Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 216

Oct 23, 2015

PostHuman — sci-fi action animated short film directed

Posted by in categories: cybercrime/malcode, entertainment, media & arts

Official video for PostHuman — produced by Colliculi Productions.
Animated sci-fi thriller short film featuring the voice of Tricia Helfer (Battlestar Galactica). Directed by Cole Drumb. Produced by Jennifer Wai-Yin Luk.

Production company: Colliculi Productions.
Animation studio: Humouring The Fates.
Voice of Kali: Tricia Helfer.
Voice of Terrence: Ulric Dihle.
Original Music: Neill Sanford Livingston.
Post Production Sound: Kid Dropper Sound.
Final Post Production Sound: Bad Animals.
Final Video Post Production: Lightpress.

Continue reading “PostHuman — sci-fi action animated short film directed” »

Oct 15, 2015

Hackers Can Silently Control Siri From 16 Feet Away

Posted by in category: cybercrime/malcode

A clever attack by French researchers turns your headphone cable into an antenna to send surreptitious voice commands.

Read more

Sep 23, 2015

Breakthrough medical discovery: 3D printing might be used to regenerate nerves

Posted by in categories: 3D printing, biotech/medical, cybercrime/malcode, mobile phones

Having significantly damaged nerve tissue is bad for a lot of reasons because it doesn’t regenerate easily and it can lead to various serious medical conditions including paralysis. But many scientists are already studying ways of fixing this issue, and a team of researchers from the University of Minnesota, Virginia Tech, University of Maryland, Princeton University, and Johns Hopkins University has figured out how to use 3D printing for nerve growth.

DON’T MISS: 85 legitimate iPhone apps that were infected with malware in the big App Store hack

Continue reading “Breakthrough medical discovery: 3D printing might be used to regenerate nerves” »

Sep 21, 2015

Unhackable kernel could keep all computers safe from cyberattack

Posted by in categories: biotech/medical, cybercrime/malcode

From helicopters to medical devices and power stations, mathematical proof that software at the heart of an operating system is secure could keep hackers out.

Read more

Aug 31, 2015

Quantum revolution: China set to launch ‘hack proof’ quantum communications network

Posted by in categories: cybercrime/malcode, particle physics, security

China is set to complete the installation of the world’s longest quantum communication network stretching 2,000km (1,240miles) from Beijing to Shanghai by 2016, say scientists leading the project. Quantum communications technology is considered to be “unhackable” and allows data to be transferred at the speed of light.

By 2030, the Chinese network would be extended worldwide, the South China Morning Post reported. It would make the country the first major power to publish a detailed schedule to put the technology into extensive, large-scale use.

The development of quantum communications technology has accelerated in the last five years. The technology works by two people sharing a message which is encrypted by a secret key made up of quantum particles, such as polarized photons. If a third person tries to intercept the photons by copying the secret key as it travels through the network, then the eavesdropper will be revealed by virtue of the laws of quantum mechanics – which dictate that the act of interfering with the network affects the behaviour of the key in an unpredictable manner.

Read more

Aug 22, 2015

Fridge caught sending spam emails in botnet attack

Posted by in categories: cybercrime/malcode, internet

In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails. .

Read more

Aug 10, 2015

Hackers to Military: Replace Us With Robots? Ha!

Posted by in categories: cybercrime/malcode, robotics/AI

How about security hacking as a form of Turing’s Test?

“Next year’s Cyber Grand Challenge event will pit humans against machines in a grand hacking war”


Next year’s Cyber Grand Challenge event will pit humans against machines in a grand hacking war. DEF CON’s war gamers like their chances.

Read more

Jul 24, 2015

Car Hacking Forces Recall Of 1.4 Million Jeeps, Rams, Dodges and Chryslers

Posted by in category: cybercrime/malcode

Fiat-Chrysler said today it was launching a voluntary recall of 1.4 million vehicles after a Jeep Cherokee was hacked remotely for the first time.

Read more

Jul 17, 2015

**Award-Winning** Sci-Fi Short Film: “SYNC”

Posted by in categories: computing, cybercrime/malcode

Every 15 seconds, a computer, network, or mobile device is hacked by cyber-terrorists. To combat this problem, Syntek Industries has manufactured data couriers designed from advanced machine robotics. These couriers are known as SYNCS. Syncs are programmed to securely deliver data packages without interruption.

Read more

Mar 5, 2015

Protect Yourself from Cyber Crime

Posted by in category: cybercrime/malcode

By — SingularityHubhttp://cdn.singularityhub.com/wp-content/uploads/2015/02/15462325023_6bea87f2da_h-1000x400.jpg

This blog is about the downside of exponential technology: digital crime.

Normally, I choose to focus on the immensely positive impact technology has on humanity – the Abundance mindset.

Read more