Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 209

Feb 4, 2016

Humans get frozen out of frontline security

Posted by in categories: cybercrime/malcode, robotics/AI, security

Not sure how I missed this article from late Jan. If you haven’t read my article on Linkedin Pulse called “AI holding your information hostage — food for thought”; you may wish to read it. It parallels beautifully with this report/ article:


A new report from application delivery and cyber security specialist Radware suggests that the human element will increasingly be excluded from security as 2016 brings a ‘battle of the bots’.

It finds that throughout 2015, no industry was immune to cyber attacks, and few were prepared for them. In 2016, attacks are predicted to become even more aggressive with the arrival of Advanced Persistent Denial of Service (APDoS) attacks and an increase in volume and scope of sophisticated bot-generated assaults against web application infrastructure.

Read more

Feb 4, 2016

MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack

Posted by in categories: cybercrime/malcode, materials, security

Non-hackable RFIDs


You might not realize it, but radio frequency identification (RFID) tech is everywhere these days. From the cards in your wallet, to inventory control in warehouses, it’s the technology that works behind the scenes to power the world around you. RFID has brought efficiency to complicated industries and makes our tiny devices and everyday carry items speak to each other. But RFID technology has also been very vulnerable to security attacks and information hackers – until now. A team of researchers from MIT and Texas Instruments have developed a new kind of RFID chip that they believe is impossible to hack.

The new RFID chip is made of ferroelectric crystals, which are material made up of molecules arranged in a lattice pattern across three dimensions. Thanks to this unique structure, when you apply electricity to the lattice, each cell can be polarized as either positive or negative, representing the values of a bit of information. Because the cells retain their polarization when the electric field is removed, the chips can store data even when they’re powered off. Texas Instruments developed a series of 3.3-volt capacitors for the chip’s energy source, and 1.5-volt cells for data storage.

Continue reading “MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack” »

Feb 4, 2016

U.S. To Rework Arms Control Rule on Exporting Hacker Tools

Posted by in categories: cybercrime/malcode, security

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Feb 4, 2016

DOT&E: Cyber Vulnerabilities Plague Battlefield Comms

Posted by in categories: cybercrime/malcode, military

Cyber is still a challenge for soldiers on the battlefield.


Editor’s Note: This story has been updated to include comment from an industry official.

WASHINGTON — Cyber vulnerabilities continue to plague the Army’s battlefield communications, according to the Pentagon’s top weapons tester, while the service works to harden its network against cyber attacks.

Continue reading “DOT&E: Cyber Vulnerabilities Plague Battlefield Comms” »

Jan 27, 2016

Israel Hit with Massive Cyberattack Targeting Electrical Grid

Posted by in categories: cybercrime/malcode, quantum physics

Cyber attacks on our power grids — As I have highlighted in my Jan 10th Pulse positing “Quantum Computing – things that need to be considered for our future Quantum Computing” we mush get our funding and special projects under way to prevent a possible Quantum hack by overseas hackers. Russia and China are both ramping up their infrastructures to be Quantum to protect their citizens and we must do the same.


Israel’s Electric Authority has revealed its systems have been the target of a “severe cyberattack” which, while under control, is yet to be fully repelled.

“We had to paralyze numerous computers of the Israeli electricity authorities”, he said.

Continue reading “Israel Hit with Massive Cyberattack Targeting Electrical Grid” »

Jan 20, 2016

Bill Gates and Elon Musk Will Save the World from AI?

Posted by in categories: cybercrime/malcode, Elon Musk, employment, habitats, robotics/AI, transportation

I must admit; I got a little laughter from reading the beginning of this article. However, there is a potential longer term concern around jobs and an even larger concern around data (including IP) when it comes to AI. So, I truly hope folks are strategically planning, designing, and implementing appropriate safeguards around their AI architecture and systems; especially if we look at hacking, etc.


Bill Gates, Elon Musk and Stephen Hawking have all done their part in warning the world of the true power of artificial intelligence. All three men were actually awarded the 2015 Luddite Award, which is given by the Information Technology & Innovation Foundation.

Because of their honest assessment on the power of new technology, these three men have been called alarmists who spread horror. There were 10 total nominees to the prices, and all three received them after getting more 3,680 votes.

Continue reading “Bill Gates and Elon Musk Will Save the World from AI?” »

Jan 13, 2016

Artificial intelligence: Who’s regulating the robots?

Posted by in categories: cybercrime/malcode, quantum physics, robotics/AI

Run away AI & Robots in particular do not worry me at this point. When we have Quantum based AI and Robots meaning they can fully operate themselves; that’s when we have to truly consider our real risks and ensure we have proper safe gaurds. The bigger issue with current AI and Robots that are not developed on a Quantum platform or technology is hacking. Hacking by others is the immediate threat for AI & Robots.


In this photo taken Thursday, July 9, 2015, SoftBank Corp.'s new robot Pepper performs during an interview at the technology company's headquarters in Tokyo. (AP Photo/Shizuo Kambayashi)

Read more

Jan 12, 2016

Cyber Threats 2016: Killer Robots, US Presidential Race, Critical Infrastructure, Mobile Payments And More

Posted by in categories: cybercrime/malcode, energy, internet, quantum physics, robotics/AI, transportation

As I have mentioned in some of my other reports and writings; infrastructure (power grids, transportation, social services, etc.) is a key area that we need to modernize and get funding soon in place given the changes that are coming. As Russia’s own power stations were hacked; it will not be anything to when the more sophisticated releases of the Quantum Internet and Platforms are finally releasing to the main stream. Someone last week asked me what kept me up at night worrying; I told them our infrastructure and we have not been planning or modernizing it to handle the changes that are coming in the next 5 years much less the next 7 years.


With cyberattacks gaining in sophistication and volume, we can expect to see a range of new targets in the year ahead.

Read more

Jan 6, 2016

Hackers caused a blackout for the first time, researchers say

Posted by in categories: cybercrime/malcode, energy

A milestone in the history of cybersecurity?


Cyberattacks on the power grid just became a much more real threat, according to researchers.

Read more

Nov 15, 2015

The Pentagon’s plan to outsource lethal cyber-weapons

Posted by in categories: cybercrime/malcode, military, privacy

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.

While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.

Read more