Archive for the ‘cybercrime/malcode’ category: Page 190
Jul 28, 2016
FBI’s Mass Hack Hit 50 Computers in Austria
Posted by Karen Hurst in category: cybercrime/malcode
Revelations that the ‘Operation Pacifier’ child porn investigation extended to Austria too shows the extent of the FBI’s reach overseas.
Jul 21, 2016
BioCryptography and Biometric Penetration Testing
Posted by Karen Hurst in categories: biotech/medical, cybercrime/malcode, engineering, privacy
I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.
In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.
But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.
Continue reading “BioCryptography and Biometric Penetration Testing” »
Jul 21, 2016
Enterprise Fellowships to kick-start the quantum technology industry
Posted by Karen Hurst in categories: business, cybercrime/malcode, energy, engineering, finance, health, internet, quantum physics, robotics/AI
Luv this.
The University of Bristol’s Quantum Technology Enterprise Centre (QTEC) is looking to recruit its first cohort of Enterprise Fellows that will be the next generation of quantum technology entrepreneurs.
Merging training in systems thinking, quantum engineering and entrepreneurship, QTEC will provide the necessary skills for budding innovators to develop their own business ideas and for them to branch out into the emerging field of quantum technologies.
The Centre, which is the first of its kind in the world, was funded as part of the UK’s £270 million investment into quantum technologies. These technologies exploit the laws of quantum mechanics to create practical and useful technologies that will outperform their classical rivals and that have the potential to transform artificial intelligence, healthcare, energy, finance, cyber security and the internet.
Continue reading “Enterprise Fellowships to kick-start the quantum technology industry” »
Jul 19, 2016
World-Check terror suspect DB hits the web at just US$6750
Posted by Karen Hurst in categories: cybercrime/malcode, internet
Want to buy the World-Check terror suspect DB? You can on the Dark Web for $6750.
Last month’s borked Couchdb breach delivers more pain to Thomson Reuters.
Jul 19, 2016
Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, internet, quantum physics
Luv it; more believers.
Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”
While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”
Continue reading “Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks” »
Jul 18, 2016
Indian-origin researchers find cyber security risks in 3D printing
Posted by Karen Hurst in categories: 3D printing, cybercrime/malcode
The researchers have found a way a hacker can create sub-millimeter defects between printed layers that can create fatigue in the product.
Tags: 3D printer cyber security technology.
Jul 16, 2016
GM Arrogance Spurred Government to Fund Auto Hacking
Posted by Karen Hurst in categories: cybercrime/malcode, government, military
GM executives’ declaration that they didn’t care about automotive security triggered the Pentagon to fund the famous Jeep hack of 2013.
Jul 16, 2016
Silicon Valley Entrepreneurs Aim To ‘Hack’ the Brain
Posted by Karen Hurst in categories: bioengineering, chemistry, cybercrime/malcode, neuroscience
Woo and other entrepreneurs are using fasts and other tricks to “hack” their brain chemistry like they would a computer, hoping to give themselves an edge as they strive to dream up the next billion-dollar idea. Known by insiders as “biohacking,” the push for cognitive self-improvement is gaining momentum in the Silicon Valley tech world, where workers face constant pressure to innovate and produce at the highest levels.