БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 177

Apr 14, 2018

New Trojan Malware Could Mind-Control Neural Networks

Posted by in categories: cybercrime/malcode, Elon Musk, robotics/AI, space

Each new technological breakthrough comes seemingly prepackaged with a new way for hackers to kill us all: self-driving cars, space-based weapons, and even nuclear security systems are vulnerable to someone with the right knowledge and a bit of code. Now, deep-learning artificial intelligence looks like the next big threat, and not because it will gain sentience to murder us with robots (as Elon Musk has warned): a group of computer scientists from the US and China recently published a paper proposing the first-ever trojan for a neural network.

Neural networks are the primary tool used in AI to accomplish “deep learning,” which has allowed AIs to master complex tasks like playing chess and Go. Neural networks function similar to a human brain, which is how they got the name. Information passes through layers of neuron-like connections, which then analyze the information and spit out a response. These networks can pull off difficult tasks like image recognition, including identifying faces and objects, which makes them useful for self-driving cars (to identify stop signs and pedestrians) and security (which may involve identifying an authorized user’s face). Neural networks are relatively novel pieces of tech and aren’t commonly used by the public yet but, as deep-learning AI becomes more prevalent, it will likely become an appealing target for hackers.

The trojan proposed in the paper, called “PoTrojan,” could be included in a neural network product either from the beginning or inserted later as a slight modification. Like a normal trojan, it looks like a normal piece of the software, doesn’t copy itself, and doesn’t do much of anything… Until the right triggers happen. Once the right inputs are activated in a neural network, this trojan hijacks the operation and injects its own train of “thought,” making sure the network spits out the answer it wants. This could take the form of rejecting the face of a genuine user and denying them access to their device, or purposefully failing to recognize a stop sign to create a car crash.

Continue reading “New Trojan Malware Could Mind-Control Neural Networks” »

Apr 8, 2018

Iran hit by global cyber attack that left U.S. flag on screens

Posted by in category: cybercrime/malcode

DUBAI (Reuters) — Hackers have attacked networks in a number of countries including data centers in Iran where they left the image of a U.S. flag on screens along with a warning: “Don’t mess with our elections”, the Iranian IT ministry said on Saturday.

FILE PHOTO: A man types on a computer keyboard in front of the displayed cyber code in this illustration picture taken on March 1, 2017. REUTERS/Kacper Pempel/Illustration/File Photo.

Read more

Apr 7, 2018

How AI and Machine Learning Are Redefining Cybersecurity

Posted by in categories: business, cybercrime/malcode, mobile phones, nuclear energy, robotics/AI, transportation

We are now a connected global community where many digital natives cannot remember a time before the iPhone. The rise of smart homes means that we are increasingly attaching our lighting, door locks, cameras, thermostats, and even toasters to our home networks. Managing our home automation through mobile apps or our voice illustrates how far we have evolved over the last few years.

However, in our quest for the cool and convenient, many have not stopped to consider their cybersecurity responsibilities. The device with the weakest security could allow hackers to exploit vulnerabilities on our network and access our home. But this is just the tip of the proverbial iceberg.

Businesses and even governments are starting to face up to the vulnerabilities of everything being online. Sophisticated and disruptive cyberattacks are continuing to increase in complexity and scale across multiple industries. Areas of our critical infrastructure such as energy, nuclear, water, aviation, and critical manufacturing have vulnerabilities that make them a target for cybercriminals and even a state-sponsored attack.

Read more

Apr 7, 2018

Army of None: Autonomous Weapons and the Future of War

Posted by in categories: cybercrime/malcode, drones, law, military, robotics/AI

“Be very, very afraid. As this extraordinary book reveals, we are fast sailing into an era in which big life-and-death decisions in war will be made not by men…and women, but by artificial intelligence” — @stavridisj’s review of @paul_scharre upcoming book Pre-order yours now:


A Pentagon defense expert and former U.S. Army Ranger explores what it would mean to give machines authority over the ultimate decision of life or death.

What happens when a Predator drone has as much autonomy as a Google car? Or when a weapon that can hunt its own targets is hacked? Although it sounds like science fiction, the technology already exists to create weapons that can attack targets without human input. Paul Scharre, a leading expert in emerging weapons technologies, draws on deep research and firsthand experience to explore how these next-generation weapons are changing warfare.

