БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 193

Aug 4, 2016

Hackers could get inside your brain, warns experts

Posted by in categories: cybercrime/malcode, neuroscience, quantum physics

I have reported on this threat for a very long time as we see more BMI technology advance. However, one are where things could drastically reduce hacking and breeches is the migration to a Quantum based net and infrastructure.


Cyberthieves might be mining personal information from your brainwaves at this very moment.

Continue reading “Hackers could get inside your brain, warns experts” »

Aug 4, 2016

Robot hackers could be the future of cybersecurity @DARPA #DARPACGC @defcon #technology #defcon

Posted by in categories: cybercrime/malcode, robotics/AI

Hackers fighting hackers; wonder what will happen in another20 years when super humans start to become more and more introduced into the mainstream, in this space. Stating dark web hackers will not have access to BMI and other enhancing technologies is not reality either.


The final round of DARPA’s Cyber Grand Challenge pits computers against one another as human programmers watch the future of cybersecurity unfold.

Read more

Aug 3, 2016

One man turned his Tesla into a giant ‘Pokémon GO’ machine

Posted by in categories: cybercrime/malcode, sustainability, transportation

We don’t recommend playing “Pokémon GO” while driving, but we have to admit this Tesla hack is cool in theory.

Read more

Aug 3, 2016

Russian web hosting service a favorite among cybercriminals

Posted by in categories: cybercrime/malcode, internet

A Russian web hosting service is providing an avenue for cybercriminals to set up sites for selling stolen passwords, credit cards, and other pilfered personal information, a cybersecurity firm said.

The web hosting company Deer.io has become popular among online thieves because it’s easy to use and asks few questions from users, said Rick Holland, vice president of strategy at the cybersecurity firm Digital Shadows, on Tuesday at the Black Hat cybersecurity conference in Las Vegas.

Continue reading “Russian web hosting service a favorite among cybercriminals” »

Aug 2, 2016

Hackers Hijack a Big Rig Truck’s Accelerator and Brakes

Posted by in categories: cybercrime/malcode, robotics/AI, transportation

This is the type of hijacking that the US DHS has been worried about. And, now we’re looking at self-driving Big Rigs and commercial jets.; as I stated last year I would hesitate in allowing autonomous planes and Big Rigs until we have a breech proof connected infrastructure in place.


As researchers demonstrate digital attacks on a 33,000 pound truck, car hacking is moving beyond consumer vehicles.

Read more

Jul 30, 2016

HoloLens Hack Fools the Brain Into Fixing Itself

Posted by in categories: augmented reality, cybercrime/malcode, neuroscience

https://www.youtube.com/watch?v=tjoe3LrkiIk

Microsoft’s amazing HoloLens is the world’s first stand-alone headset that lets users see virtual objects and environments as if they existed in the real world. This device’s entertainment potential is practically unlimited, but as a Hackathon team recently demonstrated, it can also be used to rewire a malfunctioning brain.

A Microsoft employee suffering from myoclonus-dystonia —a condition where the misfiring of the brain causes uncontrollable muscle spasms—discovered that she could regain control during a spasm by looking at her partner’s feet rather than her own. And that’s how she got her great idea: Why not use the HoloLens to retrain the brain and get it to act differently? To that end, she recruited the Microsoft Hackathon team to put the idea to the test.

Continue reading “HoloLens Hack Fools the Brain Into Fixing Itself” »

Jul 29, 2016

China’s new quantum satellite paves the way for unhackable satellite internet

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics, satellites

All that I can say is “WOW!”


CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.

The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.

Continue reading “China’s new quantum satellite paves the way for unhackable satellite internet” »

Jul 28, 2016

Air Force awards contract for deceptive cyber research

Posted by in category: cybercrime/malcode

The Air Force awarded a contract for research in deceptive cyber to be used toward network defense.

Read more

Jul 28, 2016

FBI’s Mass Hack Hit 50 Computers in Austria

Posted by in category: cybercrime/malcode

Revelations that the ‘Operation Pacifier’ child porn investigation extended to Austria too shows the extent of the FBI’s reach overseas.

Read more

Jul 21, 2016

BioCryptography and Biometric Penetration Testing

Posted by in categories: biotech/medical, cybercrime/malcode, engineering, privacy

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

Continue reading “BioCryptography and Biometric Penetration Testing” »