Blog

Archive for the ‘cybercrime/malcode’ category: Page 198

May 18, 2016

Chief Scientist at Security Innovation Presents on Quantum Safety at Fourth International Cryptographic Module Conference

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

I am glad that D. Whyte recognizes “If quantum computers are developed faster than anticipated, certification would mandate insecure modules, given the time to approve and implement new quantum resistant algorithms. Worse, it is conceivable that data encrypted by a certified module is more vulnerable than data encrypted by a non-certified module that has the option of using a quantum-safe encryption algorithm.”

Because many of us who are researching and developing in this space have seen the development pace accelerated this year and what was looking like we’re 10 years away is now looking like we’re less than 7 years.


Dr. William Whyte, Chief Scientist for Security Innovation, a cybersecurity provider and leader in the 2015 Gartner Magic Quadrant for Security Awareness Training, will be presenting at the Fourth International Cryptographic Module Conference in Ottawa, Ontario.

Read more

May 18, 2016

A hacker is reportedly selling the stolen emails and passwords of 117 million LinkedIn users

Posted by in categories: bitcoin, cybercrime/malcode, encryption, humor, internet

Privacy is practically a joke anymore.


A hacker known as “Peace” is selling what is reportedly account information from 117 million LinkedIn users. The stolen data is said to include email addresses and passwords, which a malicious party could use to gain access to other websites and accounts for which people used the same password.

LinkedIn says it has about 433 million members worldwide, so this data could represent 27% of its user base.

Continue reading “A hacker is reportedly selling the stolen emails and passwords of 117 million LinkedIn users” »

May 17, 2016

Mason researchers keep networks moving to stay safe from hacker attacks

Posted by in categories: cybercrime/malcode, information science, internet, quantum physics

Given the fact that Los Alamos Labs have been and continue to advance cyber security work on the Quantum Internet as well as work in partnerships with other labs and universities; so, why isn’t Mason not collaborating with Los Alamos on developing an improved hacker proof net? Doesn’t look like the most effective and cost efficient approach.


Imagine burglars have targeted your home, but before they break in, you’ve already moved and are safe from harm.

Now apply that premise to protecting a computer network from attack. Hackers try to bring down a network, but critical tasks are a step ahead of them, thanks to complex algorithms. The dreaded “network down” or denial of service message never flashes on your screen.

Continue reading “Mason researchers keep networks moving to stay safe from hacker attacks” »

May 13, 2016

Half the Web’s traffic comes from bots, and that’s costing you more than you think

Posted by in categories: cybercrime/malcode, robotics/AI

In the US we have an old saying “fight fire with fire” and in this case “fight bots with bot/s” It should be noted, having a bot or any type of AI on your network is not necessarily going to prevent 100% of the hacking and Cyber threats today due to the weak connected infrastructure across the net, etc. However, to counter attack the pesky bots that we’re seeing around online ads, click monitoring can be limited by AI.


Roughly half of all Web traffic comes from bots and crawlers, and that’s costing companies a boatload of money.

That’s one finding from a report released Thursday by DeviceAtlas, which makes software to help companies detect the devices being used by visitors to their websites.

Continue reading “Half the Web’s traffic comes from bots, and that’s costing you more than you think” »

May 7, 2016

DARPA looking to develop new technology to ID cybercriminals

Posted by in categories: biotech/medical, cybercrime/malcode, government, law enforcement

CRISPR to take bio- and dirty-bombs to new levels.
Great; however, QC needs to be front and center on this; or, I see a bunch of funding spent on research that will be render useless by the time it goes to market due to the progress in QC.

I truly feel bad for the labs who are having to tests for bio- and dirty-bomb material. Really a dangerous job.


The Defense Advanced Research Projects Agency (DARPA) is looking for research proposals to develop a system that would enable the government and law enforcement to identify the actual individual behind a cyber attack.

