Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 188

Jul 21, 2017

As Cyberattacks Destabilize the World, the State Department Turns a Blind Eye

Posted by in category: cybercrime/malcode

I found an interesting article via Newsfusion Tech News — I thought you might like it:

Read more

Jul 20, 2017

Everyone would love to write code that didn’t require extensive testing and continuous cycles of debugging, but we all know that simply isn’t possible with current technology

Posted by in category: cybercrime/malcode

What if a new tool could allow software to be written without bugs, and eliminate the need for time consuming test procedures? In this video, Jon Howell and Jay Lorch discuss “IronFleet,” the first methodology for automatically verifying distributed systems and the subject of a Research Highlights video in the July 2017 issue of CACM.

ow.ly/lhds30dwdi5

Read more

Jul 4, 2017

I’m A Cyborg And So Are You

Posted by in categories: cybercrime/malcode, cyborgs, energy, neuroscience

I have recently re-kindled my interest in neuro-hacking, the process of using technological and spiritual tools to essentially hack my consciousness, make myself calmer, and of course, happier! I’ve been using vitamins (D3!) and isochronic tones for some time, but I have run across a number of new devices and apps recently. I got a demo kit for a new device called Thync, that purports to alter brain waves to achieve greater calm, less stress, and more energy. This follows, for me, several decades of interest in this arena, also fueled by a bunch of projects in the works that seek to augment human potential using the latest brain science, emerging hardware, and games.

This is an area of professional interest as well as personal. I’m a socio-cultural anthropologist with a focus on digital culture, technology use, and future possibilities. My graduate work focused on social learning associated with online gaming. A lot of my focus falls into a sub-discipline of anthropology known as cyborg anthropology:

Read more

Jun 18, 2017

China Shatters “Spooky Action at a Distance” Record, Preps for Quantum Internet

Posted by in categories: cybercrime/malcode, internet, quantum physics, space

Results from the Micius satellite test quantum entanglement, pointing the way toward hack-proof global communications—and a new space race.

Read more

Jun 14, 2017

Neural Implant Tech Raises the Specter of Brainjacking

Posted by in categories: cybercrime/malcode, Elon Musk, internet, neuroscience

Fun in fiction. Perhaps not so much in reality.


The human mind is already pretty open to manipulation—just ask anyone who works in advertising. But neural implant technology could potentially open up a direct digital link to our innermost thoughts that could be exploited by hackers.

In recent months, companies like Elon Musk’s Neuralink, Kernel, and Facebook have unveiled plans to create devices that will provide a two-way interface between human brains and machines.

Continue reading “Neural Implant Tech Raises the Specter of Brainjacking” »

May 26, 2017

Russian group delivers the first unhackable quantum-safe blockchain

Posted by in categories: bitcoin, cryptocurrencies, cybercrime/malcode, government, particle physics, quantum physics

Quantum computing and the blockchain both get plenty of attention in 2017, and now researchers in Russia have combined the two to create what they claim is an unhackable distributed-ledger platform.

The new technology, described as the “first quantum-safe blockchain,” promises to make it secure for organizations to transfer data without the fear of hacking from even the most powerful computers, in this case, the emerging field of quantum computing. Quantum computers make use of the quantum states of subatomic particles to store information, with the potential to do some calculations far faster than current computers. There’s some dispute whether we have actually reached that point yet, but companies such as Google Inc. are promising that true quantum computing is just around the corner.

“Quantum computers pose a major threat to data security today and could even be used to hack blockchains, destroying everything from cryptocurrencies like bitcoin to secure government communications,” a spokesperson for the Russian Quantum Center told SiliconANGLE. “Because quantum computers can test a large number of combinations at once, they will be able to destroy these digital signatures, leaving the blockchain vulnerable.”

Continue reading “Russian group delivers the first unhackable quantum-safe blockchain” »

May 19, 2017

World Asteroid Day Hackathon

Posted by in categories: asteroid/comet impacts, cybercrime/malcode, education, existential risks, media & arts

“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software.” https://en.wikipedia.org/wiki/Hackathon

In February 2014, Dr. Brian May, astrophysicist and famed guitarist for the rock band QUEEN, began working with Grigorij Richters, the director of a new film titled 51 Degrees North, a fictional story of an asteroid impact on London and the resulting human condition. May composed the music for the film and suggested that Richters preview it at Starmus, an event organized by Dr. Garik Israelian and attended by esteemed astrophysicists, scientists and artists, including Dr. Stephen Hawking, Richard Dawkins and Rick Wakeman. The result was the beginning of discussions that would lead to the launch of Asteroid Day in 2015. See : https://asteroidday.org/

Read more

May 18, 2017

Cybercrime: A Black Market Price List From The Dark Web

Posted by in category: cybercrime/malcode

What does it cost for malware, stolen identities and other tools of the cybercriminal trade? Probably less than you think.

Previous

1 of 10.

Continue reading “Cybercrime: A Black Market Price List From The Dark Web” »

May 14, 2017

NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet

Posted by in categories: cybercrime/malcode, encryption, internet, supercomputing

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Continue reading “NYU Accidentally Leaked a Top-Secret Code-Breaking Supercomputer to The Entire Internet” »

May 12, 2017

‘Accidental hero’ finds kill switch to stop spread of ransomware cyber-attack

Posted by in category: cybercrime/malcode

Spread of malware curtailed by expert who simply registered a domain name for a few dollars, giving many across world time to protect against attack.

Read more