Archive for the ‘cybercrime/malcode’ category: Page 178
Feb 16, 2018
Authorities deactivate transit pass implanted in biohacker’s hand
Posted by Genevieve Klien in categories: cybercrime/malcode, cyborgs, law
Meow-Ludo Disco Gamma Meow-Meow couldn’t just toss away his New South Wales transit pass even after he found out that it got deactivated while he was on a trip to the USee, Meow-Meow (yes, that is his legal name) cut the chip out of the travel card, encased it in biocompatible plastic and had it implanted under the skin on his left hand. The biohacker now plans to file a lawsuit against New South Wales’ transport authorities, not just to fight the decision, but also to help create laws around body-hacking tech. In addition to the transit pass chip, Meow-Meow has two other implanted elect…
Jan 31, 2018
A Chinese satellite just used quantum cryptography to make an unhackable video call between Beijing and Vienna
Posted by Klaus Baldauf in categories: cybercrime/malcode, encryption, quantum physics, space
The Chinese “Micius” satellite has successfully set up the world’s most secure video conference, using quantum cryptography to connect scientists in Europe and China for an unhackable, intercontinental chat.
The feat marks another milestone for the satellite, officially called Quantum Experiments at Space Scale (QESS), which only last year was making headlines for transmitting an “unbreakable” quantum code to the Earth’s surface.
Jan 30, 2018
Ways AI Will Fight the Cybersecurity Battles of the Future
Posted by Saúl Morales Rodriguéz in categories: business, cybercrime/malcode, robotics/AI
Cybersecurity risks are on the rise. While the high-profile breaches at Target and Yahoo! captured our attention, they have also distracted us from the prevalence of cybersecurity risks in everyday life. The number of cyber-security breaches has more than doubled over the past few years. In the third quarter of 2016, over 18 million new forms of malware were discovered. That is nearly a quarter of a million new types of malware every single day.
Unfortunately, some of the most vulnerable companies are those that are least equipped to address these concerns. Industry experts estimate that 45% of all cyber-attacks are launched against small businesses. Almost half of all small businesses have been attacked, although most of them don’t know it. Nearly 70% of small businesses are forced into bankruptcy within six months of a particularly severe cyber-attack.
Despite the risks, small businesses are under greater pressure to cut costs. They can’t always afford top-tier protection.
Continue reading “Ways AI Will Fight the Cybersecurity Battles of the Future” »
Jan 28, 2018
How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI
Posted by Dan Kummer in categories: cybercrime/malcode, military, privacy, robotics/AI
A look at Lt. Gen. Paul Nakasone’s public statements about artificial intelligence, offense, and defense.
The Army general likely to be tapped to head U.S. Cyber Command and the NSA has some big plans for deploying cyber forces and using artificial intelligence in information attacks.
Lt. Gen. Paul Nakasone, who currently leads U.S. Army Cyber Command, is expected to nominated in the next few months to replace Adm. Michael Rogers, as first reported by The Cipher Brief (and confirmed by the Washington Post and a Pentagon source of our own). But caution is in order: the rumor mill says several other contenders are in the running, including Army Lt. Gen. William Mayville. Neither Cyber Command nor the Pentagon would comment about the potential nomination.
Continue reading “How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI” »
Jan 25, 2018
Behind the simulations imagining the nuclear apocalypse
Posted by Derick Lee in categories: cybercrime/malcode, finance
Security experts say more of these hands-on demonstrations are needed to get an industry traditionally focused on physical protection to think more creatively about growing cyber threats. The extent to which their advice is heeded will determine how prepared nuclear facilities are for the next attack.
“Unless we start to think more creatively, more inclusively, and have cross-functional thinking going into this, we’re going to stay with a very old-fashioned [security] model which I think is potentially vulnerable,” said Roger Howsley, executive director of the World Institute for Nuclear Security (WINS).
The stakes are high for this multibillion-dollar sector: a cyberattack combined with a physical one could, in theory, lead to the release of radiation or the theft of fissile material. However remote the possibility, the nuclear industry doesn’t have the luxury of banking on probabilities. And even a minor attack on a plant’s IT systems could further erode public confidence in nuclear power. It is this cruelly small room for error that motivates some in the industry to imagine what, until fairly recently, was unimaginable.
Continue reading “Behind the simulations imagining the nuclear apocalypse” »
Jan 13, 2018
Developing a secure, un-hackable net
Posted by Shailesh Prasad in categories: cybercrime/malcode, quantum physics
A method of securely communicating between multiple quantum devices has been developed by a UCL-led team of scientists, bringing forward the reality of a large-scale, un- hackable quantum network.
To date, communicating via quantum networks has only been possible between two devices of known provenance that have been built securely.
With the EU and UK committing €1 billion and £270 million respectively into funding quantum technology research, a race is on to develop the first truly secure, large-scale network between cities that works for any quantum device.
Dec 15, 2017
A New Industrial Hack Highlights the Cyber Holes in Our Infrastructure
Posted by Saúl Morales Rodriguéz in categories: business, cybercrime/malcode, energy
Freshly discovered malware called Triton can compromise safety systems that control many kinds of industrial processes.
For years, security experts have been warning that hackers can disable systems that control critical infrastructure we all rely on, such as dams and power plants. Now researchers at Mandiant, which is part of the security firm FireEye, have revealed that a new form of malware, dubbed Triton, closed down the operations of a business in the Middle East belonging to Schneider Electric, a French company. The researchers say that they haven’t attributed the hack to a particular attacker, but they do say it bore hallmarks of threats from a nation-state.
Triton appears to have targeted a so-called safety instrumented system, or SIS, which monitors the operation of a physical process using sensors and acoustics. By taking control of it, hackers can destroy or damage the process the SIS is monitoring by tricking it into thinking everything’s normal, when in fact the process is operating at unsafe levels.
Continue reading “A New Industrial Hack Highlights the Cyber Holes in Our Infrastructure” »
Dec 15, 2017
As AI and robots rise up, do humans need an upgrade too?
Posted by Paul Gonçalves in categories: cybercrime/malcode, robotics/AI
Forget hacking a computer. Some researchers want to hack the brain to create human superintelligence to compete with AI.
Dec 10, 2017
The Risks of AI to Security and the Future of Work
Posted by Dan Kummer in categories: cybercrime/malcode, employment, policy, robotics/AI
As artificial intelligence (AI) becomes more prevalent in the domains of security and employment, what are the policy implications? What effects might AI have on cybersecurity, criminal and civil justice, and labor market patterns?