Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 200

Jul 9, 2016

Technical Failure, Not Hackers, Took Down NATO-Linked Websites

Posted by in categories: cybercrime/malcode, geopolitics

Makes me wonder how much money was spent on this technical masterpiece.


WARSAW—Officials blamed technical failure—not a cyberattack—for the recent outages of two websites affiliated with the North Atlantic Treaty Organization.

NATO’s cybersecurity experts were on heightened alert for cyberattacks during the alliance’s biennial summit, which has seen the organization’s top leaders gather in the Polish capital this week.

Continue reading “Technical Failure, Not Hackers, Took Down NATO-Linked Websites” »

Jul 9, 2016

Microsoft calls for independent body to address cyber attribution

Posted by in category: cybercrime/malcode

No comment!


In a move to support the development of global cybersecurity norms, Microsoft calls for improved cyber attribution to identify cyberattack perpetrators.

Read more

Jul 8, 2016

Google Tinkers With Chrome Cryptosecurity To Fight Quantum Hacks

Posted by in categories: cybercrime/malcode, encryption, privacy, quantum physics

Glad Google is doing this because next month could be a real test when China launches its Quantum Satellite.


Today’s encryption is an arms race as digital security experts try to hold off hackers’ attempts to break open user data. But there’s a new tech on the horizon that even the NSA recognizes as crucial to protect against: quantum computing, which is expected to dramatically speed up attempts to crack some commonly-used cryptographic schemes. To get ahead of the game, Google is testing new digital security setups on single-digit populations of Chrome users.

Quantum computing is such a potential threat because it can do many more simultaneous calculations than current computers. Modern binary bits can only be in two states when electric current is run through them: 0 or 1. But the ambiguous nature of the quantum state means its elemental units (known as “qubits”) could be in either state at a time, so two could potentially be in four orientations at one time: 00, 01, 10 or 11. That ambiguity is exponential, so three qubits could be in eight at a time, and so on.

Continue reading “Google Tinkers With Chrome Cryptosecurity To Fight Quantum Hacks” »

Jul 8, 2016

DARPA Goes Full Tron With Its Grand Battle of the Hack Bots

Posted by in categories: cybercrime/malcode, robotics/AI

Definitely the longer term goal with security bots.


With its Cyber Grand Challenge—a battle of autonomous security software—DARPA is taking us inside the machine.

Read more

Jul 5, 2016

DARPA’s Hacking Contest Will Pit Machines Against Each Other

Posted by in category: cybercrime/malcode

Battle of the Machines.


DARPA is hosting a competition, the Cyber Grand Challenge, to find ways to solve cybersecurity vulnerabilities automatically.

Read more

Jun 28, 2016

No need in supercomputers

Posted by in categories: business, cybercrime/malcode, information science, particle physics, quantum physics, robotics/AI, singularity, supercomputing

Great that they didn’t have to use a super computer to do their prescribed, lab controlled experiments. However, to limit QC to a super computer and experimental computations only is a big mistake; I cannot stress this enough. QC is a new digital infrastructure that changes our communications, cyber security, and will eventually (in the years to come) provide consumers/ businesses/ and governments with the performance they will need for AI, Biocomputing, and Singularity.


A group of physicists from the Skobeltsyn Institute of Nuclear Physics, the Lomonosov Moscow State University, has learned to use personal computer for calculations of complex equations of quantum mechanics, usually solved with help of supercomputers. This PC does the job much faster. An article about the results of the work has been published in the journal Computer Physics Communications.

Senior researchers Vladimir Pomerantcev and Olga Rubtsova, working under the guidance of Professor Vladimir Kukulin (SINP MSU) were able to use on an ordinary desktop PC with GPU to solve complicated integral equations of quantum mechanics — previously solved only with the powerful, expensive supercomputers. According to Vladimir Kukulin, personal computer does the job much faster: in 15 minutes it is doing the work requiring normally 2–3 days of the supercomputer time.

Continue reading “No need in supercomputers” »

Jun 25, 2016

CYBERWAR (Trailer)

Posted by in categories: cybercrime/malcode, government, military, surveillance

Looks to be quite fascinating…

But is anyone else annoyed by the never ending use of the word “cyber”?

Continue reading “CYBERWAR (Trailer)” »

Jun 22, 2016

DOD looks to develop a preemptive approach to network defense

Posted by in category: cybercrime/malcode

The Joint Force Headquarters for the DOD Information Network, a subordinate command of Cyber Command, is developing a strategic plan for defending its networks around the world.

Read more

Jun 22, 2016

Israel to install its own cyber defenses on F-35 jets

Posted by in categories: cybercrime/malcode, military

IAF seeking approval to increase number of jets from 33 to 50, with a view of eventually having 75 aircraft.

Read more

Jun 13, 2016

New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second

Posted by in categories: cybercrime/malcode, internet, quantum physics

The things you learn on the DarkWeb. Wonder what will happen when more and more countries and folks onboard to the Quantum Internet, etc. Could we see one last massive apocalyptic raid on accounts, etc.?


X5 simplifies the process of stealing details from contactless debit cards, cloning fake debit cards.

A criminal group going under the name of The CC Buddies is selling a hi-tech device on the Dark Web that’s capable of copying details from contactless debit cards if held as close as eight centimeters away from a victim’s card.

Continue reading “New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second” »