БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 181

Dec 10, 2017

The Risks of AI to Security and the Future of Work

Posted by in categories: cybercrime/malcode, employment, policy, robotics/AI

As artificial intelligence (AI) becomes more prevalent in the domains of security and employment, what are the policy implications? What effects might AI have on cybersecurity, criminal and civil justice, and labor market patterns?

Read more

Dec 10, 2017

The WIRED Guide to Digital Security

Posted by in categories: cybercrime/malcode, mobile phones, privacy

IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.


In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Read more

Nov 21, 2017

Why cyborg creators must self-govern security, privacy efforts

Posted by in categories: cybercrime/malcode, cyborgs, geopolitics, robotics/AI, transhumanism

Most people probably aren’t aware of this, but the 2016 U.S. Presidential election included a candidate who had a radio-frequency identification chip implanted in his hand. No, it wasn’t Donald J. Trump. It was Zoltan Istvan, a nominee representing the Silicon Valley-based Transhumanist Party and his body-worn chip unlocked his front door, provided computer password access and sent an auto-text that said: “Win in 2016!”

The transhumanist movement – employing technology and radical science to modify humans – offers a glimpse into the marriage of machines and people, the focus of a recent paper released by the Institute for Critical Infrastructure Technology (ICIT). With cybernetic implants already available to consumers, the prospect for techno-human transmutation – cyborgs – is not as far away as many may think.

Continue reading “Why cyborg creators must self-govern security, privacy efforts” »

Nov 20, 2017

EU Cybersecurity Package: New Potential for EU to Cooperate with NATO

Posted by in category: cybercrime/malcode

The European Union’s new ambitious approach to cyber challenges could be a game-changer for its cyber posture as well as for the transatlantic and neighbourhood relations, concludes this analysis by Tomáš Minárik and Siim Alatalu of the NATO Cooperative Cyber Defence Centre of Excellence, the NATO-affiliated cyber defence think-tank. Nevertheless, the EU could make better use of existing expertise in NATO and individual Member States.

The following analysis does not represent the official views of NATO.

On 13 September 2017, the European Commission and the High Representative issued a Joint Communication to the European Parliament and the Council [JOIN(2017) 450 final], bearing the title Resilience, Deterrence and Defence: Building strong cybersecurity for the EU. It introduces an ambitious and comprehensive plan to improve cybersecurity throughout the EU. The Commission and the High Representative (HR) proposed a broad range of measures, divided into three areas – resilience, deterrence and defence:

Continue reading “EU Cybersecurity Package: New Potential for EU to Cooperate with NATO” »

Nov 17, 2017

Could Terrorists Hack an Airplane? The Government Just Did

Posted by in categories: cybercrime/malcode, government, transportation

Hopefully not!


Hacking experts having been warning for years that it’s too easy to breach a cockpit’s defenses. Now an alarming government test proves their point.

Read more

Nov 14, 2017

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core

Posted by in categories: business, cybercrime/malcode, neuroscience

A serial leak of the agency’s cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide.

Read more

Nov 1, 2017

North Korean hackers steal warship blueprints from South

Posted by in categories: cybercrime/malcode, engineering, military

South Korea is ‘almost 100 per cent certain’ that North Korean hackers have stolen the blueprints for their warships and submarines.

The despotic regime is thought to have taken the documents after hacking into Daewoo Shipbuilding & Marine Engineering Co Ltd’s database in April last year.

Continue reading “North Korean hackers steal warship blueprints from South” »

Oct 16, 2017

The World Once Laughed at North Korean Cyberpower. No More

Posted by in categories: cybercrime/malcode, existential risks, military

While the world is fixated on its nuclear missiles, North Korea has also developed a cyberattack program that is stealing millions and unleashing havoc.

Read more

Oct 12, 2017

Israel hacked Kaspersky, then tipped the NSA that its tools had been breached

Posted by in categories: cybercrime/malcode, government, privacy

Israel notified the NSA, where alarmed officials immediately began a hunt for the breach, according to people familiar with the matter, who said an investigation by the agency revealed that the tools were in the possession of the Russian government.

Israeli spies had found the hacking material on the network of Kaspersky Lab, the global anti-virus firm under a spotlight in the United States because of suspicions that its products facilitate Russian espionage.

Last month, the Department of Homeland Security instructed federal civilian agencies to identify Kaspersky Lab software on their networks and remove it on the grounds that “the risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. national security.” The directive followed a decision by the General Services Administration to remove Kaspersky from its list of approved vendors. And lawmakers on Capitol Hill are considering a governmentwide ban.

Continue reading “Israel hacked Kaspersky, then tipped the NSA that its tools had been breached” »

Sep 25, 2017

When a tanker vanishes, all the evidence points to Russia

Posted by in category: cybercrime/malcode

Introducing: GPS attacks. “By creating a false signal it is possible to fool a system into thinking it’s in a different place.” Russian oligarchs undertaking piracy? Check.

“Spoofing is currently used in Russia. Around the Kremlin, GPS devices typically show the location 20 miles away,” says Nathan Brubaker, head of the cyber-physical intelligence unit at FireEye.

Read more