Menu

Blog

Archive for the ‘privacy’ category: Page 22

Sep 26, 2016

FBI Probes Dumping Of NSA Hack Tools On Public Site

Posted by in categories: cybercrime/malcode, privacy

Ouch!!!


National Security Agency says tools left exposed by mistake — and dumping by presumably Russia-backed hackers Shadow Brokers.

An FBI investigation into the public dumping of hacking tools used by the National Security Agency (NSA) to uncover security flaws in some networking vendor products is looking at how the tools were exposed on a remote computer, a Reuters report says, quoting people close to the investigation.

Continue reading “FBI Probes Dumping Of NSA Hack Tools On Public Site” »

Aug 28, 2016

Unisys Survey Finds Wearable Technology to Revolutionize Biometrics; Privacy Issues Yet to Be Addressed

Posted by in categories: law enforcement, privacy, wearables

Law enforcement to lead adoption, but new formats and sensors will enable wider commercial application of wearable biometrics…


SYDNEY, Aug. 23, 2016 /PRNewswire/ — Law…

Read more

Aug 25, 2016

Financial Networking Company Prepares for?Post-Quantum World

Posted by in categories: cybercrime/malcode, encryption, finance, privacy, quantum physics

Interesting read on IPC Systems Inc. is partnering with U.K. startup Post-Quantum to (in their own words) “offer its clients encryption, biometric authentication and a distributed-ledger record-keeping system that the software company says is designed to resist hacking — even by a quantum computer.” — I will be researching this more.


(Bloomberg) — When it comes to cybersecurity, no one can accuse IPC Systems Inc., the New Jersey-based company that builds communications networks for trading firms and financial markets, of preparing to fight the last war.

Read more

Aug 24, 2016

The NSA Plans for a Post-Quantum World

Posted by in categories: computing, encryption, government, information science, internet, privacy, quantum physics, security

Hope they’re working with QC researchers in Los Alamos and DARPA; it is the US Government which is known for its silos and multi-layer bureaucracies.


Quantum computing is a novel way to build computers — one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In some cases, the algorithm speedups are extraordinary.

Specifically, a quantum computer using something called Shor’s algorithm can efficiently factor numbers, breaking RSA. A variant can break Diffie-Hellman and other discrete log-based cryptosystems, including those that use elliptic curves. This could potentially render all modern public-key algorithms insecure. Before you panic, note that the largest number to date that has been factored by a quantum computer is 143. So while a practical quantum computer is still science fiction, it’s not stupid science fiction.

Continue reading “The NSA Plans for a Post-Quantum World” »

Aug 18, 2016

Hacker claims to be selling stolen NSA spy tools

Posted by in categories: cybercrime/malcode, privacy

SOMEONE over at the NSA has a date with a small, windowless cell in a deep dark hole in the ground in their near future, me thinks.


Hacking tools — possibly belonging to the NSA — have been leaked and are now accessible to common criminal hackers.

Read more

Aug 16, 2016

Everything you need to know about the NSA hack (but were afraid to Google)

Posted by in categories: cybercrime/malcode, encryption, information science, privacy

A day in the life of an NSA Hacker.


In what Edward Snowden deems “not unprecedented,” hackers calling themselves the Shadow Brokers have collected NSA-created malware from a staging server run by the Equation Group, an internal hacking team. The Shadow Brokers published two chunks of data, one “open” chunk and another encrypted file containing the “best files” that they will sell for at least $1 million. Wikileaks has said they already own the “auction” files and will publish them in “due course.”

They’ve also released images of the file tree containing a script kiddie-like trove of exploits ostensibly created and used by the NSA as well as a page calling out cyber warriors and “Wealthy Elites.” The page also contains links to the two files, both encrypted. You can grab them using BitTorrent here.

Continue reading “Everything you need to know about the NSA hack (but were afraid to Google)” »

Aug 14, 2016

WEF: These are the technologies that will transform finance over the next few decades

Posted by in categories: biotech/medical, computing, finance, internet, mobile phones, privacy, security, singularity

Like this article; there is 2 more pieces missing from the roadmap for 2010 & beyond and that is Biocomputing & Singularity. Biocomputing will provide the financial industry (banks, trading firms, accounting & audit firms, bond insurers, etc.) the ability to expand information/ data storage and transmission capacities like we have never see before just look at what Microsoft, Google, Amazon, etc. have done with DNA storage. And, the much loved Singularity enables boosting of knowledge and insights as well as more mobility and access to information as they need it. BTW — Biometrics is NOT the same as Biocomputing; biocomputing goes well beyond security/ identity management.


The influential non-profit rates these technologies alongside the PC, the internet, and smartphones in terms of their potential to transform financial…

Read more

Jul 26, 2016

“Honey Onions” probe the Dark Web: at least 3% of Tor nodes are rogues

Posted by in categories: futurism, privacy

How many rogue nodes are there in Tor’s anonmity and privacy network? “Honey Onions” are a way of finding out.

Read more

Jul 21, 2016

MP scamsters find a way to clone thumbprint, beat biometric test

Posted by in categories: privacy, security

Why biometrics will need and form of id to properly perform security checks.


Impersonators in many cases apparently had used synthetic bandages bearing thumb impressions of actual candidates. “Traditionally, fingerprints were used as evidence in court cases and even in high-tech security systems. But revelations by those arrested for impersonation in Bihar are proving to the world of forensic sciences that creating forged, latent fingerprints is relatively easy,” claims Dr Anand Rai, whistle-blower in the MPPEB scam. In the past, Rai had requested STF officials to look into interrogation reports of 140 impersonators arrested by the Bihar police during a constable recruitment exam.

Source: http://timesofindia.indiatimes.com/city/bhopal/MP-scamsters-…311540.cms

Continue reading “MP scamsters find a way to clone thumbprint, beat biometric test” »

Jul 21, 2016

BioCryptography and Biometric Penetration Testing

Posted by in categories: biotech/medical, cybercrime/malcode, engineering, privacy

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

Continue reading “BioCryptography and Biometric Penetration Testing” »

Page 22 of 30First1920212223242526Last