Menu

Blog

Archive for the ‘security’ category: Page 117

Jul 19, 2016

Law enforcement and the Dark Web, a never ending battle

Posted by in categories: biotech/medical, internet, law enforcement, security

Dark Net v. Law Enforcement — who is winning and who is struggling.


The Dark web is a privileged place for cyber criminals that, under specific conditions, could operate in anonymity.

The United Nation’s Office on Drugs and Crime (UNODC) has published its annual report that contains a specific mention to the illicit trade of goods and drugs in this hidden part of the web.

Continue reading “Law enforcement and the Dark Web, a never ending battle” »

Jul 19, 2016

Darknet Market Raises Its Ugly Head Again

Posted by in categories: internet, law enforcement, security

Their back.


Cyber Mafias The internet has always been the most preferred platform for carrying out illicit activities. The underground black markets are not a new phenomenon in the virtual world. However, these black markets are now becoming more sophisticated and organized. Darkness is one such underground marketplaces which are rising and becoming uglier. Though law enforcement agencies have brought down the number of such illegal platforms, the Darknet markets are up and running. Darknet markets are growing bigger than ever with over $50 million UDS transactions reportedly flowing through these marketplaces and it is a big challenge in front of security agencies and governments to finish this underground industry from its roots.

Decoding Darknet

Continue reading “Darknet Market Raises Its Ugly Head Again” »

Jul 18, 2016

IBM Unveils New Cloud Blockchain Security Service

Posted by in categories: biotech/medical, bitcoin, security

I like this article because I have for years looked at options to address the counterfeiting issues which is a extremely costly criminal industry around diamonds and artwork. As we have seen with synthetic diamonds in their use in QC and medical technology there is a lot that technology can do in addressing the counterfeiting issues as well as registration & certification space. Also, could registered & embedded serialized stones be another form of id for the consumer who wears their accessory with the stone? I believe it can be.


IBM launches a new high security blockchain service that uses hardware to protect valuable data, with provenance startup Everledger as its first customer.

Read more

Jul 18, 2016

Researcher builds technology to control drone swarms with his mind

Posted by in categories: computing, drones, neuroscience, robotics/AI, security

About 5 years ago a friend of mine at Microsoft (Mitch S.) had a vision of making a new security model around drone swarms and a form of BMI technology. Glad to see the vision come true.


Scientists have discovered how to control multiple robotic drones using the human brain, an advance that can help develop swarms of search and rescue drones that are controlled just by thought.

Continue reading “Researcher builds technology to control drone swarms with his mind” »

Jul 18, 2016

Can we find a quantum-resistant algorithm before it’s too late?

Posted by in categories: computing, information science, internet, quantum physics, security

The warning from QuintessenceLabs’ CTO John Leisoboer is stark. “When sufficiently powerful quantum computers become generally available,” he says, “it’s guaranteed to break all existing cryptographic systems that we know of.”

In other words, he adds, “Everything that we’re doing today will be broken.”

It’s a sentiment echoed by Google’s Chrome security software engineer Matt Braithwaite who wrote in a blog post earlier this month that “a hypothetical, future quantum computer would be able to retrospectively decrypt any internet communication that was recorded today”.

Continue reading “Can we find a quantum-resistant algorithm before it’s too late?” »

Jul 11, 2016

Manoj Saxena talks Artificial Intelligence with Gigaom

Posted by in categories: finance, health, robotics/AI, security

Nice chime on QC.


Manoj Saxena is the executive chairman of CognitiveScale and a founding managing director of The Entrepreneurs’ Fund IV (TEF), a $100m seed fund focused exclusively on the cognitive computing space.

Saxena is also the chairman of Federal Reserve Bank of Dallas, San Antonio branch and Chairman, SparkCognition an Austin based cognitive security and safety analytics company.

Continue reading “Manoj Saxena talks Artificial Intelligence with Gigaom” »

Jul 11, 2016

Google Tests Post-Quantum Crypto

Posted by in categories: computing, internet, quantum physics, security

Good article overall; and yes QC is still evolving. However, to state Quantum networking is in its infancy is a wrong & misleading comment. Since 2009, Quantum Internet has been in beta at Los Alamos Labs. And, researchers will tell you that QC development can as far back as 1970s and the first official QC was introduced in 2009 when the first universal programmable quantum computer was introduced by University of Toronto’s Kim Luke.


Google has launched a two-year Chrome trial aimed at safeguarding the Internet against quantum computers, which security experts predict will shred all data.

Read more

Jul 8, 2016

Google to experiment with quantum computing-ready algorithms in Chrome

Posted by in categories: computing, information science, quantum physics, security

Google advances on QC with Chrome.


In preparation for a quantum computing future, Google is testing post-quantum algorithms in Chrome to ensure security in the future.

Read more

Jul 8, 2016

New security tool addresses Android app collusion threat

Posted by in category: security

As we reported last month app collusion, where apps work together to extract sensitive data, now represents a very real security risk to mobile devices.

To address this emerging threat, component technology firm Formaltech, today is releasing FUSE, a DARPA-funded tool that detects inter-application collusion and other vulnerabilities in Android apps.

The FUSE platform identifies potential security vulnerabilities and tracks information flow through multiple apps, revealing potential collusion between apps. The tool uses static binary analysis to detect vulnerabilities without requiring the source code of the apps, allowing security professionals to analyze third party apps without the need for vendor cooperation. It operates in the cloud, supporting Android app (APK) analysis from anywhere. Developers and testers can easily drill down into the FUSE interface when FUSE displays errors, warnings and informational alarms.

Read more

Jul 7, 2016

How do we improve security and e-governance? Toomas Hendrik Ilves

Posted by in categories: governance, security

“Estonia right now is one of the biggest champions of the digital single market in Europe.”

Read more