БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 209

Feb 14, 2016

Attackers try to compromise Magento with a fake patch

Posted by in category: cybercrime/malcode

Watch out for new patch from Magento — hackers are at it again.


Attackers are still trying to find Magento installations that haven’t patched a particularly bad vulnerability, this time trying to trick people into downloading a fake patch.

The bogus patch purports to fix a flaw known as the Shoplift Bug, or SUPEE-5344, wrote Denis Sinegubko, a senior malware researcher with Sucuri.

Continue reading “Attackers try to compromise Magento with a fake patch” »

Feb 14, 2016

Bringing Innovation into Cyberdefense Technologies

Posted by in categories: cybercrime/malcode, internet, security

Nice article; something that I agree very much with is the perspective that both Cyber Security is intertwined with technology innovation and adoption. Tech and other companies creating products or even services that leverages the net, can easily see their revenue potentials impacted due to poor Cyber Security. Example, Hello (Wi-Fi) Barbie by Mattel; when it was announced that the doll was indeed hackable; many buying consumers buying for their children left her on the shelf.


Hackers use innovative thinking when breaching systems, why can’t government?

by Larry Karisny

Continue reading “Bringing Innovation into Cyberdefense Technologies” »

Feb 14, 2016

Top CEOs Focusing on Cognitive Computing

Posted by in categories: business, cybercrime/malcode, internet, neuroscience, robotics/AI, security

I believe it is wonderful to think about cognitive computing. However, as a fellow CIO & CTO, I would suggest a key priority has to be focused on Cyber Security until it is resolved; or in a better position to proactively blocker would be intruders. Without a solid Cyber Security plan and model in place and operational; your cognitive computing capabilities will be worth nothing in the end once hackers are helping themselves to your IP and other information as well as your AI machines.


The news comes from the recent IBM Institute for Business Value study, “Redefining Competition: Insights from the Global C-suite Study — The CEO perspective.” Researchers interviewed more than 5,000 C-level executives worldwide about their perspectives on a variety of technology issues, including the importance of mobile solutions, cloud Relevant Products/Services computing, and the Internet of Things.

Torchbearers and Market Followers.

Continue reading “Top CEOs Focusing on Cognitive Computing” »

Feb 14, 2016

Chinese cyber strategy-building deterrence

Posted by in categories: cybercrime/malcode, military, security, space

China’s public report on their own Cyber Security Strategy — don’t get too excited; it is a “public” version of their plan (mean nothing in depth).


New cyber warfare unit

While China was assessed to have cyber warfare capabilities for quite some time, the declaration by its Central Military Council of the formation of a new military branch focussed on digital battleground technically called Strategic Support Force on 1st Jan. 2016 confirmed this. This new force is mainly aimed at providing resources capable of protecting China’s cyber and space security. On this occasion Xi pointed out that this force is central to achieving the “Chinese Dream” suggesting its importance.

Continue reading “Chinese cyber strategy-building deterrence” »

Feb 14, 2016

Clueless In Cyber-Security Land

Posted by in categories: cybercrime/malcode, neuroscience, robotics/AI, security

Very good read; and hints at something that I have been highlighting for a while around AI, NextGen transformation and adoption, etc. One very large brick wall that I highlighted in my latest posts around 5 areas that need to be address for AI to be adopted more broadly is Cyber Security.

If we do not get Cyber Security address soon around hackers, cloud, etc. AI (including robotics), brain interfaces, etc. will be either rejected or very limited in its adoption. It is just that simple.


What are CISO’s (Chief Information Security Officers) worrying about in 2016?

Continue reading “Clueless In Cyber-Security Land” »

Feb 12, 2016

DMDII announces 6 research awards in digital manufacturing disciplines

Posted by in category: cybercrime/malcode

DARPA’s intent to improve “digitized” SCM.


The DMDII has issued six national contract research awards, including funding to test and aid compliance with the nation’s cybersecurity standards for digital manufacturing.

Read more

Feb 8, 2016

Cybersecurity Challenges, Opportunities Discussed at Dedication of Expanded National Cybersecurity Center of Excellence

Posted by in categories: business, cybercrime/malcode, quantum physics

If Russia, China, etc. upgrades their infrastructure to Quantum before US and it’s does; today’s breaches will not even compare to this scenario.


The push to bring more technology-related businesses to the state has officials hoping for long-term growth over places like Fairfax County, Va., where the federal government has already made substantial technological investment.

After the ceremony, an expert panel discussed some of the opportunities and challenges facing information infrastructure, the importance of collaboration between the public and private sectors, and how to increase consumers’ cybersecurity confidence.

Continue reading “Cybersecurity Challenges, Opportunities Discussed at Dedication of Expanded National Cybersecurity Center of Excellence” »

Feb 6, 2016

Your only choice is to build better artificial intelligence tech than others: Brad Templeton

Posted by in categories: business, cybercrime/malcode, internet, mobile phones, nanotechnology, robotics/AI, security, singularity, transportation

Brand’s view and concerns about hacking driverless cars are valid. And, I do believe in time that government will eventually catch up in passing some laws that will make companies ensure that their technology is safe for consumer usage and are safe for the public. I just hope that the pendulum does swing too far to the other side of over regulation.


It is not easy to slot Brad Templeton. What do you make of a person who is not only the networks and computing chair at Singularity University in Silicon Valley but also a software architect, a director of the Foresight Nanotech Institute, board member of the cyberspace watchdog Electronic Frontier Foundation, the first person to have set up an Internet-based business, a futurist lecturer, hobby photographer, artist, as well as a consultant on Google’s driverless car design team?

In a phone interview from the US, Templeton, who will be in India this month as a key speaker during the SingularityU India Summit (to be held in association with INK, which hosts events like INKtalks—a platform for the exchange of cutting-edge ideas and inspiring stories), shared his views on driverless cars, the perceived threat from intelligent machines and censorship of the Internet. Edited excerpts:

Continue reading “Your only choice is to build better artificial intelligence tech than others: Brad Templeton” »

Feb 5, 2016

USENIX Enigma 2016 — Protecting High Risk Users

Posted by in categories: cybercrime/malcode, security

Eva Galperin, Electronic Frontier Foundation.
Morgan Marquis-Boire, Citizen Lab, University of Toronto.

Protecting high-risk individuals has always been a problem for the security industry. While many enterprises focus on mitigating scenarios that will affect the greatest number of their users, harm from attacks is not distributed proportionally. Cyber-attacks on high-risk individuals in dangerous situations can lead to torture, kidnapping, and worse. But dealing with targeted attacks is time-consuming and resource intensive. This problem is exacerbated when the target is an individual or small NGO rather than a large enterprise. This talk will discuss the challenges of protecting high-risk, targeted users using the experience of the speakers in assisting targeted NGOs and individuals.

Continue reading “USENIX Enigma 2016 — Protecting High Risk Users” »

Feb 4, 2016

Perspectives on the Cyber Physical Human World

Posted by in categories: cybercrime/malcode, privacy, quantum physics, robotics/AI, security

The 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Boy! I wish I could attend this meeting. I can imagine all of the conversations now “Quantum” & “Cyber Attacks” with some good old AI thrown in the mix. I am also guess that the 2 articles this week on the NSA maybe brought up too.


SMi Group reports: The MITRE Corporation will be presenting at the SMi’s 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Read more