Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 156

Apr 7, 2018

Non-tech businesses are beginning to use artificial intelligence at scale

Posted by in categories: business, cybercrime/malcode, finance, robotics/AI

A longer-term concern is the way AI creates a virtuous circle or “flywheel” effect, allowing companies that embrace it to operate more efficiently, generate more data, improve their services, attract more customers and offer lower prices. That sounds like a good thing, but it could also lead to more corporate concentration and monopoly power—as has already happened in the technology sector.


LIE DETECTORS ARE not widely used in business, but Ping An, a Chinese insurance company, thinks it can spot dishonesty. The company lets customers apply for loans through its app. Prospective borrowers answer questions about their income and plans for repayment by video, which monitors around 50 tiny facial expressions to determine whether they are telling the truth. The program, enabled by artificial intelligence (AI), helps pinpoint customers who require further scrutiny.

AI will change more than borrowers’ bank balances. Johnson & Johnson, a consumer-goods firm, and Accenture, a consultancy, use AI to sort through job applications and pick the best candidates. AI helps Caesars, a casino and hotel group, guess customers’ likely spending and offer personalised promotions to draw them in. Bloomberg, a media and financial-information firm, uses AI to scan companies’ earnings releases and automatically generate news articles. Vodafone, a mobile operator, can predict problems with its network and with users’ devices before they arise. Companies in every industry use AI to monitor cyber-security threats and other risks, such as disgruntled employees.

Continue reading “Non-tech businesses are beginning to use artificial intelligence at scale” »

Apr 3, 2018

Robot designed to defend factories against cyberthreats

Posted by in categories: cybercrime/malcode, robotics/AI

It’s small enough to fit inside a shoebox, yet this robot on four wheels has a big mission: keeping factories and other large facilities safe from hackers.

Meet the HoneyBot.

Continue reading “Robot designed to defend factories against cyberthreats” »

Mar 26, 2018

Scientists trace ransomware payments across the globe

Posted by in category: cybercrime/malcode

In ransomware attacks, your personal files are held hostage until you pay. Here are hackers’ most frequent targets and how they get their money.

Read more

Mar 23, 2018

Massive cyberhack by Iran allegedly stole research from 320 universities, governments, and companies

Posted by in categories: cybercrime/malcode, futurism

Targets included nearly 8000 professors in 22 countries.

Read more

Mar 3, 2018

Would you hack your own body?

Posted by in categories: cybercrime/malcode, futurism

The body-hackers who believe chips under the skin could replace keys and wallets in future.

Read more

Mar 2, 2018

GPS Isn’t Very Secure. Here’s Why We Need A Backup

Posted by in categories: cybercrime/malcode, drones, military, mobile phones, satellites

That’s not a lot to you. If your watch is off by 13.7 microseconds, you’ll make it to your important meeting just fine. But it wasn’t so nice for the first-responders in Arizona, Pennsylvania, Connecticut, and Louisiana, whose GPS devices wouldn’t lock with satellites. Nor for the FAA ground transceivers that got fault reports. Nor the Spanish digital TV networks that had receiver issues. Nor the BBC digital radio listeners, whose British broadcast got disrupted. It caused about 12 hours of problems—none too huge, all annoying. But it was a solid case study for what can happen when GPS messes up.

The 24 satellites that keep GPS services running in the US aren’t especially secure; they’re vulnerable to screw-ups, or attacks of the cyber or corporeal kind. And as more countries get closer to having their own fully functional GPS networks, the threat to our own increases. Plus, GPS satellites don’t just enable location and navigation services: They also give ultra-accurate timing measurements to utility grid operators, stock exchanges, data centers, and cell networks. To mess them up is to mess those up. So private companies and the military are coming to terms with the consequences of a malfunction—and they’re working on backups.

The 2016 event was an accidental glitch with an easily identifiable cause—an oops. Harder to deal with are the gotchas. Jamming and spoofing, on a small scale, are both pretty cheap and easy. You can find YouTube videos of mischievous boys jamming drones, and when Pokemon GO users wanted to stay in their parents’ basements, they sent their own phones fake signals saying they were at the Paris mall. Which means countries, and organized hacking groups, definitely can mess with things on a larger scale. Someone can jam a GPS signal, blocking, say, a ship from receiving information from satellites. Or they can spoof a signal, sending a broadcast that looks like a legit hello from a GPS satellite but is actually a haha from the hacker next-door.

Continue reading “GPS Isn’t Very Secure. Here’s Why We Need A Backup” »

Feb 21, 2018

AI being used for ‘malicious purposes’, warn experts

Posted by in categories: cybercrime/malcode, drones, military, robotics/AI

From healthcare to warfare, machine-based thinking is revolutionising the way we live, exposing us to the benefits and the risks. Twenty-six world experts in emerging technologies say cybercrime will grow and drones will be misused in the next decade.

Read more

Feb 16, 2018

Authorities deactivate transit pass implanted in biohacker’s hand

Posted by in categories: cybercrime/malcode, cyborgs, law

Meow-Ludo Disco Gamma Meow-Meow couldn’t just toss away his New South Wales transit pass even after he found out that it got deactivated while he was on a trip to the USee, Meow-Meow (yes, that is his legal name) cut the chip out of the travel card, encased it in biocompatible plastic and had it implanted under the skin on his left hand. The biohacker now plans to file a lawsuit against New South Wales’ transport authorities, not just to fight the decision, but also to help create laws around body-hacking tech. In addition to the transit pass chip, Meow-Meow has two other implanted elect…

Read more

Jan 31, 2018

A Chinese satellite just used quantum cryptography to make an unhackable video call between Beijing and Vienna

Posted by in categories: cybercrime/malcode, encryption, quantum physics, space

The Chinese “Micius” satellite has successfully set up the world’s most secure video conference, using quantum cryptography to connect scientists in Europe and China for an unhackable, intercontinental chat.

The feat marks another milestone for the satellite, officially called Quantum Experiments at Space Scale (QESS), which only last year was making headlines for transmitting an “unbreakable” quantum code to the Earth’s surface.

Read more

Jan 30, 2018

Ways AI Will Fight the Cybersecurity Battles of the Future

Posted by in categories: business, cybercrime/malcode, robotics/AI

Cybersecurity risks are on the rise. While the high-profile breaches at Target and Yahoo! captured our attention, they have also distracted us from the prevalence of cybersecurity risks in everyday life. The number of cyber-security breaches has more than doubled over the past few years. In the third quarter of 2016, over 18 million new forms of malware were discovered. That is nearly a quarter of a million new types of malware every single day.

Unfortunately, some of the most vulnerable companies are those that are least equipped to address these concerns. Industry experts estimate that 45% of all cyber-attacks are launched against small businesses. Almost half of all small businesses have been attacked, although most of them don’t know it. Nearly 70% of small businesses are forced into bankruptcy within six months of a particularly severe cyber-attack.

Despite the risks, small businesses are under greater pressure to cut costs. They can’t always afford top-tier protection.

Continue reading “Ways AI Will Fight the Cybersecurity Battles of the Future” »