Revelations that the ‘Operation Pacifier’ child porn investigation extended to Austria too shows the extent of the FBI’s reach overseas.
Category: cybercrime/malcode – Page 227
I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.
In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.
But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.
But, there is one Security technology out there which, for the most part, cannot be spoofed or tricked. As a result, it can provide 100% proof positive of the identity of an end user. This technology is known as Biometrics.
Luv this.
The University of Bristol’s Quantum Technology Enterprise Centre (QTEC) is looking to recruit its first cohort of Enterprise Fellows that will be the next generation of quantum technology entrepreneurs.
Merging training in systems thinking, quantum engineering and entrepreneurship, QTEC will provide the necessary skills for budding innovators to develop their own business ideas and for them to branch out into the emerging field of quantum technologies.
The Centre, which is the first of its kind in the world, was funded as part of the UK’s £270 million investment into quantum technologies. These technologies exploit the laws of quantum mechanics to create practical and useful technologies that will outperform their classical rivals and that have the potential to transform artificial intelligence, healthcare, energy, finance, cyber security and the internet.
Luv it; more believers.
Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”
While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”
Preventing potential nightmares for cryptographers and security organizations will require post-quantum cryptography, Braithwaite said. But Google is far from the only organization researching the possibilities.
The researchers have found a way a hacker can create sub-millimeter defects between printed layers that can create fatigue in the product.
Tags: 3D printer cyber security technology.
Woo and other entrepreneurs are using fasts and other tricks to “hack” their brain chemistry like they would a computer, hoping to give themselves an edge as they strive to dream up the next billion-dollar idea. Known by insiders as “biohacking,” the push for cognitive self-improvement is gaining momentum in the Silicon Valley tech world, where workers face constant pressure to innovate and produce at the highest levels.
DARPA’s self-repairing security system’s challenge.
In a few weeks, a town better known for events like the World Series of Poker will host the World Series of Hacking.
The finals of the Cyber Grand Challenge, which will be held by the Defense Advanced Research Projects Agency at the DEFCON security conference in Las Vegas next month, aim to see if a high performance computer system can discover and patch security systems automatically — without human intervention.
Seven teams will compete in the finals in front of 5,000 spectators packed into the Paris Las Vegas auditorium, waiting to see if a computer will be able to put the best human penetration testers and security researchers to shame.