БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 183

Apr 9, 2017

Innovation in the Bay Area: Q&A with Nidhi Kalra

Posted by in categories: biotech/medical, cybercrime/malcode, drones, education, life extension, policy, robotics/AI, satellites

For people in that area, and it may be worth while to try reaching out to them for funding for anti aging stuff.


Why is RAND opening a Bay Area office?

The San Francisco Bay Area is really at the center of technology and transformation. That’s also been a focus at RAND since our very first report, Preliminary Design of an Experimental World-Circling Spaceship, in 1946, which foretold the creation of satellites more than a decade before Sputnik.

Continue reading “Innovation in the Bay Area: Q&A with Nidhi Kalra” »

Apr 6, 2017

Insurance companies are struggling to make sense of cybersecurity risk

Posted by in category: cybercrime/malcode

Trying to estimate the maximum cost of a devastating cyber event before one actually happens.

  • by.

    Mike Orcutt

  • April 6, 2017
  • Read more

    Apr 3, 2017

    Spam detection in the physical world

    Posted by in categories: cybercrime/malcode, food, policy, robotics/AI

    We’ve created the world’s first Spam-detecting AI trained entirely in simulation and deployed on a physical robot.

    Continue reading “Spam detection in the physical world” »

    Mar 29, 2017

    Cycon: Taking place in Tallinn from May 30th to June 2nd 2017 2017 will cover issues ranging from international cooperation and conflict in cyberspace to technical challenges and requirements

    Posted by in categories: cybercrime/malcode, government, internet, law, military

    Legal frameworks, regulations and standards under the topic Defending the Core.


    2017 will focus on the fundamental aspects of cyber security with a theme of Defending the Core. The 9th International Conference on Cyber Conflict will be held in Tallinn from May 30 through June 2, 2017.

    CyCon is organised by the NATO Cooperative Cyber Defence Centre of Excellence. Every year, over 500 decision-makers and experts from government, military and industry from all over the world approach the conference’s key theme from legal, technology and strategy perspectives, often in an interdisciplinary manner.

    Continue reading “Cycon: Taking place in Tallinn from May 30th to June 2nd 2017 2017 will cover issues ranging from international cooperation and conflict in cyberspace to technical challenges and requirements” »

    Mar 28, 2017

    NATO to spend 3 billion euros on satellite, cyber defenses

    Posted by in categories: cybercrime/malcode, drones, military, robotics/AI, space

    BRUSSELS NATO plans to spend 3 billion euros ($3.24 billion) to upgrade its satellite and computer technology over the next three years as the Western military alliance adapts to new threats, a senior official said.

    Seeking to deter hackers, and other threats including Iranian missiles, the investments underscore NATO’s recognition that conflicts are increasingly fought on computer networks as well as in the air, on land and at sea.

    A senior official at the NATO Communications and Information Agency said the plans include a 1.7-billion-euro investment in satellite communications to better support troops and ships deployed across the alliance, as well as aiding the use of Unmanned Aerial Vehicles (UAVs) or drones.

    Read more

    Mar 18, 2017

    Israeli tech firms revving up engines for self-driving cars

    Posted by in categories: cybercrime/malcode, robotics/AI, transportation

    JERUSALEM (AP) — As the world moves toward an era of self-driving cars, Israel is positioning itself to be the Detroit of the future.

    The country has emerged as a global leader in the fast-growing field of driverless cars, as illustrated by Intel’s more than $15 billion acquisition of Israeli firm Mobileye this week.

    Israel is now home to hundreds of startups that provide everything from sensors to cybersecurity to data collection for autonomous vehicles, putting it alongside Silicon Valley at the forefront of an industry that many expect to take off over the next decade.

    Read more

    Mar 6, 2017

    LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

    Posted by in categories: cybercrime/malcode, drones, encryption, internet, mobile phones

    Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

    Read more

    Mar 5, 2017

    AI Scientists Gather to Plot Doomsday Scenarios (and Solutions)

    Posted by in categories: biotech/medical, cybercrime/malcode, Elon Musk, existential risks, military, policy, robotics/AI

    Artificial intelligence boosters predict a brave new world of flying cars and cancer cures. Detractors worry about a future where humans are enslaved to an evil race of robot overlords. Veteran AI scientist Eric Horvitz and Doomsday Clock guru Lawrence Krauss, seeking a middle ground, gathered a group of experts in the Arizona desert to discuss the worst that could possibly happen — and how to stop it.

    Their workshop took place last weekend at Arizona State University with funding from Tesla Inc. co-founder Elon Musk and Skype co-founder Jaan Tallinn. Officially dubbed “Envisioning and Addressing Adverse AI Outcomes,” it was a kind of AI doomsday games that organized some 40 scientists, cyber-security experts and policy wonks into groups of attackers — the red team — and defenders — blue team — playing out AI-gone-very-wrong scenarios, ranging from stock-market manipulation to global warfare.

    Horvitz is optimistic — a good thing because machine intelligence is his life’s work — but some other, more dystopian-minded backers of the project seemed to find his outlook too positive when plans for this event started about two years ago, said Krauss, a theoretical physicist who directs ASU’s Origins Project, the program running the workshop. Yet Horvitz said that for these technologies to move forward successfully and to earn broad public confidence, all concerns must be fully aired and addressed.

    Continue reading “AI Scientists Gather to Plot Doomsday Scenarios (and Solutions)” »

    Feb 26, 2017

    Becoming Borg: What Is a Hive Mind in Science and Could Humanity Get There?

    Posted by in categories: cybercrime/malcode, science

    In Brief

    • Through the hive mind, everyone would be connected to everyone else telepathically, and we could all share our thoughts, memories, and even dreams with one another.
    • Though a global hive mind would be susceptible to things like hacking or thought control, it could also lead to almost unimaginable levels of innovation.

    Communication technology tends to develop in a particular direction: more people communicating across larger distances using less effort to do so. Taken to its logical extreme, perfect communication would be anyone being able to talk to anyone, anywhere, using no effort at all.

    Continue reading “Becoming Borg: What Is a Hive Mind in Science and Could Humanity Get There?” »

    Feb 21, 2017

    Stolen Health Record Databases Sell For $500,000 In The Deep Web

    Posted by in categories: biotech/medical, cybercrime/malcode, health, law

    Don’t be the CIO that sees their own this market as most Healthcare CIO’s will not allowed to stay given they are now a brand liability not to mention all those lawsuits that are coming from lawyers of the patients.


    Electronic health record databases proving to be some of the most lucrative stolen data sets in cybercrime underground.

    Medical insurance identification, medical profiles, and even complete electronic health record (EHR) databases have attracted the eyes of enterprising black hats, who increasingly see EHR-related documents as some of the hottest commodities peddled in the criminal underground. A new report today shows that complete EHR databases can fetch as much as $500,000 on the Deep Web, and attackers are also making their money off of smaller caches of farmed medical identities, medical insurance ID card information, and personal medical profiles.

    Continue reading “Stolen Health Record Databases Sell For $500,000 In The Deep Web” »