Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 193

Mar 5, 2015

Protect Yourself from Cyber Crime

Posted by in category: cybercrime/malcode

By — SingularityHubhttp://cdn.singularityhub.com/wp-content/uploads/2015/02/15462325023_6bea87f2da_h-1000x400.jpg

This blog is about the downside of exponential technology: digital crime.

Normally, I choose to focus on the immensely positive impact technology has on humanity – the Abundance mindset.

Read more

Jan 28, 2015

Snowden Claims U.S. Policy Is Creating A Black Market For Digital Weapons

Posted by in category: cybercrime/malcode

— Tech Crunch

Edward Snowden says in a new interview with NOVA Next that the U.S. government wrongly promotes cyber offense strategies at the expense of weakening the system and leaving it open to cyber attacks from the black market.

“We’re creating a class of Internet security researchers who research vulnerabilities, but then instead of disclosing them to the device manufacturers to get them fixed and to make us more secure, they sell them to secret agencies,” Snowden says. “They sell them on the black market to criminal groups to be able to exploit these to attack targets. And that leaves us much less secure, not just on an individual level, but on a broad social level; on a broad economic level. And beyond that, it creates a new black market for computer weapons, basically digital weapons.”

Read more

Jan 4, 2015

New Book: An Irreverent Singularity Funcyclopedia, by Mondo 2000’s R.U. Sirius.

Posted by in categories: 3D printing, alien life, automation, big data, bionic, bioprinting, biotech/medical, complex systems, computing, cosmology, cryptocurrencies, cybercrime/malcode, cyborgs, defense, disruptive technology, DNA, driverless cars, drones, economics, electronics, encryption, energy, engineering, entertainment, environmental, ethics, existential risks, exoskeleton, finance, first contact, food, fun, futurism, general relativity, genetics, hacking, hardware, human trajectories, information science, innovation, internet, life extension, media & arts, military, mobile phones, nanotechnology, neuroscience, nuclear weapons, posthumanism, privacy, quantum physics, robotics/AI, science, security, singularity, software, solar power, space, space travel, supercomputing, time travel, transhumanism

Quoted: “Legendary cyberculture icon (and iconoclast) R.U. Sirius and Jay Cornell have written a delicious funcyclopedia of the Singularity, transhumanism, and radical futurism, just published on January 1.” And: “The book, “Transcendence – The Disinformation Encyclopedia of Transhumanism and the Singularity,” is a collection of alphabetically-ordered short chapters about artificial intelligence, cognitive science, genomics, information technology, nanotechnology, neuroscience, space exploration, synthetic biology, robotics, and virtual worlds. Entries range from Cloning and Cyborg Feminism to Designer Babies and Memory-Editing Drugs.” And: “If you are young and don’t remember the 1980s you should know that, before Wired magazine, the cyberculture magazine Mondo 2000 edited by R.U. Sirius covered dangerous hacking, new media and cyberpunk topics such as virtual reality and smart drugs, with an anarchic and subversive slant. As it often happens the more sedate Wired, a watered-down later version of Mondo 2000, was much more successful and went mainstream.”


Read the article here >https://hacked.com/irreverent-singularity-funcyclopedia-mondo-2000s-r-u-sirius/

Jan 3, 2015

Legal Consulting Firm Believes Artificial Intelligence Could Replace Lawyers by 2030

Posted by in categories: architecture, automation, big data, business, complex systems, computing, cybercrime/malcode, disruptive technology, economics, encryption, engineering, ethics, finance, futurism, geopolitics, governance, government, human trajectories, information science, innovation, internet, law, law enforcement, military, neuroscience, philosophy, policy, privacy, robotics/AI, science, security, software, strategy, supercomputing, transhumanism, transparency

Quoted: “Tony Williams, the founder of the British-based legal consulting firm, said that law firms will see nearly all their process work handled by artificial intelligence robots. The robotic undertaking will revolutionize the industry, “completely upending the traditional associate leverage model.” And: “The report predicts that the artificial intelligence technology will replace all the work involving processing information, along with a wide variety of overturned policies.”

Read the article here > https://hacked.com/legal-consulting-firm-believes-artificial…yers-2030/

Dec 29, 2014

Corporate Reconnoitering?

Posted by in categories: cybercrime/malcode, cyborgs, defense, economics, electronics, encryption, engineering, ethics, existential risks, finance, futurism, information science, innovation, life extension, physics, science, security, sustainability

Corporate Reconnoitering?

