Archive for the ‘cybercrime/malcode’ category: Page 200
Aug 23, 2016
Defense Systems Update
Posted by Karen Hurst in categories: cybercrime/malcode, quantum physics, space
Glad defense is finally taking this seriously. Something, that many of us already had concerns about.
The properties of quantum entanglement could deliver the first hack-proof communications.
Aug 22, 2016
China To Solve Quantum Physics From Space
Posted by Karen Hurst in categories: cybercrime/malcode, quantum physics, satellites
China 2 yr Quantum Communication program’s goal is to reliably transmit ‘unhackable’ keys from space to the ground through quantum entanglement.
China has been the first country to utilize quantum technologies within their satellites in order to mitigate the threats from cyber attacks in their country.
Aug 19, 2016
QUESS and Quantum Communications
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, government, internet, quantum physics, space
Excellent write up on QUESS; and yesterday we saw that the first set of code was transmitted successfully which means so far success. However, many are asking when will the US respond about our own efforts around our own efforts of a Quantum satellite and our own progress around improving the net infrastructure to ensure we’re not a sitting duck for government backed hackers. Granted we have been operating for many years a version of a Quantum Internet at Los Alamos; however, we need to expand and accelerate the efforts around the Quantum Internet restructuring.
In mid August China launched “QUESS” (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of “quantum communications” which is supposed to be hack-proof, through the use of “quantum entanglement”. This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information.
According the Chinese scientists involved in the project, quantum encryption is secure against any kind of computing power because information encoded in a quantum particle is destroyed as soon as it is measured. (According to Tibor Molnar a scientist at the University of Sydney), the only way to ‘observe’ a photon is to have it interact with (a) an electron, or (b) an electromagnetic field. Either of these interactions will cause the photon to “decohere” – i.e., interfere with it in a way that will be apparent to the intended recipient.
Aug 18, 2016
Hacker claims to be selling stolen NSA spy tools
Posted by Sean Brazell in categories: cybercrime/malcode, privacy
SOMEONE over at the NSA has a date with a small, windowless cell in a deep dark hole in the ground in their near future, me thinks.
Hacking tools — possibly belonging to the NSA — have been leaked and are now accessible to common criminal hackers.
Aug 18, 2016
Why China’s Quantum Satellite Is Incredible—And Will Surely Be Overhyped
Posted by Karen Hurst in categories: cybercrime/malcode, quantum physics, satellites
Sure some things may be hyped up; however, not everything including hacking. And, I would not wish to see others make the mistake of believing that they will not be hacked by state funded hackers with access to a quantum network. Especially, when you understand China’s advances in QC and close partnerships with Australia’s QC labs and researchers.
A word of caution so we can all be excited for the right reasons.
Continue reading “Why China’s Quantum Satellite Is Incredible—And Will Surely Be Overhyped” »
Aug 17, 2016
Israeli Startup BioCatch Tracks Online Behavior, Human Memory To Catch Cybercrooks
Posted by Karen Hurst in categories: cybercrime/malcode, finance
https://youtube.com/watch?v=q90JYGxk5xw
The company is now marketing software to help banks and online stores distinguish good users from criminals.
Aug 16, 2016
Bot-Run Company of the Future Gets Hacked: New at Reason
Posted by Karen Hurst in categories: cybercrime/malcode, futurism, robotics/AI
They have been warned in the past; and chose to ignore. Bot operated company gets hacked.
A funny thing happened on the way to a post-capitalist, crypto-anarchist utopia.
Aug 16, 2016
Everything you need to know about the NSA hack (but were afraid to Google)
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, information science, privacy
A day in the life of an NSA Hacker.
In what Edward Snowden deems “not unprecedented,” hackers calling themselves the Shadow Brokers have collected NSA-created malware from a staging server run by the Equation Group, an internal hacking team. The Shadow Brokers published two chunks of data, one “open” chunk and another encrypted file containing the “best files” that they will sell for at least $1 million. Wikileaks has said they already own the “auction” files and will publish them in “due course.”
They’ve also released images of the file tree containing a script kiddie-like trove of exploits ostensibly created and used by the NSA as well as a page calling out cyber warriors and “Wealthy Elites.” The page also contains links to the two files, both encrypted. You can grab them using BitTorrent here.
Continue reading “Everything you need to know about the NSA hack (but were afraid to Google)” »
Aug 14, 2016
Scylex malware Kit offered for sale in the criminal underground
Posted by Karen Hurst in categories: cybercrime/malcode, finance
For Sale: A Scylex malware Kit please contact your nearest Dark Web for details.
Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities.
Security experts from the Heimdal security firm have discovered a new DIY financial crime kit offered for sale on a notorious malicious hacker forum on the dark web called Lampeduza.
Continue reading “Scylex malware Kit offered for sale in the criminal underground” »