Archive for the ‘cybercrime/malcode’ category: Page 204
Feb 17, 2016
Cops want special courts that try only cyber criminals
Posted by Karen Hurst in category: cybercrime/malcode
Special courts for cyber criminals.
Police dept asks govt for two courts dedicated to dealing with online crime, to improve conviction rate.
Mumbai: As crimes increasingly go digital, Mumbai police are pushing for the creation of courts that would try only cyber crimes. They have submitted a proposal to the government seeking to establish two special courts for the purpose, in a move aimed to cut back delays in trials.
Continue reading “Cops want special courts that try only cyber criminals” »
Feb 17, 2016
Expert Edward McAndrew says nation is facing ‘perfect cyber-crime storm’
Posted by Karen Hurst in category: cybercrime/malcode
Feb 17, 2016
Filename-handling slip let attackers evade FireEye analysis
Posted by Karen Hurst in category: cybercrime/malcode
Giving FireEye the slip.
Malware could be on your application whitelist if you haven’t caught up on patching.
Feb 17, 2016
Researchers are Using Fairy Tales to Prevent a ‘Psychotic’ Robot Uprising
Posted by Karen Hurst in categories: business, cybercrime/malcode, ethics, robotics/AI, security
The bottom line is robots are machines; and like any other machine, a robot system can be (with the right expertise) reprogram. And, a connected robot to the net, etc. poses a risk as long as hackers poses a risk in the current Cyber environment. Again, I encourage government, tech companies, and businesses work collectively together in addressing the immediate challenge around Cyber Security.
And, there will need to be some way to also track robots & deactivate them remotely especially when the public are allowed to buy them (including criminals).
“We believe story comprehension in robots can eliminate psychotic-appearing behavior and reinforce choices that won’t harm humans and still achieve the intended goal”.
Continue reading “Researchers are Using Fairy Tales to Prevent a ‘Psychotic’ Robot Uprising” »
Feb 16, 2016
EU managers need to up cyber security collaboration, study finds
Posted by Karen Hurst in categories: business, cybercrime/malcode, security
The lack of collaboration on cyber security between the senior levels of business is leaving UK firms exposed to fines and reputational damage, a study has revealed.
One in 10 C-level respondents to a survey by Palo Alto Networks said they “kind of” understand what defines an online security risk, but admitted they “still have to use Google to help explain it”.
This finding suggests that the lack of consensus on where the responsibility for cyber security lies could stem from some lack of cyber security understanding at the leadership level.
Feb 16, 2016
Extremely severe bug leaves dizzying number of software and devices vulnerable
Posted by Karen Hurst in category: cybercrime/malcode
Another possible breach risk uncovered.
Since 2008, vulnerability has left apps and hardware open to remote hijacking.
Feb 16, 2016
Online security? Just let me Google that, say puzzled bosses
Posted by Karen Hurst in categories: business, cybercrime/malcode, economics, robotics/AI, security
Although this article highlights the lack of awareness by some CEOs and board members on all things around Cyber Security; I do see a larger gap and risk. I do believe if a fully funded and dedicated joint task force effort among Silicon Valley, US Government, and Wall Street are not in place tackling this jointly to help the country and economy to diffuse this situation within the next 14 to 18 months that AI could fail in its delivery due to public’s concerns around trust and security.
Therefore, tech spent millions if not billions on new AI technology that businesses and consumers see no value in due to risks.
Some board executives still need help from a search engine to explain cyber security issues, warns report.
Feb 16, 2016
Car cyber hijacking on the rise
Posted by Karen Hurst in categories: cybercrime/malcode, security, sustainability, transportation
Cyber Carjacking the new way to steal someone’s auto.
Cyber security was one of the topics on the agenda at the recent CyberTech conference held in Tel Aviv.
Last year, hackers in the US managed to remotely access a Jeep Cherokee SUV through its on-board computer, taking control of its steering, transmission and brakes.
Feb 15, 2016
Time to Buy Cyber Security ETFs on Decent Q4 Results?
Posted by Karen Hurst in categories: cybercrime/malcode, robotics/AI, security
This is very true; everyone knows in order for AI to truly be embraced by both consumers and industry; that Cyber Security on multiple fronts will need to be invested in to ensure better adoption of all the great technology on the horizon.
Though the cyber security industry has lost its momentum in the past several months, partially due to the weakness in the broad technology sector, it is poised for exponential growth in the coming years in the face of increasing cybercrime and the need to protect against these threats. According to Gartner, global security spending will increase 4.7% year over year to $75.4 billion in 2015 with some analysts projecting the global market to grow from $77 billion in 2015 to $170 billion by 2020.
The Q4 earnings reports of several industry players reflect this trend as most of them have beaten our earnings and revenue estimates with an encouraging outlook. Yet, they failed to drive the space and its ETFs higher that might suggest attractive entry point at the current level (read: 16 Bold ETF Predictions for 2016 ).
Continue reading “Time to Buy Cyber Security ETFs on Decent Q4 Results?” »