Toggle light / dark theme

Don’t be the CIO that sees their own this market as most Healthcare CIO’s will not allowed to stay given they are now a brand liability not to mention all those lawsuits that are coming from lawyers of the patients.


Electronic health record databases proving to be some of the most lucrative stolen data sets in cybercrime underground.

Medical insurance identification, medical profiles, and even complete electronic health record (EHR) databases have attracted the eyes of enterprising black hats, who increasingly see EHR-related documents as some of the hottest commodities peddled in the criminal underground. A new report today shows that complete EHR databases can fetch as much as $500,000 on the Deep Web, and attackers are also making their money off of smaller caches of farmed medical identities, medical insurance ID card information, and personal medical profiles.

The data comes by way of a report from Trend Micro’s TrendLabs Forward-Looking Threat Research (FTR) Team, which took a comprehensive look at how attackers are taking advantage of healthcare organizations’ weaknesses to devastating effect. Cybercriminals always have their eyes open for new profitable revenue streams, and the poor security around increasingly data-rich EHR systems pose a huge opportunity for the bad guys.

There have been numerous dark net-related prosecutions in Europe in the past few months. The first country to wage a war against dark web criminals was Germany, where the government decided to provide more manpower to eliminate all kinds of illegal dark net activity. The Germans started focusing on the dark web shortly after the Münich shooting, which happened on July 22, 2016. Investigators discovered that the gunman acquired his weapon through a vendor on a dark net marketplace, who had been busted after the tragic incident.

By seeing the number of prosecutions, Austria is following the German example. A national news outlet, tips.at, conducted an interview with Chief Inspector Erwin Eilmannsberger, a police officer from Schärding, about the increasing dark net crime in his district.

Read more

Cybercrime & Cybersecurity 0 20

There is a reason why they’re not in the private sector developing QC. Noticed all represented no one developing and delivering QC commercially. There is a reason why folks like this become nay sayers as it is hard when you’re not able to deliver and not hireable by the private sector to deliver QC. With such a huge demand for QC experts and in security; you have to wonder why these folks have not been employed in a QC Tech company especially when you see tech grabbing every professor they can to develop QC and especially cyber security. Also, I still never saw any bases or details scientifically for their argument why specifically where and how QC will not block hacking just a bunch of professors throwing out words and high level speculations.


SAN FRANCISCO—Cryptographers said at the RSA Conference Tuesday they’re skeptical that advances in quantum computing and artificial intelligence will profoundly transform computer security.

“I’m skeptical there will be much of an impact,” Ron Rivest, a MIT professor and inventor of several symmetric key encryption algorithms, said early at the annual Cryptographers’ Panel here.

Susan Landau, a professor who specializes in cybersecurity policy and computer science at Worcester Polytechnic Institute, said that while artificial intelligence can be helpful when it comes to processing lots of data effectively, she doesn’t think it will be useful in fingering out series attacks or anomalous situations.

Read more

Theatrical Trailer for Ghost in the Shell.

Cyborg counter-cyberterrorist field commander The Major (Scarlett Johansson) and her task force Section 9 thwart cyber criminals and hackers. Now, they must face a new enemy who will stop at nothing to sabotage Hanka Robotics’ artificial intelligence technology.

The film is loosely based on Ghost in the Shell (manga), a seinen manga series written and illustrated by Masamune Shirowback in 1989.

Read more

I truly don’t mean to be so blunt about this article and the researchers involved. 1st of all this is a bogus report trying to make a team and their work get noticed. 2nd, anyone who sets up their QC this sloppy as this team did to prove hacking I would hope would never be hired into my organization as an admin or security officer.

The reality is that real QC environments in the real world with a qualified CSO/ CISO would never leave so many back doors open in reality.

So, this is a simulated version purposely set up with many holes and back doors in the prototype. So, readers be cautious is my suggestion.


1st before ever passing an opinion of a hypothesis or lab controlled concept; we need to see it proven against the China’s Network and then try it on Los Alamos Quantum Network. My guess, not going to be successful as it is Ottawa’s version & not everyone else’s so comes to question did they even design their test network correctly as China and Los Alamos both are showing that their versions are not hack proof. BTW — China is in phase 2 of their Quantum network; as previous tests were successful; and Los Alamos has been online since 2009 without any reported hacks.

Until, they prove successful against China’s network and Los Alamos; just another hyped up story without proof.


University of Ottawa physicists say they’ve found a way to partially replicate data from supposedly completely secure system.

PUBLISHED : Sunday, 05 February, 2017, 12:03am.