Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 200

Aug 2, 2016

Hackers Hijack a Big Rig Truck’s Accelerator and Brakes

Posted by in categories: cybercrime/malcode, robotics/AI, transportation

This is the type of hijacking that the US DHS has been worried about. And, now we’re looking at self-driving Big Rigs and commercial jets.; as I stated last year I would hesitate in allowing autonomous planes and Big Rigs until we have a breech proof connected infrastructure in place.


As researchers demonstrate digital attacks on a 33,000 pound truck, car hacking is moving beyond consumer vehicles.

Read more

Jul 30, 2016

HoloLens Hack Fools the Brain Into Fixing Itself

Posted by in categories: augmented reality, cybercrime/malcode, neuroscience

https://www.youtube.com/watch?v=tjoe3LrkiIk

Microsoft’s amazing HoloLens is the world’s first stand-alone headset that lets users see virtual objects and environments as if they existed in the real world. This device’s entertainment potential is practically unlimited, but as a Hackathon team recently demonstrated, it can also be used to rewire a malfunctioning brain.

A Microsoft employee suffering from myoclonus-dystonia —a condition where the misfiring of the brain causes uncontrollable muscle spasms—discovered that she could regain control during a spasm by looking at her partner’s feet rather than her own. And that’s how she got her great idea: Why not use the HoloLens to retrain the brain and get it to act differently? To that end, she recruited the Microsoft Hackathon team to put the idea to the test.

Continue reading “HoloLens Hack Fools the Brain Into Fixing Itself” »

Jul 29, 2016

China’s new quantum satellite paves the way for unhackable satellite internet

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics, satellites

All that I can say is “WOW!”


CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.

The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.

Continue reading “China’s new quantum satellite paves the way for unhackable satellite internet” »

Jul 28, 2016

Air Force awards contract for deceptive cyber research

Posted by in category: cybercrime/malcode

The Air Force awarded a contract for research in deceptive cyber to be used toward network defense.

Read more

Jul 28, 2016

FBI’s Mass Hack Hit 50 Computers in Austria

Posted by in category: cybercrime/malcode

Revelations that the ‘Operation Pacifier’ child porn investigation extended to Austria too shows the extent of the FBI’s reach overseas.

Read more

Jul 21, 2016

BioCryptography and Biometric Penetration Testing

Posted by in categories: biotech/medical, cybercrime/malcode, engineering, privacy

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

Continue reading “BioCryptography and Biometric Penetration Testing” »

Jul 21, 2016

Enterprise Fellowships to kick-start the quantum technology industry

Posted by in categories: business, cybercrime/malcode, energy, engineering, finance, health, internet, quantum physics, robotics/AI

Luv this.


The University of Bristol’s Quantum Technology Enterprise Centre (QTEC) is looking to recruit its first cohort of Enterprise Fellows that will be the next generation of quantum technology entrepreneurs.

Merging training in systems thinking, quantum engineering and entrepreneurship, QTEC will provide the necessary skills for budding innovators to develop their own business ideas and for them to branch out into the emerging field of quantum technologies.

The Centre, which is the first of its kind in the world, was funded as part of the UK’s £270 million investment into quantum technologies. These technologies exploit the laws of quantum mechanics to create practical and useful technologies that will outperform their classical rivals and that have the potential to transform artificial intelligence, healthcare, energy, finance, cyber security and the internet.

Continue reading “Enterprise Fellowships to kick-start the quantum technology industry” »

Jul 19, 2016

World-Check terror suspect DB hits the web at just US$6750

Posted by in categories: cybercrime/malcode, internet

Want to buy the World-Check terror suspect DB? You can on the Dark Web for $6750.


Last month’s borked Couchdb breach delivers more pain to Thomson Reuters.

Read more

Jul 19, 2016

Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Luv it; more believers.


Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”

While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”

Continue reading “Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks” »

Jul 18, 2016

Indian-origin researchers find cyber security risks in 3D printing

Posted by in categories: 3D printing, cybercrime/malcode

The researchers have found a way a hacker can create sub-millimeter defects between printed layers that can create fatigue in the product.

Tags: .

Read more