000000000 blitz 400
ABSOLUTE END.

Authored By Copyright Mr. Andres Agostini

White Swan Book Author (Source of this Article)

http://www.LINKEDIN.com/in/andresagostini

Continue reading “Corporate Reconnoitering?” »

Nov 20, 2014

Has the flawed password system finally had its day?

Posted by in categories: computing, cybercrime/malcode, encryption, privacy

— BBC

woman thinking in from of password graphic

Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess.

Yet we still forget them. And they also get stolen with alarming frequency.

Continue reading “Has the flawed password system finally had its day?” »

Sep 12, 2014

Celebgate Could Inspire More Bitcoin Blackmail

Posted by in categories: bitcoin, cybercrime/malcode

Caleb Chen — Cryptocoinsnews

bitcoin hacker blackmail

The Celebgate incident is still unfolding, and we are already seeing mainstream media report on the connection between the “nude celebrity photos” and Bitcoin. The original leaker of the pictures returned to 4chan recently to respond to the uproar he had caused. An excerpt from his post highlights Bitcoin’s involvement in Celebgate:

People wanted **** for free. Sure, I got $120 with my bitcoin address, but when you consider how much time was put into acquiring this stuff (i’m not the hacker, just a collector), and the money (i paid a lot via Bitcoin as well to get certain sets when this stuff was being privately traded Friday/Saturday) I really didn’t get close to what I was hoping.

Continue reading “Celebgate Could Inspire More Bitcoin Blackmail” »

Sep 7, 2014

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

Posted by in category: cybercrime/malcode

By — Wired

icloud-hack-tools-inline

As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

Read more

Aug 28, 2014

Don’t Get Hacked at Black Hat and DefCon

Posted by in category: cybercrime/malcode

By Neil J. Rubenking — PC
Black Hat 2014 Venue
The trainings component of the 2014 Black Hat USA conference in Las Vegas has already begun. Press folk aren’t invited for trainings, but SecurityWatch will be there to cover the briefings Wednesday and Thursday. The briefings can be shocking. In past years, researchers revealed a technique to pwn any iOS device using a gimmicked charger, described a technique for mining your Twitter feed to create convincing phishing emails, and demonstrated an Android weakness that would allow hackers to Trojanize an Android app undetectably. And those were all part of the relatively sedate Black Hat; things get even hairier at the wild and woolly DefCon that follows.

The world’s best hackers flock to these conferences, people who live and breathe security and hacking. They don’t stop trying to hack all the things just because they’re at a conference. In fact, DefCon features a “Wall of Sheep” to publicly shame any attendees careless enough to get hacked. If you’re attending, you’ll want to crank up your paranoia and be as careful as possible.

Read more

Apr 24, 2014

Parables involving the Theft of Knowledge

Posted by in categories: cybercrime/malcode, philosophy, security, transhumanism

From CLUBOF.INFO

All religions have points of agreement concerning human toil and its relationship to the divine. This essay considers some of the Biblical and Hellenic parables of human origin, specifically the origins of human knowledge and instrumentality.

Here I want to present how knowledge and instrumentality are reported to originate with an act of mischief, specifically the theft of a divine artifact. My argument is that, although the possession of knowledge may be seen as a sin to be atoned for, the kind of atonement originally promoted may have simply been for us to apply our knowledge constructively in our lives. The concept of atoning for original sin (whether it is the Biblical or Hellenic sin) can then be justified with secular arguments. Everyone can agree that we retain the capacity for knowledge, and this means our atonement for the reported theft of such knowledge would simply rest with the use of the very same tool we reportedly stole.

The story of the titan Prometheus, from ancient Greek mythology, has been interpreted and reinterpreted many times. A great deal of writers and organizations have laid claim to the symbolism of Prometheus, including in modern times. [1] I would argue that too many writers diluted and over-explored the meaning of the parable by comparing everything to it, although this is not the focus of my essay. Greek mythology is notably weak on the subject of “good and evil” because it predates the Judeo-Christian propagation of their dualism, and this means most of the characters in Greek mythology can be defended or condemned without violating Hellenic theology. Prometheus as a mythic figure could be condemned from a Christian standpoint, because he seems strikingly similar to other scriptural characters engaged in a revolt against the divine. Yet the spirit of Prometheus and his theft has also been endorsed by people and organizations, such as the transhumanists who see him as an expression of the noblest human aspirations. [2]

Continue reading “Parables involving the Theft of Knowledge” »