Blog

Archive for the ‘cybercrime/malcode’ category: Page 187

Jun 7, 2016

China plans to set up global quantum communications network

Posted by in categories: cybercrime/malcode, quantum physics, satellites

China is getting their new Quantum communications infrastructure being prepped for deployment and adoption. Next month, the Quantum Satellite is launched to enable wireless communication that is secured and can block hacking; and we know what the reverse means for everyone else.

Now, China has unveiled that they have been planning and getting their cities ready for Quantum communications/ network adoption.


China leads the world in quantum communications.

Continue reading “China plans to set up global quantum communications network” »

Jun 7, 2016

Lo and Behold, Reveries of the Connected World: Movie Trailer

Posted by in categories: business, cybercrime/malcode, education, Elon Musk, health, internet, space travel

Legendary master filmmaker Werner Herzog examines the past, present and constantly evolving future of the Internet in Lo and Behold: Reveries of the Connected World. Working with NETSCOUT, a world leader in-real time service assurance and cybersecurity, which came aboard as a producer and led him into a new world, Herzog conducted original interviews with cyberspace pioneers and prophets such as PayPal and Tesla co-founder Elon Musk, Internet protocol inventor Bob Kahn, and famed hacker Kevin Mitnick. These provocative conversatons reveal the ways in which the online world has transformed how virtually everything in the real world works, from business to education, space travel to healthcare, and the very heart of how we conduct our personal relationships.

Read more

May 31, 2016

North Korean Facebook clone spotted; hacked shortly

Posted by in categories: computing, cybercrime/malcode

According to Mirror Online, the youngster is studying computing at college.

This gave the 18-year-old full control over the site, including the ability to “delete and suspend users, change the site’s name, censor certain words and manage the eventual ads”, as well as being able to “see everyone’s emails”.

Go to starcon.net.kp and you’ll find a very familiar looking website.

Continue reading “North Korean Facebook clone spotted; hacked shortly” »

May 30, 2016

China is readying to launch its first ‘hack proof’ quantum communication satellite

Posted by in categories: cybercrime/malcode, quantum physics

Personally, if this doesn’t spook you then I have to question your sanity.


Quantum communication and quantum teleportation are two technologies ancient India invented and mastered. It saddens me to see the Chinese stealing a march in these fields. India must formulate a response by studying Vedic texts to rediscovered the blueprints to these advanced technologies. I’m confident that under Modi-ji’s brilliant leadership, India will quickly surpass China and America in the field of quantum teleportation and quantum communication by 2020!

http://www.techworm.net/2016/05/china-ready-launch-first-hac…llite.html

Continue reading “China is readying to launch its first ‘hack proof’ quantum communication satellite” »

May 29, 2016

Meet the startups 3D printing living cells, editing genes and growing meat in laboratories

Posted by in categories: 3D printing, biological, cybercrime/malcode, food

Hacking o ser humano: a startups de impressão 3D de células vivas, edição de genes e de carne crescente em laboratórios.

Read more

May 26, 2016

China may send the first unhackable messages with quantum encryption

Posted by in categories: cybercrime/malcode, encryption, quantum physics, satellites

I sure hope US, Canada, UK, etc. are already for a Quantum Net China.


China is set to become the first nation in the world to launch a quantum communications satellite, which might make its data hacker-proof.

Read more

May 26, 2016

A computer that uses 8-inch floppy disks “coordinates the operational functions“ for nuclear forces

Posted by in categories: cybercrime/malcode, government

America’s Department of Defense (DOD) “coordinates the operational functions of the United States’ nuclear forces with a 1970s computer system that uses 8-inch floppy disks” says a report by the United States Government Accountability Office.


On January 13, US President Barack Obama, speaking at the National Cybersecurity and Communications Integration Center (NCCIC), addressed the issue of cybersecurity, one day after the official Twitter account for the US Central Command (Centcom) was hacked by supporters of the Islamic State.

Read more

May 25, 2016

China to combat hackers with launch of quantum communication satellite

Posted by in categories: cybercrime/malcode, quantum physics

Although this states it is to protect China; who will protect us from China’s hacks when they have this.


China is expected to launch the satellite into space in July.

Read more

May 22, 2016

Ransomware: the digital plague infecting the world

Posted by in categories: bitcoin, cybercrime/malcode, economics, encryption

“The individuals who do these types of attacks are well aware of the pressure points and pain points, economic-wise,” says Dr. John Hale, a cybersecurity expert at the University of Tulsa. “They know what they can extract, how much they can extract.

“They prey upon two things: an organization’s reliance on information systems and two, the common situation, where an organization is a little bit behind on backup procedures and policies to prevent these types of things. It really is easy pickings for the bad guys.”

Crypto ransomware is designed to encrypt data stored on the computer, making the data useless unless the user obtains the key to decrypt it. A message details the ransom, which is typically paid in digital currencies such as bitcoin. Locker ransomware locks the computer or device’s interface — save for the ability to interact with the hacker — and demands money to restore it.

Continue reading “Ransomware: the digital plague infecting the world” »

May 18, 2016

Digital Shadows — new tool helps organisations peer inside data breaches

Posted by in categories: business, cybercrime/malcode, singularity

Hmmmmm.


“We had analysts crawling all over that,” says Chappell of the Hold Security cache. “Quickly it was clear that a lot of those were from previous breaches.”

Anyone using this tool would have had a rapid assessment of their potential exposure. If breached data turns out to be new, the next task is to understand how it might have ended up in the hands of criminals. There are several sources for breached data including straight database theft but also phishing attacks and malware campaigns, each with its own dynamics and set of business implications.

Continue reading “Digital Shadows — new tool helps organisations peer inside data breaches” »