Archive for the ‘cybercrime/malcode’ category: Page 192
Aug 16, 2016
Everything you need to know about the NSA hack (but were afraid to Google)
Posted by Karen Hurst in categories: cybercrime/malcode, encryption, information science, privacy
A day in the life of an NSA Hacker.
In what Edward Snowden deems “not unprecedented,” hackers calling themselves the Shadow Brokers have collected NSA-created malware from a staging server run by the Equation Group, an internal hacking team. The Shadow Brokers published two chunks of data, one “open” chunk and another encrypted file containing the “best files” that they will sell for at least $1 million. Wikileaks has said they already own the “auction” files and will publish them in “due course.”
They’ve also released images of the file tree containing a script kiddie-like trove of exploits ostensibly created and used by the NSA as well as a page calling out cyber warriors and “Wealthy Elites.” The page also contains links to the two files, both encrypted. You can grab them using BitTorrent here.
Continue reading “Everything you need to know about the NSA hack (but were afraid to Google)” »
Aug 14, 2016
Scylex malware Kit offered for sale in the criminal underground
Posted by Karen Hurst in categories: cybercrime/malcode, finance
For Sale: A Scylex malware Kit please contact your nearest Dark Web for details.
Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities.
Security experts from the Heimdal security firm have discovered a new DIY financial crime kit offered for sale on a notorious malicious hacker forum on the dark web called Lampeduza.
Continue reading “Scylex malware Kit offered for sale in the criminal underground” »
Aug 14, 2016
How will quantum communication change life?
Posted by Karen Hurst in categories: cybercrime/malcode, particle physics, quantum physics, satellites
Although this another article that highlights again China’s planned launch; I wanted to share it because it does (in a pragmatic approach) highlight a couple of the key benefits for having QC.
The imminent launch of the world’s first quantum communication satellite is widely believed to herald a breakthrough in China’s development of quantum technology.
Mysterious and confusing, the study of minute particles smaller than atoms has been applied in fields as diverse as computer processing, lasers and nuclear technology.
Continue reading “How will quantum communication change life?” »
Aug 14, 2016
China to launch world’s first quantum hack-proof satellite
Posted by Karen Hurst in categories: cybercrime/malcode, quantum physics
Just days away from launch; what will a Chinese owned Quantum Satellite and network mean for the world particularly for the US, Canada, and Europe?
Beijing: China is set to launch the world’s first quantum communication satellite which boasts of hack-proof ultra high security features to prevent wiretapping and intercepts.
If the satellite works well, it will pave the way to a hack-proof communication system, state-run Xinhua news agency reported on Sunday.
Continue reading “China to launch world’s first quantum hack-proof satellite” »
Aug 11, 2016
Lock picking your way to cybersecurity at Def Con
Posted by Karen Hurst in categories: cybercrime/malcode, internet
New method on how to attend Def Con.
LAS VEGAS (AP) — Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats.
As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.
Continue reading “Lock picking your way to cybersecurity at Def Con” »
Aug 11, 2016
How Hackers Could Get Inside Your Head With ‘Brain Malware’
Posted by Carse Peel in categories: cybercrime/malcode, neuroscience
Researchers at the University of Washington in Seattle say that we need to act fast to implement a privacy and security framework to prevent our brain signals from being used against us before the technology really takes off…
Brain-computer interfaces offer new applications for our brain signals—and a new vector for security and privacy violations.
Aug 9, 2016
DARPA competition sees dawn of autonomous IoT hacking
Posted by Karen Hurst in categories: cybercrime/malcode, internet, military, quantum physics, robotics/AI
Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.
A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.
DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.
Continue reading “DARPA competition sees dawn of autonomous IoT hacking” »
Aug 9, 2016
Autonomous car development will speed up following a fatality
Posted by Karen Hurst in categories: cybercrime/malcode, robotics/AI, transportation
Many folks have voiced the concerns over autonomous autos for many legitimate reasons including hacking and weak satellite signals for navigation especially when you review mountain ranges of the east coast.
The world has witnessed enormous advances in autonomous passenger vehicle technologies over the last dozen years.
The performance of microprocessors, memory chips and sensors needed for autonomous driving has greatly increased, while the cost of these components has decreased substantially.
Continue reading “Autonomous car development will speed up following a fatality” »
Aug 8, 2016
DARPA Autonomous Bug-Hunting Bots Don’t Need Human Hackers Anymore: Are Bots The Future Of Cybersecurity?
Posted by Karen Hurst in categories: cybercrime/malcode, information science, quantum physics, robotics/AI
I already voiced my concerns of this technology in the hands of criminals and terrorists. If we can have it so can others. Only when QC and a Quantum net is in place will we be truly protected with bots.
Cybersecurity could soon be another place where bots become invaluable for experts. DARPA recently organized The Cyber Grand Challenge, where computer algorithms showed how easy it is to clean up vulnerabilities in code written by humans. ( DARPA )
The Cyber Grand Challenge took place under DARPA patronage, and it is good to see how preoccupied the U.S. Department of Defense is with cybersecurity.