A milestone in the history of cybersecurity?
Cyberattacks on the power grid just became a much more real threat, according to researchers.
A milestone in the history of cybersecurity?
Cyberattacks on the power grid just became a much more real threat, according to researchers.
The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.
In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.
While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.
“Companies around the world are bracing themselves for an avalanche of cyber security regulation, as governments scramble to introduce rules forcing corporate groups to build stronger defences against catastrophic hacks.”
Official video for PostHuman — produced by Colliculi Productions.
Animated sci-fi thriller short film featuring the voice of Tricia Helfer (Battlestar Galactica). Directed by Cole Drumb. Produced by Jennifer Wai-Yin Luk.
Production company: Colliculi Productions.
Animation studio: Humouring The Fates.
Voice of Kali: Tricia Helfer.
Voice of Terrence: Ulric Dihle.
Original Music: Neill Sanford Livingston.
Post Production Sound: Kid Dropper Sound.
Final Post Production Sound: Bad Animals.
Final Video Post Production: Lightpress.
Set in an adrenalized future of espionage, assassins, and out of control super science, PostHuman follows a genius hacker and his dog as they help an enigmatic young woman to free the remaining test subject of a black ops ESP test lab.
http://posthumanthemovie.com/
https://www.facebook.com/PostHumanTheMovie
https://twitter.com/PostHumanFilm
https://twitter.com/JenWLuk
https://twitter.com/ColeDrumb
http://www.imdb.com/title/tt2091950/
http://posthumanthemovie.tumblr.com/
Awards:
Screamfest 2012 — Best Animated Short.
Maelstrom International Fantastic Film Festival 2012 — Best Animation Short.
Arizona Underground Film Festival 2012 — Best Animation Short.
A clever attack by French researchers turns your headphone cable into an antenna to send surreptitious voice commands.
Having significantly damaged nerve tissue is bad for a lot of reasons because it doesn’t regenerate easily and it can lead to various serious medical conditions including paralysis. But many scientists are already studying ways of fixing this issue, and a team of researchers from the University of Minnesota, Virginia Tech, University of Maryland, Princeton University, and Johns Hopkins University has figured out how to use 3D printing for nerve growth.
DON’T MISS: 85 legitimate iPhone apps that were infected with malware in the big App Store hack
The technology they’ve developer has allowed them to regrow nerve tissue in lab rats and restore normal walking ability 10 to 12 weeks after the 3D printed guide was implanted.
From helicopters to medical devices and power stations, mathematical proof that software at the heart of an operating system is secure could keep hackers out.
China is set to complete the installation of the world’s longest quantum communication network stretching 2,000km (1,240miles) from Beijing to Shanghai by 2016, say scientists leading the project. Quantum communications technology is considered to be “unhackable” and allows data to be transferred at the speed of light.
By 2030, the Chinese network would be extended worldwide, the South China Morning Post reported. It would make the country the first major power to publish a detailed schedule to put the technology into extensive, large-scale use.
The development of quantum communications technology has accelerated in the last five years. The technology works by two people sharing a message which is encrypted by a secret key made up of quantum particles, such as polarized photons. If a third person tries to intercept the photons by copying the secret key as it travels through the network, then the eavesdropper will be revealed by virtue of the laws of quantum mechanics – which dictate that the act of interfering with the network affects the behaviour of the key in an unpredictable manner.
In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails. .
How about security hacking as a form of Turing’s Test?
“Next year’s Cyber Grand Challenge event will pit humans against machines in a grand hacking war”
Next year’s Cyber Grand Challenge event will pit humans against machines in a grand hacking war. DEF CON’s war gamers like their chances.