Archive for the ‘cybercrime/malcode’ category: Page 197
Aug 3, 2016
Russian web hosting service a favorite among cybercriminals
Posted by Karen Hurst in categories: cybercrime/malcode, internet
A Russian web hosting service is providing an avenue for cybercriminals to set up sites for selling stolen passwords, credit cards, and other pilfered personal information, a cybersecurity firm said.
The web hosting company Deer.io has become popular among online thieves because it’s easy to use and asks few questions from users, said Rick Holland, vice president of strategy at the cybersecurity firm Digital Shadows, on Tuesday at the Black Hat cybersecurity conference in Las Vegas.
Continue reading “Russian web hosting service a favorite among cybercriminals” »
Aug 2, 2016
Hackers Hijack a Big Rig Truck’s Accelerator and Brakes
Posted by Karen Hurst in categories: cybercrime/malcode, robotics/AI, transportation
This is the type of hijacking that the US DHS has been worried about. And, now we’re looking at self-driving Big Rigs and commercial jets.; as I stated last year I would hesitate in allowing autonomous planes and Big Rigs until we have a breech proof connected infrastructure in place.
As researchers demonstrate digital attacks on a 33,000 pound truck, car hacking is moving beyond consumer vehicles.
Jul 30, 2016
HoloLens Hack Fools the Brain Into Fixing Itself
Posted by Karen Hurst in categories: augmented reality, cybercrime/malcode, neuroscience
https://www.youtube.com/watch?v=tjoe3LrkiIk
Microsoft’s amazing HoloLens is the world’s first stand-alone headset that lets users see virtual objects and environments as if they existed in the real world. This device’s entertainment potential is practically unlimited, but as a Hackathon team recently demonstrated, it can also be used to rewire a malfunctioning brain.
A Microsoft employee suffering from myoclonus-dystonia —a condition where the misfiring of the brain causes uncontrollable muscle spasms—discovered that she could regain control during a spasm by looking at her partner’s feet rather than her own. And that’s how she got her great idea: Why not use the HoloLens to retrain the brain and get it to act differently? To that end, she recruited the Microsoft Hackathon team to put the idea to the test.
Continue reading “HoloLens Hack Fools the Brain Into Fixing Itself” »
Jul 29, 2016
China’s new quantum satellite paves the way for unhackable satellite internet
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, internet, quantum physics, satellites
All that I can say is “WOW!”
CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.
The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.
Continue reading “China’s new quantum satellite paves the way for unhackable satellite internet” »
Jul 28, 2016
Air Force awards contract for deceptive cyber research
Posted by Karen Hurst in category: cybercrime/malcode
The Air Force awarded a contract for research in deceptive cyber to be used toward network defense.
Jul 28, 2016
FBI’s Mass Hack Hit 50 Computers in Austria
Posted by Karen Hurst in category: cybercrime/malcode
Revelations that the ‘Operation Pacifier’ child porn investigation extended to Austria too shows the extent of the FBI’s reach overseas.
Jul 21, 2016
BioCryptography and Biometric Penetration Testing
Posted by Karen Hurst in categories: biotech/medical, cybercrime/malcode, engineering, privacy
I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.
In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.
But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.
Continue reading “BioCryptography and Biometric Penetration Testing” »
Jul 21, 2016
Enterprise Fellowships to kick-start the quantum technology industry
Posted by Karen Hurst in categories: business, cybercrime/malcode, energy, engineering, finance, health, internet, quantum physics, robotics/AI
Luv this.
The University of Bristol’s Quantum Technology Enterprise Centre (QTEC) is looking to recruit its first cohort of Enterprise Fellows that will be the next generation of quantum technology entrepreneurs.
Merging training in systems thinking, quantum engineering and entrepreneurship, QTEC will provide the necessary skills for budding innovators to develop their own business ideas and for them to branch out into the emerging field of quantum technologies.
The Centre, which is the first of its kind in the world, was funded as part of the UK’s £270 million investment into quantum technologies. These technologies exploit the laws of quantum mechanics to create practical and useful technologies that will outperform their classical rivals and that have the potential to transform artificial intelligence, healthcare, energy, finance, cyber security and the internet.
Continue reading “Enterprise Fellowships to kick-start the quantum technology industry” »
Jul 19, 2016
World-Check terror suspect DB hits the web at just US$6750
Posted by Karen Hurst in categories: cybercrime/malcode, internet
Want to buy the World-Check terror suspect DB? You can on the Dark Web for $6750.
Last month’s borked Couchdb breach delivers more pain to Thomson Reuters.