БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 190

Sep 1, 2016

Russia, China Collaborate On New eCommerce Site

Posted by in categories: cybercrime/malcode, finance, food, media & arts, mobile phones

This one makes me to want to dig more into the reason especially since just last week Russia announced its distrust of Chinese tech being used to hack into Russia’s governmental systems, etc. And, one thing about Russia and China is their protection and involvement in commerce and financials.


New trade routes are expanding between Russia and China. That’s according to Russia’s Far East Development Fund, which said an agreement has been made with Chinese technology company LeEco to develop an eCommerce platform focused on increasing food exportation to China.

LeLive, the name of the new platform, will broaden and increase sales of Russian agricultural items and products in the Chinese market. Facilitated by LeEco’s online platform — called “Le Ecosystem,” which has a monthly connection with more than 800 million users — the goal of the platform is to meet Chinese customers’ needs. Russian goods that will be available through the platform range from basics, like flour, butter and honey, to assorted beverages, sweets, canned meats and nuts.

Continue reading “Russia, China Collaborate On New eCommerce Site” »

Sep 1, 2016

Vint Cerf’s Outlook for the Internet He Helped Create

Posted by in categories: cybercrime/malcode, engineering, internet

Internet pioneer Vint Cerf sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.

“We’re much more conscious of the need to make the system more secure than it has been,” Cerf, Google’s chief internet evangelist, says in an interview with Information Security Media Group. “And there’s a lot going on in the Internet Engineering Task Force [an international community of network designers, operators, vendors and researchers] to achieve that objective. And I anticipate in the course of the next decade or so that we will actually see a lot more mechanisms in place in order to enhance security and privacy and safety.”

But if internet security isn’t improved, Cerf says, “people will decide it’s not an environment they find worthy of trust, in which case they’ll look for something else. Maybe, something will replace the internet that’s more secure than it is today.”

Continue reading “Vint Cerf’s Outlook for the Internet He Helped Create” »

Aug 31, 2016

Brain hi-jacking could become a reality soon, warn researchers

Posted by in categories: biotech/medical, cybercrime/malcode, neuroscience

A very old story and one that myself and others have raised many times. However, worth repeating due to the current advancements in BMI.


A vulnerability of brain implants to cyber-security attacks could make “brainjacking”, which has been discussed in science fiction for decades, a reality, say researchers from the University of Oxford. Writing in The Conversation, an Australia-based non-profit media, Laurie Pycroft discussed brain implants as a new frontier of security threat.

The most common type of brain implant is the deep brain stimulation (DBS) system. It consists of implanted electrodes positioned deep inside the brain connected to wires running under the skin, which carry signals from an implanted stimulator.

Continue reading “Brain hi-jacking could become a reality soon, warn researchers” »

Aug 31, 2016

Letter: U.S. lags far behind China in quantum computing technology

Posted by in categories: climatology, cybercrime/malcode, government, quantum physics, satellites, sustainability

The Wall Street Journal on Aug. 16 reported that China sent the world’s first quantum communications satellite into orbit. The newspaper also stated that China spent $101 billion in 2015 on quantum research and technology development. The satellite has the ability to greatly expand China’s ability to expand their unhackable communications.

Now we in the U.S. read almost daily about some U.S. computer system that has been hacked. Our current technology cannot be considered secure. So what is our government investing in?

According to the GAO, the U.S. spent over $10 billion on global climate change science and technology in 2014. Gave $400 million to Iran for who knows what, and spent about $200 million on quantum technology.

Continue reading “Letter: U.S. lags far behind China in quantum computing technology” »

Aug 27, 2016

How quantum computers will change the world of hacking

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

There is a computing revolution coming, although nobody knows exactly when. What are known as “quantum computers” will be substantially more powerful than the devices we use today, capable of performing many types of computation that are impossible on modern machines.

But while faster computers are usually welcome, there are some computing operations that we currently rely on being hard (or slow) to perform.

Specifically, we rely on the fact that there are some codes that computers can’t break – or at least it would take them too long to break to be practical. Encryption algorithms scramble data into a form that renders it unintelligible to anyone that does not possess the necessary decryption key (normally a long string of random numbers).

Continue reading “How quantum computers will change the world of hacking” »

Aug 26, 2016

China Sets New Tone in Drafting Cybersecurity Rules

Posted by in categories: business, cybercrime/malcode, encryption, government, information science

I have been seeing this for the recent weeks; I find it interesting and another step in China’s own move to be a global leader of tech. Could be either good or bad in the longer term.


China is taking a more inclusive tack in instituting cybersecurity standards for foreign technology companies, allowing them to join a key government committee in an effort to ease foreign concerns over the controls.

The committee under the government’s powerful cyberspace administration is in charge of defining cybersecurity standards. For the first time, the body earlier this year allowed select foreign companies— Microsoft Corp. MSFT −0.39 %, Intel Corp. INTC 0.43 %, Cisco Systems Inc. CSCO 0.14 % and International Business Machines Corp.—to take an active part in drafting rules, rather than participating simply as observers, said people familiar with the discussions.

Continue reading “China Sets New Tone in Drafting Cybersecurity Rules” »

Aug 25, 2016

Financial Networking Company Prepares for?Post-Quantum World

Posted by in categories: cybercrime/malcode, encryption, finance, privacy, quantum physics

Interesting read on IPC Systems Inc. is partnering with U.K. startup Post-Quantum to (in their own words) “offer its clients encryption, biometric authentication and a distributed-ledger record-keeping system that the software company says is designed to resist hacking — even by a quantum computer.” — I will be researching this more.


(Bloomberg) — When it comes to cybersecurity, no one can accuse IPC Systems Inc., the New Jersey-based company that builds communications networks for trading firms and financial markets, of preparing to fight the last war.

Read more

Aug 25, 2016

Board Recommends Further Use Of Autonomy In Sea Control, Support Of Ground Troops

Posted by in categories: cybercrime/malcode, military, robotics/AI

Hmmmm.


The U.S. Navy and Marine Corps should advance the way they use unmanned systems, favoring greater autonomy over remotely-controlled missions and developing multi-vehicle systems such as swarms and cascaded operations, according to a recently released report by the Defense Science Board.

The DSB report, requested by the Pentagon’s acquisition chief in November 2014, notes a variety of Pentagon-wide challenges in developing, testing, fielding and operating autonomous systems, such as operator trust, cyber security and developing a test and evaluation plan for learning systems.

Continue reading “Board Recommends Further Use Of Autonomy In Sea Control, Support Of Ground Troops” »

Aug 25, 2016

So your company’s been hacked: How to handle the aftermath

Posted by in categories: cybercrime/malcode, education, encryption

I can honestly say that many of us working with QC hasn’t warned folks for a while on the hacking risks around QC going against even today’s most sophisticated encryption models & methods; and to be developing a strategy in how to best handle this risk. With last weeks launch by China has shown the world that we are definitely not a decade away from this risk.


Education and planning are key, cyber-security expert Tyler Cohen Wood says.

Read more

Aug 24, 2016

Why quantum satellites will make it harder for states to snoop

Posted by in categories: cybercrime/malcode, quantum physics, satellites

Very true point.


With the launch of the world’s first quantum communication satellite, the era of unhackable communication has begun.

Read more