БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 189

Oct 5, 2016

How Quantum Computing Could Change Cybersecurity Forever [Video]

Posted by in categories: cybercrime/malcode, government, quantum physics

As I have continued for over a year to repeat that for any company or government entity to not include QC in their 5+ yrs future state roadmap is truly enabling their company or government to be easy pickings for hackers.


Quantum scientist Michele Mosca will discuss security in the coming quantum age during a live Webcast tonight at 7 P.M.

Read more

Sep 29, 2016

IARPA To Develop Early-Warning System For Cyberattacks

Posted by in categories: business, cybercrime/malcode, government, robotics/AI

The Intelligence Advanced Research Projects Activity has launched a multi-year research and development effort to create new technologies that could provide an early warning system for detecting precursors to cyberattacks. If successful, the government effort could help businesses and other targets move beyond the reactive approach to contending with a massive and growing problem.

IARPA, part of the Office of the Director of National Intelligence, says the three-and-a-half year program will develop software code to sense unconventional indicators of cyber attack, and use the data to develop models and machine learning systems that can create probabilistic warnings.

Current early warning systems are focused on traditional cyber indicators such as activity targeted toward IP addresses and domain names, according to IARPA program manager Robert Rahmer. The first stage, lasting 18 months, will examine data outside of the victim network, such as black market sales of exploits that take advantage of particular software bugs. The second and third phases, 12 months each, will examine internal target organization data and look for ways to develop warnings and transfer any tools that emerge from the research from one organization to another, he said.

Continue reading “IARPA To Develop Early-Warning System For Cyberattacks” »

Sep 26, 2016

FBI Probes Dumping Of NSA Hack Tools On Public Site

Posted by in categories: cybercrime/malcode, privacy

Ouch!!!


National Security Agency says tools left exposed by mistake — and dumping by presumably Russia-backed hackers Shadow Brokers.

An FBI investigation into the public dumping of hacking tools used by the National Security Agency (NSA) to uncover security flaws in some networking vendor products is looking at how the tools were exposed on a remote computer, a Reuters report says, quoting people close to the investigation.

Continue reading “FBI Probes Dumping Of NSA Hack Tools On Public Site” »

Sep 23, 2016

Someone is learning how to take down the Internet

Posted by in categories: cybercrime/malcode, internet, military

This is definitely something that we should all be aware of, and watching for.


Submarine cables map (credit: Teleography)

“Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet,” according to a blog post by security expert Bruce Schneier.

Continue reading “Someone is learning how to take down the Internet” »

Sep 22, 2016

DARPA perfects hacker-proof computer code

Posted by in categories: cybercrime/malcode, drones, internet, mathematics, military

When the project started, a “Red Team” of hackers could have taken over the helicopter almost as easily as it could break into your home Wi-Fi. But in the intervening months, engineers from the Defense Advanced Research Projects Agency (DARPA) had implemented a new kind of security mechanism — a software system that couldn’t be commandeered. Key parts of Little Bird’s computer system were unhackable with existing technology, its code as trustworthy as a mathematical proof. Even though the Red Team was given six weeks with the drone and more access to its computing network than genuine bad actors could ever expect to attain, they failed to crack Little Bird’s defenses.

“They were not able to break out and disrupt the operation in any way,” said Kathleen Fisher, a professor of computer science at Tufts University and the founding program manager of the High-Assurance Cyber Military Systems (HACMS) project. “That result made all of DARPA stand up and say, oh my goodness, we can actually use this technology in systems we care about.”

The technology that repelled the hackers was a style of software programming known as formal verification. Unlike most computer code, which is written informally and evaluated based mainly on whether it works, formally verified software reads like a mathematical proof: Each statement follows logically from the next. An entire program can be tested with the same certainty that mathematicians prove theorems.

Read more

Sep 21, 2016

Google’s new chat app should be deleted and never used, says Edward Snowden

Posted by in categories: cybercrime/malcode, robotics/AI

Edward Snowden has warned people not to use Google’s new chat app, because it lets the company read everything that they say.

Google has finally released its new chat app after showing it off over the summer. It comes with a robot that watches everything people say and then stores it for later analysis, using that data to improve the app itself.

But that also means that chats are stored on Google’s servers indefinitely, and are able to be read by it. The company had initially indicated that the messages would only be stored temporarily, limiting the possible impact of any data breach and retaining some privacy for users.

Continue reading “Google’s new chat app should be deleted and never used, says Edward Snowden” »

Sep 20, 2016

Quantum teleportation was just achieved over more than 7 km of city fibre

Posted by in categories: cybercrime/malcode, particle physics, quantum physics

Quantum teleportation just moved out of the lab and into the real world, with two independent teams of scientists successfully sending quantum information across several kilometres of optical fibre networks in Calgary, Canada, and Hefei, China.

The experiments show that not only is quantum teleportation very much real, it’s also feasible technology that could one day help us build unhackable quantum communication systems that stretch across cities and maybe even continents.

Quantum teleportation relies on a strange phenomenon called quantum entanglement. Basically, quantum entanglement means that two particles are inextricably linked, so that measuring the state of one immediately affects the state of the other, no matter how far apart the two are — which led Einstein to call entanglement “spooky action at a distance”.

Continue reading “Quantum teleportation was just achieved over more than 7 km of city fibre” »

Sep 19, 2016

Undercover FBI Agent Busts Alleged Explosives Buyer on the Dark Web

Posted by in category: cybercrime/malcode

A 50-year-old man has been arrested after an undercover FBI agent posed as a vendor on dark web market AlphaBay.

Read more

Sep 15, 2016

China Suspected of Cyberwar Recon; Huawei Fears Linger

Posted by in categories: cybercrime/malcode, internet

Hmmm; Chinese antitrust regulators are investigating Microsoft, and Huawei has been shut out of the U.S. telecommunications-equipment market over concerns it might be a front for cyberspying.


Alleged Chinese hacking of American companies may have diminished since tensions over the issue came to a head during Xi Jinping’s state visit to the U.S. last year. At Lawfare, however, security technologist Bruce Schneier describes a recent series of attacks which appear to show “someone […] learning to take down the internet.” “The data I see suggests China,” he writes, “an assessment shared by the people I spoke with.”

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the . These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large a large nation state. China or Russia would be my first guesses.

Continue reading “China Suspected of Cyberwar Recon; Huawei Fears Linger” »

Sep 14, 2016

CIA Director John Brennan warns of Russian hacking

Posted by in categories: cybercrime/malcode, neuroscience

So, here is the real question we in the US should start raising is how does all of this look for the US to its allies, frienemies, etc. with US filling the headlines with statements like this one. No wonders allies and others are expanding their partnerships with Russia.


WASHINGTON (AP) — CIA Director John Brennan warned on Sunday that Russia has “exceptionally capable and sophisticated” computer capabilities and that the U.S. must be on guard.

When asked in a television interview whether Russia is trying to manipulate the American presidential election, Brennan didn’t say. But he noted that the FBI is investigating the hacking of Democratic National Committee emails, and he cited Moscow’s aggressive intelligence collection and its focus on high-tech snooping.

Continue reading “CIA Director John Brennan warns of Russian hacking” »