Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 189

Jan 19, 2017

First quantum satellite surpasses expectations

Posted by in categories: cybercrime/malcode, quantum physics, space travel

More on the completion of phase 1 testing of by the Chinese on their Quantum Satellite as they have kicked their second phase that includes hacking.


Five space exploration projects to begin during 13th Five-Year Plan

Micius, the world’s first quantum satellite, has successfully completed four months of in-orbit tests since China launched it on Aug 16, the Chinese Academy of Sciences has announced.

Continue reading “First quantum satellite surpasses expectations” »

Jan 18, 2017

China’s quantum science satellite begins ‘spooky’ and ‘unhackable’ experiments

Posted by in categories: cybercrime/malcode, quantum physics, satellites, science

Hope folks are realizing this is happening and now real. Not sure what experiments their doing as they have already been experimenting already on hacking.


The world’s first quantum science and communications satellite has been handed over to Chinese scientists for the official start of experiments to test the phenomena of quantum entanglement and ‘unhackable’ quantum communication.

The Quantum Experiments at Space Scale (QUESS) satellite was launched on August 15 last year and soon after began testing its payloads and space-to-ground links.

Continue reading “China’s quantum science satellite begins ‘spooky’ and ‘unhackable’ experiments” »

Jan 16, 2017

The weird and spooky stories told by people who explored the internet’s hidden websites

Posted by in categories: cybercrime/malcode, internet

The “Dark Web” is a hidden corner of the internet that is home to many things people want to keep in the shadows: drugs, counterfeits, stolen items, and so on.

But there are also far stranger elements.

A popular thread on Reddit once asked the simple question, “What’s your Deep Web story?” In other words, the Reddit user was asking people to share any weird experiences they had encountered while using anonymous web services to access secret websites.

Continue reading “The weird and spooky stories told by people who explored the internet’s hidden websites” »

Jan 5, 2017

The Future Of Encryption

Posted by in categories: business, cybercrime/malcode, encryption, engineering, internet, quantum physics

QC in the mainstream is definitely viable less than 7 yrs. and possible within 5 yrs. However, I have a friend who even believes we’re looking at 3 years.


Internet security, once considered to be strictly in the domain of the wonkiest tech experts, has become central to public discourse over the past year. Besides the attacks on the DNC, even tech savvy business like Snapchat, Oracle and Verizon Enterprise Solutions have had significant breaches in the last year.

For the most part, these attacks were preventable. Often, hackers use a technique called social engineering, to trick people into allowing them into a system. Other times, they exploit a vulnerability in software to give them access to confidential data. In most cases, more stringent procedures can prevent attacks.

Continue reading “The Future Of Encryption” »

Jan 5, 2017

Cryptographers Rally to NIST Call for Quantum Computer Algorithms

Posted by in categories: cybercrime/malcode, encryption, government, information science, military, privacy, quantum physics

Has anyone besides NSA, NIST, DARPA, IARPA, etc. realize and thought about what type of cyber warfare will exist in a QC world? The skillsets alone will be so far advance than the techies that we have seen in most companies today as well as in most government agencies. Granted we’re simplifying things with the platform; however, skillsets will still need to be more advance than what we have seen with the standard techie.


Members of the cryptography community have expressed interest in the National Institute of Standards and Technology’s (NIST) recent call for an algorithm less susceptible to hacks from a computer that does not exist yet.

NIST announced a call for proposals for post-quantum cryptography standardization on Dec. 20. One or more of the proposed algorithms will ultimately replace some of NIST’s cryptographic standards that are most vulnerable to quantum computers. According to Dustin Moody, a mathematician at NIST, 40 people have joined the agency’s online cryptography forum since the call was announced two weeks ago. The forum had about 200 members before the call went out. Moody said that many people were anticipating the announcement, as cryptography enthusiasts tend to run in the same circles.

Continue reading “Cryptographers Rally to NIST Call for Quantum Computer Algorithms” »

Jan 2, 2017

US Government Escalates Push for Post-Quantum Cryptography

Posted by in categories: bitcoin, cybercrime/malcode, encryption, government, information science, privacy, quantum physics

Federal agencies of the US government are expanding their calls for quantum computing resistant encryption methods. In effect, the National Institute of Standards (NIST) recently announced a request for public-key post-quantum algorithms. This action follows warnings from the National Security Agency (NSA) about the risks of potential quantum-based cyberattacks and the NSA’s appeal for developing post-quantum algorithms.

Also read: New Developments in Quantum Computing Impact Bitcoin

Moreover, in the near future, it might possible for anyone to manipulate the awesome power of quantum computing. The astronomical price of a quantum computer would not be a limitation because, for example, IBM is offering to the general public quantum computing via the cloud.

Read more

Dec 30, 2016

McAfee debunks new FBI report on Russian hacking

Posted by in categories: cybercrime/malcode, geopolitics

During an interview with Larry King Friday, cybersecurity expert John McAfee debunked the new FBI report alleging Russian hacking in election 2016.

(WASHINGTON, DC) Following the release of an FBI report outlining Russia’s alleged role in hacking the 2016 election, Larry King sat down to talk with tech pioneer John McAfee to discuss the current state of cybersecurity.

Continue reading “McAfee debunks new FBI report on Russian hacking” »

Dec 30, 2016

FBI, DHS release report on Russian hacking as administration-ordered sanctions take effect

Posted by in category: cybercrime/malcode

The FBI and DHS have released a joint report into the hacking attempts against the United States, while President Obama announces specific sanctions against Russia.

Read more

Dec 26, 2016

Blake Dowling: Hacking, weaponized artificial intelligence, ransomware and other fun just for you

Posted by in categories: cybercrime/malcode, drones, military, robotics/AI

Breaches, hacking, ransomware, cyber threats, weaponized AI, smart toothbrushes are but a few examples of scary tech out there to make your day less than fantastic.

Weapons systems that think on its own are in production, with governments racing to catch up on how to regulate these fast-paced advancements.

Police and military already use drones and robots to eliminate threats, but (as far as we know) it’s hardware controlled by humans.

Continue reading “Blake Dowling: Hacking, weaponized artificial intelligence, ransomware and other fun just for you” »

Dec 25, 2016

China’s stringent cyber security law; Technological and human rights implications for the world

Posted by in categories: business, cybercrime/malcode, economics, internet, law, military, space

Hmmm.


Technological and human rights implications for the world

China adopted the highly controversial cyber security law on 7th November 2016. The legislation which will take effect in June 2017 was passed by its largely rubber – stamp parliament emphasizing the ‘objective need’ of China as a major internet power. The stated objective of the law is to counter the growing threats such as hacking and terrorism. Overseas critics of the law are not amused as it has already triggered concerns among foreign business and rights groups that the law threatens to shut foreign technology companies out of various sectors which China deems as ‘critical’. The legislation also incorporates contentious requirements for security reviews and for data to be stored on servers in China.

Continue reading “China’s stringent cyber security law; Technological and human rights implications for the world” »