Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 192

Jul 8, 2016

DARPA Goes Full Tron With Its Grand Battle of the Hack Bots

Posted by in categories: cybercrime/malcode, robotics/AI

Definitely the longer term goal with security bots.


With its Cyber Grand Challenge—a battle of autonomous security software—DARPA is taking us inside the machine.

Read more

Jul 5, 2016

DARPA’s Hacking Contest Will Pit Machines Against Each Other

Posted by in category: cybercrime/malcode

Battle of the Machines.


DARPA is hosting a competition, the Cyber Grand Challenge, to find ways to solve cybersecurity vulnerabilities automatically.

Read more

Jun 28, 2016

No need in supercomputers

Posted by in categories: business, cybercrime/malcode, information science, particle physics, quantum physics, robotics/AI, singularity, supercomputing

Great that they didn’t have to use a super computer to do their prescribed, lab controlled experiments. However, to limit QC to a super computer and experimental computations only is a big mistake; I cannot stress this enough. QC is a new digital infrastructure that changes our communications, cyber security, and will eventually (in the years to come) provide consumers/ businesses/ and governments with the performance they will need for AI, Biocomputing, and Singularity.


A group of physicists from the Skobeltsyn Institute of Nuclear Physics, the Lomonosov Moscow State University, has learned to use personal computer for calculations of complex equations of quantum mechanics, usually solved with help of supercomputers. This PC does the job much faster. An article about the results of the work has been published in the journal Computer Physics Communications.

Senior researchers Vladimir Pomerantcev and Olga Rubtsova, working under the guidance of Professor Vladimir Kukulin (SINP MSU) were able to use on an ordinary desktop PC with GPU to solve complicated integral equations of quantum mechanics — previously solved only with the powerful, expensive supercomputers. According to Vladimir Kukulin, personal computer does the job much faster: in 15 minutes it is doing the work requiring normally 2–3 days of the supercomputer time.

Continue reading “No need in supercomputers” »

Jun 25, 2016

CYBERWAR (Trailer)

Posted by in categories: cybercrime/malcode, government, military, surveillance

Looks to be quite fascinating…

But is anyone else annoyed by the never ending use of the word “cyber”?

Continue reading “CYBERWAR (Trailer)” »

Jun 22, 2016

DOD looks to develop a preemptive approach to network defense

Posted by in category: cybercrime/malcode

The Joint Force Headquarters for the DOD Information Network, a subordinate command of Cyber Command, is developing a strategic plan for defending its networks around the world.

Read more

Jun 22, 2016

Israel to install its own cyber defenses on F-35 jets

Posted by in categories: cybercrime/malcode, military

IAF seeking approval to increase number of jets from 33 to 50, with a view of eventually having 75 aircraft.

Read more

Jun 13, 2016

New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second

Posted by in categories: cybercrime/malcode, internet, quantum physics

The things you learn on the DarkWeb. Wonder what will happen when more and more countries and folks onboard to the Quantum Internet, etc. Could we see one last massive apocalyptic raid on accounts, etc.?


X5 simplifies the process of stealing details from contactless debit cards, cloning fake debit cards.

A criminal group going under the name of The CC Buddies is selling a hi-tech device on the Dark Web that’s capable of copying details from contactless debit cards if held as close as eight centimeters away from a victim’s card.

Continue reading “New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second” »

Jun 13, 2016

India-US-China : US – Cyber And Bilateral Visits – Analysis

Posted by in categories: cybercrime/malcode, economics, government, quantum physics

Boy; wait until next month with China’s Quantum Launch.


By Munish Sharma.

Cyber has been one of the key discussion items during both Prime Minister Modi’s just concluded visit to the United States and President Xi Jinping’s visit to the US some nine months back. After Xi’s visit, China and the US signed a Cyber Agreement in October 2015. India and the US will ink a cyber agreement in the next sixty days. Notwithstanding these similarities, the intent of and expectations from these two agreements are fundamentally different; the former is an attempt to manage insecurity and the latter is a quest for security. An analysis of the joint statements issued at the end of the Modi and Xi visits to the US highlights the contrasting differences in India and China’s bilateral ties with the United States in the cyber realm.

Continue reading “India-US-China : US – Cyber And Bilateral Visits – Analysis” »

Jun 13, 2016

Breakthrough technology to improve cyber security

Posted by in categories: cybercrime/malcode, engineering, particle physics, quantum physics

Another article on Quantum Security; this time from Sydney (generating single photons to make communications and information secured).


With enough computing effort most contemporary security systems will be broken. But a research team at the University of Sydney has made a major breakthrough in generating single photons (light particles), as carriers of quantum information in security systems.

The collaboration involving physicists at the Centre for Ultrahigh bandwidth Devices for Optical Systems (CUDOS), an ARC Centre of Excellence headquartered in the School of Physics, and electrical engineers from the School of Electrical and Information Engineering, has been published in Nature Communications.

The team’s work resolved a key issue holding back the development of password exchange which can only be broken by violating the laws of physics. Photons are generated in a pair, and detecting one indicates the existence of the other. This allows scientists to manage the timing of photon events so that they always arrive at the time they are expected.

Continue reading “Breakthrough technology to improve cyber security” »

Jun 12, 2016

Nick Bostrom: ‘We are like small children playing with a bomb’

Posted by in categories: climatology, cybercrime/malcode, engineering, robotics/AI, sustainability

Some truth to this if the engineering team and designers are not reflective of the broader world population. Good example, is the super race research of the Nazis and attempts to make it happen. Today, AI in the hands of a N. Korea for example could be bad for the world. However, the larger threat that I see with AI is still the hacking of AI, and stolen AI by criminals to use against society.


Sentient machines are a greater threat to human existence than climate change, according to the Oxford philosopher Nick Bostrom.

Read more