Continue reading “Army of None: Autonomous Weapons and the Future of War” »

Apr 7, 2018

Non-tech businesses are beginning to use artificial intelligence at scale

Posted by in categories: business, cybercrime/malcode, finance, robotics/AI

A longer-term concern is the way AI creates a virtuous circle or “flywheel” effect, allowing companies that embrace it to operate more efficiently, generate more data, improve their services, attract more customers and offer lower prices. That sounds like a good thing, but it could also lead to more corporate concentration and monopoly power—as has already happened in the technology sector.


LIE DETECTORS ARE not widely used in business, but Ping An, a Chinese insurance company, thinks it can spot dishonesty. The company lets customers apply for loans through its app. Prospective borrowers answer questions about their income and plans for repayment by video, which monitors around 50 tiny facial expressions to determine whether they are telling the truth. The program, enabled by artificial intelligence (AI), helps pinpoint customers who require further scrutiny.

AI will change more than borrowers’ bank balances. Johnson & Johnson, a consumer-goods firm, and Accenture, a consultancy, use AI to sort through job applications and pick the best candidates. AI helps Caesars, a casino and hotel group, guess customers’ likely spending and offer personalised promotions to draw them in. Bloomberg, a media and financial-information firm, uses AI to scan companies’ earnings releases and automatically generate news articles. Vodafone, a mobile operator, can predict problems with its network and with users’ devices before they arise. Companies in every industry use AI to monitor cyber-security threats and other risks, such as disgruntled employees.

Continue reading “Non-tech businesses are beginning to use artificial intelligence at scale” »

Apr 3, 2018

Robot designed to defend factories against cyberthreats

Posted by in categories: cybercrime/malcode, robotics/AI

It’s small enough to fit inside a shoebox, yet this robot on four wheels has a big mission: keeping factories and other large facilities safe from hackers.

Meet the HoneyBot.

Continue reading “Robot designed to defend factories against cyberthreats” »

Mar 26, 2018

Scientists trace ransomware payments across the globe

Posted by in category: cybercrime/malcode

In ransomware attacks, your personal files are held hostage until you pay. Here are hackers’ most frequent targets and how they get their money.

Read more

Mar 23, 2018

Massive cyberhack by Iran allegedly stole research from 320 universities, governments, and companies

Posted by in categories: cybercrime/malcode, futurism

Targets included nearly 8000 professors in 22 countries.

Read more

Mar 3, 2018

Would you hack your own body?

Posted by in categories: cybercrime/malcode, futurism

The body-hackers who believe chips under the skin could replace keys and wallets in future.

Read more

Mar 2, 2018

GPS Isn’t Very Secure. Here’s Why We Need A Backup

Posted by in categories: cybercrime/malcode, drones, military, mobile phones, satellites

That’s not a lot to you. If your watch is off by 13.7 microseconds, you’ll make it to your important meeting just fine. But it wasn’t so nice for the first-responders in Arizona, Pennsylvania, Connecticut, and Louisiana, whose GPS devices wouldn’t lock with satellites. Nor for the FAA ground transceivers that got fault reports. Nor the Spanish digital TV networks that had receiver issues. Nor the BBC digital radio listeners, whose British broadcast got disrupted. It caused about 12 hours of problems—none too huge, all annoying. But it was a solid case study for what can happen when GPS messes up.

The 24 satellites that keep GPS services running in the US aren’t especially secure; they’re vulnerable to screw-ups, or attacks of the cyber or corporeal kind. And as more countries get closer to having their own fully functional GPS networks, the threat to our own increases. Plus, GPS satellites don’t just enable location and navigation services: They also give ultra-accurate timing measurements to utility grid operators, stock exchanges, data centers, and cell networks. To mess them up is to mess those up. So private companies and the military are coming to terms with the consequences of a malfunction—and they’re working on backups.

The 2016 event was an accidental glitch with an easily identifiable cause—an oops. Harder to deal with are the gotchas. Jamming and spoofing, on a small scale, are both pretty cheap and easy. You can find YouTube videos of mischievous boys jamming drones, and when Pokemon GO users wanted to stay in their parents’ basements, they sent their own phones fake signals saying they were at the Paris mall. Which means countries, and organized hacking groups, definitely can mess with things on a larger scale. Someone can jam a GPS signal, blocking, say, a ship from receiving information from satellites. Or they can spoof a signal, sending a broadcast that looks like a legit hello from a GPS satellite but is actually a haha from the hacker next-door.

Continue reading “GPS Isn’t Very Secure. Here’s Why We Need A Backup” »