Blog

Archive for the ‘security’ category: Page 132

Feb 8, 2016

Hackers publish FBI employees‘ contact info

Posted by in category: security

Dangerous; now they’re a target.


Hackers, making good on a threat, published contact information for 20,000 FBI employees Monday afternoon, just one day after posting similar data on almost 10,000 Department of Homeland Security employees.”

Read more

Feb 7, 2016

Scientists Are Trying to Create An Untraceable ‘Quantum Internet’

Posted by in categories: internet, quantum physics, security

Glad that Stanford is working on their own version because the US Government has their own and it has been online in Los Alamos for a while now; have more than one version to learn from only enriches the final version.


Researchers are a step closer to building a quantum technology that could help improve internet security.

Researchers from Stanford University in U.S. have created a novel quantum light source to help improve internet security. In other words, the scientists have designed a technology that might someday serve as the basis for quantum communication.

Continue reading “Scientists Are Trying to Create An Untraceable ‘Quantum Internet’” »

Feb 6, 2016

Investment platforms must get back in the game

Posted by in categories: biotech/medical, finance, health, law, robotics/AI, security

Good article and perspective. And, I believe areas like Finance and Legal will be addressed over the next 5 to 7 years with AI. However, much of our critical needs are in healthcare particularly medical technology and Infrastructure (including security); and these need to get upgraded and improved now.


I recently read a thought provoking article by Klaus Schwab, called ‘The Fourth Industrial Revolution: what it means, how to respond’. At the beginning of the article Schwab describes the first three industrial revolutions, which I think we’re all fairly familiar with:

1784 – steam, water and mechanical production equipment.

Read more

Feb 6, 2016

Your only choice is to build better artificial intelligence tech than others: Brad Templeton

Posted by in categories: business, cybercrime/malcode, internet, mobile phones, nanotechnology, robotics/AI, security, singularity, transportation

Brand’s view and concerns about hacking driverless cars are valid. And, I do believe in time that government will eventually catch up in passing some laws that will make companies ensure that their technology is safe for consumer usage and are safe for the public. I just hope that the pendulum does swing too far to the other side of over regulation.


It is not easy to slot Brad Templeton. What do you make of a person who is not only the networks and computing chair at Singularity University in Silicon Valley but also a software architect, a director of the Foresight Nanotech Institute, board member of the cyberspace watchdog Electronic Frontier Foundation, the first person to have set up an Internet-based business, a futurist lecturer, hobby photographer, artist, as well as a consultant on Google’s driverless car design team?

In a phone interview from the US, Templeton, who will be in India this month as a key speaker during the SingularityU India Summit (to be held in association with INK, which hosts events like INKtalks—a platform for the exchange of cutting-edge ideas and inspiring stories), shared his views on driverless cars, the perceived threat from intelligent machines and censorship of the Internet. Edited excerpts:

Continue reading “Your only choice is to build better artificial intelligence tech than others: Brad Templeton” »

Feb 5, 2016

USENIX Enigma 2016 — Protecting High Risk Users

Posted by in categories: cybercrime/malcode, security

Eva Galperin, Electronic Frontier Foundation.
Morgan Marquis-Boire, Citizen Lab, University of Toronto.

Protecting high-risk individuals has always been a problem for the security industry. While many enterprises focus on mitigating scenarios that will affect the greatest number of their users, harm from attacks is not distributed proportionally. Cyber-attacks on high-risk individuals in dangerous situations can lead to torture, kidnapping, and worse. But dealing with targeted attacks is time-consuming and resource intensive. This problem is exacerbated when the target is an individual or small NGO rather than a large enterprise. This talk will discuss the challenges of protecting high-risk, targeted users using the experience of the speakers in assisting targeted NGOs and individuals.

Continue reading “USENIX Enigma 2016 — Protecting High Risk Users” »

Feb 4, 2016

Perspectives on the Cyber Physical Human World

Posted by in categories: cybercrime/malcode, privacy, quantum physics, robotics/AI, security

The 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Boy! I wish I could attend this meeting. I can imagine all of the conversations now “Quantum” & “Cyber Attacks” with some good old AI thrown in the mix. I am also guess that the 2 articles this week on the NSA maybe brought up too.


SMi Group reports: The MITRE Corporation will be presenting at the SMi’s 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Read more

Feb 4, 2016

Humans get frozen out of frontline security

Posted by in categories: cybercrime/malcode, robotics/AI, security

Not sure how I missed this article from late Jan. If you haven’t read my article on Linkedin Pulse called “AI holding your information hostage — food for thought”; you may wish to read it. It parallels beautifully with this report/ article:


A new report from application delivery and cyber security specialist Radware suggests that the human element will increasingly be excluded from security as 2016 brings a ‘battle of the bots’.

It finds that throughout 2015, no industry was immune to cyber attacks, and few were prepared for them. In 2016, attacks are predicted to become even more aggressive with the arrival of Advanced Persistent Denial of Service (APDoS) attacks and an increase in volume and scope of sophisticated bot-generated assaults against web application infrastructure.

Read more

Feb 4, 2016

MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack

Posted by in categories: cybercrime/malcode, materials, security

Non-hackable RFIDs


You might not realize it, but radio frequency identification (RFID) tech is everywhere these days. From the cards in your wallet, to inventory control in warehouses, it’s the technology that works behind the scenes to power the world around you. RFID has brought efficiency to complicated industries and makes our tiny devices and everyday carry items speak to each other. But RFID technology has also been very vulnerable to security attacks and information hackers – until now. A team of researchers from MIT and Texas Instruments have developed a new kind of RFID chip that they believe is impossible to hack.

The new RFID chip is made of ferroelectric crystals, which are material made up of molecules arranged in a lattice pattern across three dimensions. Thanks to this unique structure, when you apply electricity to the lattice, each cell can be polarized as either positive or negative, representing the values of a bit of information. Because the cells retain their polarization when the electric field is removed, the chips can store data even when they’re powered off. Texas Instruments developed a series of 3.3-volt capacitors for the chip’s energy source, and 1.5-volt cells for data storage.

Continue reading “MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack” »

Feb 4, 2016

U.S. To Rework Arms Control Rule on Exporting Hacker Tools

Posted by in categories: cybercrime/malcode, security

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Feb 4, 2016

Are you covered? Emerging issues for health care providers under cyber risk insurance

Posted by in categories: biotech/medical, health, law, policy, security

Tough to be a doctor these days — Could be bad news for Providers with limited or no Cyber Risk Coverage.


Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren’t expected to slow down in 2016, Harry Greenspun, director for Deloitte’s Center for Health Solutions, told Bloomberg BNA. One element of a comprehensive strategy to address data security is customized cyber risk insurance. Recent case law supports standing for class action litigants alleging future injuries, which may not be covered by some policy forms. We urge providers to review their cyber risk coverage with the increasing risks and this new case law in mind.

Specifically, it is critical that cyber risk insurance is designed to both: adequately mitigate future harm to those whose private information is compromised as a result of a data breach; and satisfy the full array of damages sought by such third parties, including damages for future injuries resulting from the anticipated improper use of data. These considerations are increasingly important because the policies available in today’s market are not standardized. While many absorb some of the costs associated with notification and fraud monitoring, existing forms may not protect against damages sought for susceptibility to identity theft.

Continue reading “Are you covered? Emerging issues for health care providers under cyber risk insurance” »