Blog

Archive for the ‘cybercrime/malcode’ category: Page 202

Jul 17, 2015

**Award-Winning** Sci-Fi Short Film: “SYNC”

Posted by in categories: computing, cybercrime/malcode

Every 15 seconds, a computer, network, or mobile device is hacked by cyber-terrorists. To combat this problem, Syntek Industries has manufactured data couriers designed from advanced machine robotics. These couriers are known as SYNCS. Syncs are programmed to securely deliver data packages without interruption.

Read more

Mar 5, 2015

Protect Yourself from Cyber Crime

Posted by in category: cybercrime/malcode

By — SingularityHubhttp://cdn.singularityhub.com/wp-content/uploads/2015/02/15462325023_6bea87f2da_h-1000x400.jpg

This blog is about the downside of exponential technology: digital crime.

Normally, I choose to focus on the immensely positive impact technology has on humanity – the Abundance mindset.

Read more

Jan 28, 2015

Snowden Claims U.S. Policy Is Creating A Black Market For Digital Weapons

Posted by in category: cybercrime/malcode

— Tech Crunch

Edward Snowden says in a new interview with NOVA Next that the U.S. government wrongly promotes cyber offense strategies at the expense of weakening the system and leaving it open to cyber attacks from the black market.

“We’re creating a class of Internet security researchers who research vulnerabilities, but then instead of disclosing them to the device manufacturers to get them fixed and to make us more secure, they sell them to secret agencies,” Snowden says. “They sell them on the black market to criminal groups to be able to exploit these to attack targets. And that leaves us much less secure, not just on an individual level, but on a broad social level; on a broad economic level. And beyond that, it creates a new black market for computer weapons, basically digital weapons.”

Read more

Jan 4, 2015

New Book: An Irreverent Singularity Funcyclopedia, by Mondo 2000’s R.U. Sirius.

Posted by in categories: 3D printing, alien life, automation, big data, bionic, bioprinting, biotech/medical, complex systems, computing, cosmology, cryptocurrencies, cybercrime/malcode, cyborgs, defense, disruptive technology, DNA, driverless cars, drones, economics, electronics, encryption, energy, engineering, entertainment, environmental, ethics, existential risks, exoskeleton, finance, first contact, food, fun, futurism, general relativity, genetics, hacking, hardware, human trajectories, information science, innovation, internet, life extension, media & arts, military, mobile phones, nanotechnology, neuroscience, nuclear weapons, posthumanism, privacy, quantum physics, robotics/AI, science, security, singularity, software, solar power, space, space travel, supercomputing, time travel, transhumanism

Quoted: “Legendary cyberculture icon (and iconoclast) R.U. Sirius and Jay Cornell have written a delicious funcyclopedia of the Singularity, transhumanism, and radical futurism, just published on January 1.” And: “The book, “Transcendence – The Disinformation Encyclopedia of Transhumanism and the Singularity,” is a collection of alphabetically-ordered short chapters about artificial intelligence, cognitive science, genomics, information technology, nanotechnology, neuroscience, space exploration, synthetic biology, robotics, and virtual worlds. Entries range from Cloning and Cyborg Feminism to Designer Babies and Memory-Editing Drugs.” And: “If you are young and don’t remember the 1980s you should know that, before Wired magazine, the cyberculture magazine Mondo 2000 edited by R.U. Sirius covered dangerous hacking, new media and cyberpunk topics such as virtual reality and smart drugs, with an anarchic and subversive slant. As it often happens the more sedate Wired, a watered-down later version of Mondo 2000, was much more successful and went mainstream.”


Read the article here >https://hacked.com/irreverent-singularity-funcyclopedia-mondo-2000s-r-u-sirius/

Jan 3, 2015

Legal Consulting Firm Believes Artificial Intelligence Could Replace Lawyers by 2030

Posted by in categories: architecture, automation, big data, business, complex systems, computing, cybercrime/malcode, disruptive technology, economics, encryption, engineering, ethics, finance, futurism, geopolitics, governance, government, human trajectories, information science, innovation, internet, law, law enforcement, military, neuroscience, philosophy, policy, privacy, robotics/AI, science, security, software, strategy, supercomputing, transhumanism, transparency

Quoted: “Tony Williams, the founder of the British-based legal consulting firm, said that law firms will see nearly all their process work handled by artificial intelligence robots. The robotic undertaking will revolutionize the industry, “completely upending the traditional associate leverage model.” And: “The report predicts that the artificial intelligence technology will replace all the work involving processing information, along with a wide variety of overturned policies.”

Read the article here > https://hacked.com/legal-consulting-firm-believes-artificial…yers-2030/

Dec 29, 2014

Corporate Reconnoitering?

Posted by in categories: cybercrime/malcode, cyborgs, defense, economics, electronics, encryption, engineering, ethics, existential risks, finance, futurism, information science, innovation, life extension, physics, science, security, sustainability

Corporate Reconnoitering?

000000000 blitz 400
ABSOLUTE END.

Authored By Copyright Mr. Andres Agostini

White Swan Book Author (Source of this Article)

http://www.LINKEDIN.com/in/andresagostini

Continue reading “Corporate Reconnoitering?” »

Nov 20, 2014

Has the flawed password system finally had its day?

Posted by in categories: computing, cybercrime/malcode, encryption, privacy

— BBC

woman thinking in from of password graphic

Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess.

Yet we still forget them. And they also get stolen with alarming frequency.

Continue reading “Has the flawed password system finally had its day?” »

Sep 12, 2014

Celebgate Could Inspire More Bitcoin Blackmail

Posted by in categories: bitcoin, cybercrime/malcode

Caleb Chen — Cryptocoinsnews

bitcoin hacker blackmail

The Celebgate incident is still unfolding, and we are already seeing mainstream media report on the connection between the “nude celebrity photos” and Bitcoin. The original leaker of the pictures returned to 4chan recently to respond to the uproar he had caused. An excerpt from his post highlights Bitcoin’s involvement in Celebgate:

People wanted **** for free. Sure, I got $120 with my bitcoin address, but when you consider how much time was put into acquiring this stuff (i’m not the hacker, just a collector), and the money (i paid a lot via Bitcoin as well to get certain sets when this stuff was being privately traded Friday/Saturday) I really didn’t get close to what I was hoping.

Continue reading “Celebgate Could Inspire More Bitcoin Blackmail” »

Sep 7, 2014

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

Posted by in category: cybercrime/malcode

By — Wired

icloud-hack-tools-inline

As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

Read more

Aug 28, 2014

Don’t Get Hacked at Black Hat and DefCon

Posted by in category: cybercrime/malcode

By Neil J. Rubenking — PC
Black Hat 2014 Venue
The trainings component of the 2014 Black Hat USA conference in Las Vegas has already begun. Press folk aren’t invited for trainings, but SecurityWatch will be there to cover the briefings Wednesday and Thursday. The briefings can be shocking. In past years, researchers revealed a technique to pwn any iOS device using a gimmicked charger, described a technique for mining your Twitter feed to create convincing phishing emails, and demonstrated an Android weakness that would allow hackers to Trojanize an Android app undetectably. And those were all part of the relatively sedate Black Hat; things get even hairier at the wild and woolly DefCon that follows.

The world’s best hackers flock to these conferences, people who live and breathe security and hacking. They don’t stop trying to hack all the things just because they’re at a conference. In fact, DefCon features a “Wall of Sheep” to publicly shame any attendees careless enough to get hacked. If you’re attending, you’ll want to crank up your paranoia and be as careful as possible.

Read more