Archive for the ‘cybercrime/malcode’ category: Page 184
Feb 14, 2017
Cryptographers Dismiss AI, Quantum Computing Threats
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, information science, policy, quantum physics, robotics/AI
Cybercrime & Cybersecurity 0 20
There is a reason why they’re not in the private sector developing QC. Noticed all represented no one developing and delivering QC commercially. There is a reason why folks like this become nay sayers as it is hard when you’re not able to deliver and not hireable by the private sector to deliver QC. With such a huge demand for QC experts and in security; you have to wonder why these folks have not been employed in a QC Tech company especially when you see tech grabbing every professor they can to develop QC and especially cyber security. Also, I still never saw any bases or details scientifically for their argument why specifically where and how QC will not block hacking just a bunch of professors throwing out words and high level speculations.
SAN FRANCISCO—Cryptographers said at the RSA Conference Tuesday they’re skeptical that advances in quantum computing and artificial intelligence will profoundly transform computer security.
Continue reading “Cryptographers Dismiss AI, Quantum Computing Threats” »
Feb 14, 2017
20 Percent of Dark Web Sites Went Offline in Freedom Hosting II Hack
Posted by Karen Hurst in category: cybercrime/malcode
Freedom Hosting II was hacked by a sole individual for hosting websites with child abuse content, taking down 20 percent of dark web sites.
Feb 14, 2017
RSA Conference Cryptographers Panel: We’re Doing Everything Wrong
Posted by Karen Hurst in categories: cybercrime/malcode, internet
Wonder if they are already aware we’re already redoing the WWW with new QC technology? We already have the strategy and have engaged teams already from various countries. Hmmm.
[p]RSA Conference cryptographers panel laments current internet security, as both the internet and many of the security measures to secure it are broken.[/p].
Feb 13, 2017
Ghost in the Shell Theatrical Trailer
Posted by Sean Brazell in categories: cybercrime/malcode, cyborgs, robotics/AI
Theatrical Trailer for Ghost in the Shell.
Cyborg counter-cyberterrorist field commander The Major (Scarlett Johansson) and her task force Section 9 thwart cyber criminals and hackers. Now, they must face a new enemy who will stop at nothing to sabotage Hanka Robotics’ artificial intelligence technology.
Feb 5, 2017
Clues to protect quantum computing networks from hack attacks uncovered
Posted by Karen Hurst in categories: cybercrime/malcode, quantum physics
https://youtube.com/watch?v=k1pHnKvuX54
I truly don’t mean to be so blunt about this article and the researchers involved. 1st of all this is a bogus report trying to make a team and their work get noticed. 2nd, anyone who sets up their QC this sloppy as this team did to prove hacking I would hope would never be hired into my organization as an admin or security officer.
The reality is that real QC environments in the real world with a qualified CSO/ CISO would never leave so many back doors open in reality.
Continue reading “Clues to protect quantum computing networks from hack attacks uncovered” »
Feb 4, 2017
Canadian researchers claim Chinese quantum network might not be hack proof after all
Posted by Karen Hurst in categories: cybercrime/malcode, quantum physics
1st before ever passing an opinion of a hypothesis or lab controlled concept; we need to see it proven against the China’s Network and then try it on Los Alamos Quantum Network. My guess, not going to be successful as it is Ottawa’s version & not everyone else’s so comes to question did they even design their test network correctly as China and Los Alamos both are showing that their versions are not hack proof. BTW — China is in phase 2 of their Quantum network; as previous tests were successful; and Los Alamos has been online since 2009 without any reported hacks.
Until, they prove successful against China’s network and Los Alamos; just another hyped up story without proof.
University of Ottawa physicists say they’ve found a way to partially replicate data from supposedly completely secure system.
Feb 2, 2017
Quantum Encryption Just Took One More Step Toward Beating Hackers
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, quantum physics
Nice read on QC cryptography.
Between Russian hackers and insecure email servers, this past election has proved that cyber security is going to be extremely important moving forward. But with the advent of quantum computers, it’s only going to become harder to keep data safe from those with the motive and the right tools. Fortunately, scientists believe they may have found a solution within the same principles that guide quantum computing: quantum encryption.
To fully understand the scope of what quantum computers can do, it’s important to realize that it might take current, non-quantum computers longer than the total age of the universe to crack certain encryptions. But, as grad student Chris Pugh explained in a recent interview with Wired, quantum computers might be able to crack the same codes in “a matter of hours or days”.
Continue reading “Quantum Encryption Just Took One More Step Toward Beating Hackers” »
Feb 1, 2017
Fear sells in the computer security business, and quantum computers could be very scary
Posted by Karen Hurst in categories: cybercrime/malcode, particle physics, quantum physics
Interesting article; however, 2 things missing from it. 1) China has already implemented a QC wireless network and in phase 2 of their work on QC communications which is also involving a QC platform and hacking. 2) Author stated that Mosca believes by 2026 a nation state will have QC. I would suggest Mosca network a little more as China and Sydney are well ahead of schedule plus many of us involved in QC already are testing the scalability of QC on small devices and other platforms v. mammoth servers thanks to much of the new findings last year on proving the reliability and traceability of particles at various complex states of entanglement and information processing as well as the more recent findings of enabling the constant cold temperatures needed to support QC on small servers.
My own estimates is we’re within a 5 year window of being able to see a more pragmatic version of QC as servers and networking for the broader masses. I don’t believe we’re 10 years away or less than 5 years at the moment; however, things could change tomorrow to the point we see the timeline shortened from 5 to 3 years as I do have friends who believe we’re within 3 years.
Even though quantum computers don’t exist yet, security companies are preparing to protect against them.
Jan 20, 2017
350,000 Twitter bot sleeper cell betrayed by love of Star Wars and Windows Phone
Posted by Karen Hurst in categories: cybercrime/malcode, mobile phones, robotics/AI
Computer boffins Juan Echeverria and Shi Zhou at University College London have chanced across a dormant Twitter botnet made up of more than 350,000 accounts with a fondness for quoting Star Wars novels.
Twitter bots have been accused of warping the tone of the 2016 election. They also can be used for entertainment, marketing, spamming, manipulating Twitter’s trending topics list and public opinion, trolling, fake followers, malware distribution, and data set pollution, among other things.
In a recently published research paper, the two computer scientists recount how a random sampling of 1 per cent of English-speaking Twitter accounts – about 6 million accounts – led to their discovery.