Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 195

Aug 25, 2016

So your company’s been hacked: How to handle the aftermath

Posted by in categories: cybercrime/malcode, education, encryption

I can honestly say that many of us working with QC hasn’t warned folks for a while on the hacking risks around QC going against even today’s most sophisticated encryption models & methods; and to be developing a strategy in how to best handle this risk. With last weeks launch by China has shown the world that we are definitely not a decade away from this risk.


Education and planning are key, cyber-security expert Tyler Cohen Wood says.

Read more

Aug 24, 2016

Why quantum satellites will make it harder for states to snoop

Posted by in categories: cybercrime/malcode, quantum physics, satellites

Very true point.


With the launch of the world’s first quantum communication satellite, the era of unhackable communication has begun.

Read more

Aug 23, 2016

Defense Systems Update

Posted by in categories: cybercrime/malcode, quantum physics, space

Glad defense is finally taking this seriously. Something, that many of us already had concerns about.


The properties of quantum entanglement could deliver the first hack-proof communications.

Read more

Aug 22, 2016

China To Solve Quantum Physics From Space

Posted by in categories: cybercrime/malcode, quantum physics, satellites

China 2 yr Quantum Communication program’s goal is to reliably transmit ‘unhackable’ keys from space to the ground through quantum entanglement.


China has been the first country to utilize quantum technologies within their satellites in order to mitigate the threats from cyber attacks in their country.

Read more

Aug 19, 2016

QUESS and Quantum Communications

Posted by in categories: cybercrime/malcode, encryption, government, internet, quantum physics, space

Excellent write up on QUESS; and yesterday we saw that the first set of code was transmitted successfully which means so far success. However, many are asking when will the US respond about our own efforts around our own efforts of a Quantum satellite and our own progress around improving the net infrastructure to ensure we’re not a sitting duck for government backed hackers. Granted we have been operating for many years a version of a Quantum Internet at Los Alamos; however, we need to expand and accelerate the efforts around the Quantum Internet restructuring.


In mid August China launched “QUESS” (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of “quantum communications” which is supposed to be hack-proof, through the use of “quantum entanglement”. This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information.

According the Chinese scientists involved in the project, quantum encryption is secure against any kind of computing power because information encoded in a quantum particle is destroyed as soon as it is measured. (According to Tibor Molnar a scientist at the University of Sydney), the only way to ‘observe’ a photon is to have it interact with (a) an electron, or (b) an electromagnetic field. Either of these interactions will cause the photon to “decohere” – i.e., interfere with it in a way that will be apparent to the intended recipient.

Continue reading “QUESS and Quantum Communications” »

Aug 18, 2016

Hacker claims to be selling stolen NSA spy tools

Posted by in categories: cybercrime/malcode, privacy

SOMEONE over at the NSA has a date with a small, windowless cell in a deep dark hole in the ground in their near future, me thinks.


Hacking tools — possibly belonging to the NSA — have been leaked and are now accessible to common criminal hackers.

Read more

Aug 18, 2016

Why China’s Quantum Satellite Is Incredible—And Will Surely Be Overhyped

Posted by in categories: cybercrime/malcode, quantum physics, satellites

Sure some things may be hyped up; however, not everything including hacking. And, I would not wish to see others make the mistake of believing that they will not be hacked by state funded hackers with access to a quantum network. Especially, when you understand China’s advances in QC and close partnerships with Australia’s QC labs and researchers.


A word of caution so we can all be excited for the right reasons.

Continue reading “Why China’s Quantum Satellite Is Incredible—And Will Surely Be Overhyped” »

Aug 17, 2016

Israeli Startup BioCatch Tracks Online Behavior, Human Memory To Catch Cybercrooks

Posted by in categories: cybercrime/malcode, finance

https://youtube.com/watch?v=q90JYGxk5xw

The company is now marketing software to help banks and online stores distinguish good users from criminals.

Read more

Aug 16, 2016

Bot-Run Company of the Future Gets Hacked: New at Reason

Posted by in categories: cybercrime/malcode, futurism, robotics/AI

They have been warned in the past; and chose to ignore. Bot operated company gets hacked.


A funny thing happened on the way to a post-capitalist, crypto-anarchist utopia.

Read more

Aug 16, 2016

Everything you need to know about the NSA hack (but were afraid to Google)

Posted by in categories: cybercrime/malcode, encryption, information science, privacy

A day in the life of an NSA Hacker.


In what Edward Snowden deems “not unprecedented,” hackers calling themselves the Shadow Brokers have collected NSA-created malware from a staging server run by the Equation Group, an internal hacking team. The Shadow Brokers published two chunks of data, one “open” chunk and another encrypted file containing the “best files” that they will sell for at least $1 million. Wikileaks has said they already own the “auction” files and will publish them in “due course.”

They’ve also released images of the file tree containing a script kiddie-like trove of exploits ostensibly created and used by the NSA as well as a page calling out cyber warriors and “Wealthy Elites.” The page also contains links to the two files, both encrypted. You can grab them using BitTorrent here.

Continue reading “Everything you need to know about the NSA hack (but were afraid to Google)” »