Blog

Archive for the ‘cybercrime/malcode’ category: Page 195

Jul 14, 2016

Elon Musk Warns that DARPA A.I. Hacking Challenge Will Lead to Skynet

Posted by in categories: cybercrime/malcode, Elon Musk, robotics/AI

He may or may not be joking.

Read more

Jul 14, 2016

You say you want a revolution: DARPA’s Cyber Grand Challenge

Posted by in category: cybercrime/malcode

DARPA’s self-repairing security system’s challenge.


In a few weeks, a town better known for events like the World Series of Poker will host the World Series of Hacking.

Continue reading “You say you want a revolution: DARPA’s Cyber Grand Challenge” »

Jul 13, 2016

FCA will pay you to hack its systems

Posted by in category: cybercrime/malcode

Ever wanted to be a paid hacker? Well, here is your chance.


In an effort to enhance cybersecurity, FCA is working with Bugcrowd to pay out bounties for hackers who find systems exploits. They will pay up to $1,500.

Read more

Jul 13, 2016

4 cyberattacks in 1 year make British rail network potential commuter deathtrap

Posted by in category: cybercrime/malcode

Yikes.


Britain’s railway network is notoriously overpriced, overcrowded, and experiences frequent delays. Now cyberattacks are threatening to turn the morning commute into a deathtrap as well.

The world’s oldest railway system has been the victim of four major cyberattacks in the past year alone, security experts claim.

Continue reading “4 cyberattacks in 1 year make British rail network potential commuter deathtrap” »

Jul 13, 2016

FDIC was hacked

Posted by in category: cybercrime/malcode

I knew about the hack; however, CIO covered it up is a new twist to this story.


Problems uncovered after employees walk off job with thousands of SSNs on flash drives.

Read more

Jul 12, 2016

Berkshire offers cyber cover for architects and engineers

Posted by in category: cybercrime/malcode

Not shocked by this because I have seen some of these policies in various forms already.


Berkshire Hathaway Specialty Insurance Co. on Tuesday said it has launched a U.S. professional liability policy for architects and engineers that includes cyber coverage.

Professional First Architects & Engineers Professional Liability Insurance’s cyber coverage addresses media, technology and network security and privacy liability exposures, including the cost of responding to a data breach or network extortion threat, BHSI said in a statement.

Continue reading “Berkshire offers cyber cover for architects and engineers” »

Jul 12, 2016

Detecting Cybersecurity Threats

Posted by in categories: cybercrime/malcode, energy, robotics/AI

Power sensors for distribution networks have inspired a $77-million DARPA program to build a suite of automated cyberdefenses for power grids.

Read more

Jul 9, 2016

China Nears Launch Of Its “Hack-Proof” Quantum Satellite

Posted by in categories: cybercrime/malcode, quantum physics, satellites

All seems to be on schedule this time for China’s Quantum Satellite Launch in the next few weeks. Google, hope you’re ready.


China will be launching its quantum satellite next month, answering longstanding questions about whether or not a global quantum network is feasible.

Read more

Jul 9, 2016

Technical Failure, Not Hackers, Took Down NATO-Linked Websites

Posted by in categories: cybercrime/malcode, geopolitics

Makes me wonder how much money was spent on this technical masterpiece.


WARSAW—Officials blamed technical failure—not a cyberattack—for the recent outages of two websites affiliated with the North Atlantic Treaty Organization.

NATO’s cybersecurity experts were on heightened alert for cyberattacks during the alliance’s biennial summit, which has seen the organization’s top leaders gather in the Polish capital this week.

Continue reading “Technical Failure, Not Hackers, Took Down NATO-Linked Websites” »

Jul 9, 2016

Microsoft calls for independent body to address cyber attribution

Posted by in category: cybercrime/malcode

No comment!


In a move to support the development of global cybersecurity norms, Microsoft calls for improved cyber attribution to identify cyberattack perpetrators.

Read more