Blog

Archive for the ‘cybercrime/malcode’ category: Page 209

Feb 14, 2016

Clueless In Cyber-Security Land

Posted by in categories: cybercrime/malcode, neuroscience, robotics/AI, security

Very good read; and hints at something that I have been highlighting for a while around AI, NextGen transformation and adoption, etc. One very large brick wall that I highlighted in my latest posts around 5 areas that need to be address for AI to be adopted more broadly is Cyber Security.

If we do not get Cyber Security address soon around hackers, cloud, etc. AI (including robotics), brain interfaces, etc. will be either rejected or very limited in its adoption. It is just that simple.


What are CISO’s (Chief Information Security Officers) worrying about in 2016?

Continue reading “Clueless In Cyber-Security Land” »

Feb 12, 2016

DMDII announces 6 research awards in digital manufacturing disciplines

Posted by in category: cybercrime/malcode

DARPA’s intent to improve “digitized” SCM.


The DMDII has issued six national contract research awards, including funding to test and aid compliance with the nation’s cybersecurity standards for digital manufacturing.

Read more

Feb 8, 2016

Cybersecurity Challenges, Opportunities Discussed at Dedication of Expanded National Cybersecurity Center of Excellence

Posted by in categories: business, cybercrime/malcode, quantum physics

If Russia, China, etc. upgrades their infrastructure to Quantum before US and it’s does; today’s breaches will not even compare to this scenario.


The push to bring more technology-related businesses to the state has officials hoping for long-term growth over places like Fairfax County, Va., where the federal government has already made substantial technological investment.

After the ceremony, an expert panel discussed some of the opportunities and challenges facing information infrastructure, the importance of collaboration between the public and private sectors, and how to increase consumers’ cybersecurity confidence.

Continue reading “Cybersecurity Challenges, Opportunities Discussed at Dedication of Expanded National Cybersecurity Center of Excellence” »

Feb 6, 2016

Your only choice is to build better artificial intelligence tech than others: Brad Templeton

Posted by in categories: business, cybercrime/malcode, internet, mobile phones, nanotechnology, robotics/AI, security, singularity, transportation

Brand’s view and concerns about hacking driverless cars are valid. And, I do believe in time that government will eventually catch up in passing some laws that will make companies ensure that their technology is safe for consumer usage and are safe for the public. I just hope that the pendulum does swing too far to the other side of over regulation.


It is not easy to slot Brad Templeton. What do you make of a person who is not only the networks and computing chair at Singularity University in Silicon Valley but also a software architect, a director of the Foresight Nanotech Institute, board member of the cyberspace watchdog Electronic Frontier Foundation, the first person to have set up an Internet-based business, a futurist lecturer, hobby photographer, artist, as well as a consultant on Google’s driverless car design team?

In a phone interview from the US, Templeton, who will be in India this month as a key speaker during the SingularityU India Summit (to be held in association with INK, which hosts events like INKtalks—a platform for the exchange of cutting-edge ideas and inspiring stories), shared his views on driverless cars, the perceived threat from intelligent machines and censorship of the Internet. Edited excerpts:

Continue reading “Your only choice is to build better artificial intelligence tech than others: Brad Templeton” »

Feb 5, 2016

USENIX Enigma 2016 — Protecting High Risk Users

Posted by in categories: cybercrime/malcode, security

Eva Galperin, Electronic Frontier Foundation.
Morgan Marquis-Boire, Citizen Lab, University of Toronto.

Protecting high-risk individuals has always been a problem for the security industry. While many enterprises focus on mitigating scenarios that will affect the greatest number of their users, harm from attacks is not distributed proportionally. Cyber-attacks on high-risk individuals in dangerous situations can lead to torture, kidnapping, and worse. But dealing with targeted attacks is time-consuming and resource intensive. This problem is exacerbated when the target is an individual or small NGO rather than a large enterprise. This talk will discuss the challenges of protecting high-risk, targeted users using the experience of the speakers in assisting targeted NGOs and individuals.

Continue reading “USENIX Enigma 2016 — Protecting High Risk Users” »

Feb 4, 2016

Perspectives on the Cyber Physical Human World

Posted by in categories: cybercrime/malcode, privacy, quantum physics, robotics/AI, security

The 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Boy! I wish I could attend this meeting. I can imagine all of the conversations now “Quantum” & “Cyber Attacks” with some good old AI thrown in the mix. I am also guess that the 2 articles this week on the NSA maybe brought up too.


SMi Group reports: The MITRE Corporation will be presenting at the SMi’s 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Read more

Feb 4, 2016

Humans get frozen out of frontline security

Posted by in categories: cybercrime/malcode, robotics/AI, security

Not sure how I missed this article from late Jan. If you haven’t read my article on Linkedin Pulse called “AI holding your information hostage — food for thought”; you may wish to read it. It parallels beautifully with this report/ article:


A new report from application delivery and cyber security specialist Radware suggests that the human element will increasingly be excluded from security as 2016 brings a ‘battle of the bots’.

It finds that throughout 2015, no industry was immune to cyber attacks, and few were prepared for them. In 2016, attacks are predicted to become even more aggressive with the arrival of Advanced Persistent Denial of Service (APDoS) attacks and an increase in volume and scope of sophisticated bot-generated assaults against web application infrastructure.

Read more

Feb 4, 2016

MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack

Posted by in categories: cybercrime/malcode, materials, security

Non-hackable RFIDs


You might not realize it, but radio frequency identification (RFID) tech is everywhere these days. From the cards in your wallet, to inventory control in warehouses, it’s the technology that works behind the scenes to power the world around you. RFID has brought efficiency to complicated industries and makes our tiny devices and everyday carry items speak to each other. But RFID technology has also been very vulnerable to security attacks and information hackers – until now. A team of researchers from MIT and Texas Instruments have developed a new kind of RFID chip that they believe is impossible to hack.

The new RFID chip is made of ferroelectric crystals, which are material made up of molecules arranged in a lattice pattern across three dimensions. Thanks to this unique structure, when you apply electricity to the lattice, each cell can be polarized as either positive or negative, representing the values of a bit of information. Because the cells retain their polarization when the electric field is removed, the chips can store data even when they’re powered off. Texas Instruments developed a series of 3.3-volt capacitors for the chip’s energy source, and 1.5-volt cells for data storage.

Continue reading “MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack” »

Feb 4, 2016

U.S. To Rework Arms Control Rule on Exporting Hacker Tools

Posted by in categories: cybercrime/malcode, security

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Feb 4, 2016

DOT&E: Cyber Vulnerabilities Plague Battlefield Comms

Posted by in categories: cybercrime/malcode, military

Cyber is still a challenge for soldiers on the battlefield.


Editor’s Note: This story has been updated to include comment from an industry official.

WASHINGTON — Cyber vulnerabilities continue to plague the Army’s battlefield communications, according to the Pentagon’s top weapons tester, while the service works to harden its network against cyber attacks.

Continue reading “DOT&E: Cyber Vulnerabilities Plague Battlefield Comms” »