Continue reading “DARPA looking to develop new technology to ID cybercriminals” »

May 2, 2016

That time a bot invaded Thingiverse and created weird new 3D objects

Posted by in categories: cybercrime/malcode, robotics/AI

I guess this falls into those code bugs in AI that Google’s Vint Cerf has stated his own larger concer around AI.


Some called it art, some called it spam—and some thought it might be a new life form.

Read more

May 2, 2016

Vint Cerf: Buggy Software Is Scarier Than A Robot Takeover

Posted by in categories: cybercrime/malcode, internet, robotics/AI

Luv it!!!! Another fellow experienced AI SME having the same point of view that many other well seasoned AI experts have. Cerf is more concerned about coding bugs and not killer robots; and I and others are also concern about the weakness of the connected infrastructure, weak under pinning technology, and hacking/ criminals hotwiring or overriding AI systems to do their dirty deed and we’re not (like Cerf) concerned over robots and machines taking over the world.


Robots won’t take over humans, but buggy software might, according to the Google exec known as the “father of the Internet.”

Asked for his thoughts on the risk of a robotic overthrow, Google’s chief internet evangelist, Vint Cerf, said he doesn’t fear that problem — especially because artificial intelligence technology isn’t that sophisticated.

Continue reading “Vint Cerf: Buggy Software Is Scarier Than A Robot Takeover” »

Apr 30, 2016

Mobile Designer Hacks Apple Watch To Run Windows 95 For Wrist-Mounted Retro Goodness

Posted by in category: cybercrime/malcode

Hotwiring your Apple watch to run Win95. My 1st question is why? Why would anyone want to work with such a dated system; and I worked many years at Microsoft and don’t understand the logic on this one. I would at least try Win 10. Granted the person states they like retro. If I want retro, I just hook up a PS2, or Wang VS.


Developer Nick Lee managed to get Windows 95 working on his Apple Watch. And Apple Watch definitely has the specs (check our full review). The watch packs in a 520 MHz processor, 512 MB of RAM, and 8GB of internal storage. Compared with Nick’s original $3,000, 300 MHz Pentium II powered PC with 256MB of RAM, the Apple Watch is practically the Computeress from Dexter’s Laboratory. There were quite a few hurdles to overcome, however, before Windows 95 was up and running.

Continue reading “Mobile Designer Hacks Apple Watch To Run Windows 95 For Wrist-Mounted Retro Goodness” »

Apr 29, 2016

NIST aiming for quantum-proof crypto

Posted by in categories: cybercrime/malcode, information science, quantum physics

Due to the pace of Quantum Computing is developing; NIST is rushing to create a Quantum proof cryptographic algorithms to prevent QC hacking. Like I have stated, I believe we’re now less that 7 years away for QC being in many mainstream devices, infrastructure, etc. And, China and it’s partnership with Australia; the race is now on and hotter than ever.


The National Institute for Standards and Technology has begun to look into quantum cybersecurity, according to a new report that details and plans out ways scientists could protect these futuristic computers.

April 29, 2016.

Continue reading “NIST aiming for quantum-proof crypto” »

Apr 29, 2016

Futuristic ‘post-quantum’ cryptography is subject of UWT symposium

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics, supercomputing

Post-quantum cryptography discussion in Tacoma WA on May 5th discussing hacking by QC hackers and leveraging Cryptography algorithms to offset the attacks; may be of interest to sit in and even join in the debates. I will try attend if I can because it would be interesting to see the arguments raised and see the responses.


The University of Washington Tacoma Institute of Technology will present a discussion about the esoteric field of post-quantum cryptography at the Northwest Cybersecurity Symposium on May 5.

“I’ve been researching post-quantum cryptography for years, finding ways to protect against a threat that doesn’t yet exist,” said Anderson Nascimento, assistant professor of computer science at the institute, in a release.

Continue reading “Futuristic ‘post-quantum’ cryptography is subject of UWT symposium” »