the increasing dark net crime in his district.

Cryptographers Dismiss AI, Quantum Computing Threats

Cybercrime & Cybersecurity 0 20

There is a reason why they’re not in the private sector developing QC. Noticed all represented no one developing and delivering QC commercially. There is a reason why folks like this become nay sayers as it is hard when you’re not able to deliver and not hireable by the private sector to deliver QC. With such a huge demand for QC experts and in security; you have to wonder why these folks have not been employed in a QC Tech company especially when you see tech grabbing every professor they can to develop QC and especially cyber security. Also, I still never saw any bases or details scientifically for their argument why specifically where and how QC will not block hacking just a bunch of professors throwing out words and high level speculations.


SAN FRANCISCO—Cryptographers said at the RSA Conference Tuesday they’re skeptical that advances in quantum computing and artificial intelligence will profoundly transform computer security.

“I’m skeptical there will be much of an impact,” Ron Rivest, a MIT professor and inventor of several symmetric key encryption algorithms, said early at the annual Cryptographers’ Panel here.

Susan Landau, a professor who specializes in cybersecurity policy and computer science at Worcester Polytechnic Institute, said that while artificial intelligence can be helpful when it comes to processing lots of data effectively, she doesn’t think it will be useful in fingering out series attacks or anomalous situations.

Ghost in the Shell Theatrical Trailer

Theatrical Trailer for Ghost in the Shell.

Cyborg counter-cyberterrorist field commander The Major (Scarlett Johansson) and her task force Section 9 thwart cyber criminals and hackers. Now, they must face a new enemy who will stop at nothing to sabotage Hanka Robotics’ artificial intelligence technology.

The film is loosely based on Ghost in the Shell (manga), a seinen manga series written and illustrated by Masamune Shirowback in 1989.

Clues to protect quantum computing networks from hack attacks uncovered

I truly don’t mean to be so blunt about this article and the researchers involved. 1st of all this is a bogus report trying to make a team and their work get noticed. 2nd, anyone who sets up their QC this sloppy as this team did to prove hacking I would hope would never be hired into my organization as an admin or security officer.

The reality is that real QC environments in the real world with a qualified CSO/ CISO would never leave so many back doors open in reality.

So, this is a simulated version purposely set up with many holes and back doors in the prototype. So, readers be cautious is my suggestion.


Quantum computing, where bits of information can simultaneously hold multiple states, is also vulnerable to hacking. — Clues to protect quantum computing networks from hack attacks uncovered.