Menu

Blog

Archive for the ‘security’ category: Page 126

Feb 5, 2016

USENIX Enigma 2016 — Protecting High Risk Users

Posted by in categories: cybercrime/malcode, security

Eva Galperin, Electronic Frontier Foundation.
Morgan Marquis-Boire, Citizen Lab, University of Toronto.

Protecting high-risk individuals has always been a problem for the security industry. While many enterprises focus on mitigating scenarios that will affect the greatest number of their users, harm from attacks is not distributed proportionally. Cyber-attacks on high-risk individuals in dangerous situations can lead to torture, kidnapping, and worse. But dealing with targeted attacks is time-consuming and resource intensive. This problem is exacerbated when the target is an individual or small NGO rather than a large enterprise. This talk will discuss the challenges of protecting high-risk, targeted users using the experience of the speakers in assisting targeted NGOs and individuals.

Continue reading “USENIX Enigma 2016 — Protecting High Risk Users” »

Feb 4, 2016

Perspectives on the Cyber Physical Human World

Posted by in categories: cybercrime/malcode, privacy, quantum physics, robotics/AI, security

The 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Boy! I wish I could attend this meeting. I can imagine all of the conversations now “Quantum” & “Cyber Attacks” with some good old AI thrown in the mix. I am also guess that the 2 articles this week on the NSA maybe brought up too.


SMi Group reports: The MITRE Corporation will be presenting at the SMi’s 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Read more

Feb 4, 2016

Humans get frozen out of frontline security

Posted by in categories: cybercrime/malcode, robotics/AI, security

Not sure how I missed this article from late Jan. If you haven’t read my article on Linkedin Pulse called “AI holding your information hostage — food for thought”; you may wish to read it. It parallels beautifully with this report/ article:


A new report from application delivery and cyber security specialist Radware suggests that the human element will increasingly be excluded from security as 2016 brings a ‘battle of the bots’.

It finds that throughout 2015, no industry was immune to cyber attacks, and few were prepared for them. In 2016, attacks are predicted to become even more aggressive with the arrival of Advanced Persistent Denial of Service (APDoS) attacks and an increase in volume and scope of sophisticated bot-generated assaults against web application infrastructure.

Read more

Feb 4, 2016

MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack

Posted by in categories: cybercrime/malcode, materials, security

Non-hackable RFIDs


You might not realize it, but radio frequency identification (RFID) tech is everywhere these days. From the cards in your wallet, to inventory control in warehouses, it’s the technology that works behind the scenes to power the world around you. RFID has brought efficiency to complicated industries and makes our tiny devices and everyday carry items speak to each other. But RFID technology has also been very vulnerable to security attacks and information hackers – until now. A team of researchers from MIT and Texas Instruments have developed a new kind of RFID chip that they believe is impossible to hack.

The new RFID chip is made of ferroelectric crystals, which are material made up of molecules arranged in a lattice pattern across three dimensions. Thanks to this unique structure, when you apply electricity to the lattice, each cell can be polarized as either positive or negative, representing the values of a bit of information. Because the cells retain their polarization when the electric field is removed, the chips can store data even when they’re powered off. Texas Instruments developed a series of 3.3-volt capacitors for the chip’s energy source, and 1.5-volt cells for data storage.

Continue reading “MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack” »

Feb 4, 2016

U.S. To Rework Arms Control Rule on Exporting Hacker Tools

Posted by in categories: cybercrime/malcode, security

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Feb 4, 2016

Are you covered? Emerging issues for health care providers under cyber risk insurance

Posted by in categories: biotech/medical, health, law, policy, security

Tough to be a doctor these days — Could be bad news for Providers with limited or no Cyber Risk Coverage.


Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren’t expected to slow down in 2016, Harry Greenspun, director for Deloitte’s Center for Health Solutions, told Bloomberg BNA. One element of a comprehensive strategy to address data security is customized cyber risk insurance. Recent case law supports standing for class action litigants alleging future injuries, which may not be covered by some policy forms. We urge providers to review their cyber risk coverage with the increasing risks and this new case law in mind.

Specifically, it is critical that cyber risk insurance is designed to both: adequately mitigate future harm to those whose private information is compromised as a result of a data breach; and satisfy the full array of damages sought by such third parties, including damages for future injuries resulting from the anticipated improper use of data. These considerations are increasingly important because the policies available in today’s market are not standardized. While many absorb some of the costs associated with notification and fraud monitoring, existing forms may not protect against damages sought for susceptibility to identity theft.

Continue reading “Are you covered? Emerging issues for health care providers under cyber risk insurance” »

Feb 4, 2016

NSA Plans to ‘Act Now’ to Ensure Quantum Computers Can’t Break Encryption

Posted by in categories: computing, encryption, information science, privacy, quantum physics, security

Another article just came out today providing additional content on the Quantum Computing threat and it did reference the article that I had published. Glad that folks are working on this.


The NSA is worried about quantum computers. It warns that it “must act now” to ensure that encryption systems can’t be broken wide open by the new super-fast hardware.

In a document outlining common concerns about the effects that quantum computing may have on national security and encryption of sensitive data, the NSA warns that “public-key algorithms… are all vulnerable to attack by a sufficiently large quantum computer.”

Continue reading “NSA Plans to ‘Act Now’ to Ensure Quantum Computers Can’t Break Encryption” »

Feb 3, 2016

NSA Says it “Must Act Now” Against the Quantum Computing Threat

Posted by in categories: computing, encryption, privacy, quantum physics, security

NSA states it must act now against the “Quantum Computing Threat” due to hackers can possess the technology. I wrote about this on Jan 10th. Glad someone finally is taking action.


The National Security Agency is worried that quantum computers will neutralize our best encryption – but doesn’t yet know what to do about that problem.

Read more

Jan 31, 2016

Quantum computing near and disruptive, warns academic at Davos

Posted by in categories: business, computing, internet, quantum physics, robotics/AI, satellites, security, singularity

True points and many that I have been sharing on Quantum around its own potential to change everything that we know about technology (devices, internet & networking in general, wireless and satellites, AI, advancements in biotech, security, big data, and singularity itself). The author also highlights many of the same concerns that I have shared around hackers on Quantum breaking through the older digitized platforms and networks; therefore, many companies and governments are exposed as well as consumers who have not adopted Quantum.

Although the author speculates we’re less than 10 yrs for Quantum to be seen in the everyday usage; I believe we’re within 7 yrs.


Within four years quantum computers will have the beating of conventional computers and that will produce a dramatic change in both the technology landscape and in business, according to Professor Jeremy O’Brien from Bristol University.

Read more

Jan 30, 2016

Connected Medical Devices Are Sick with Vulnerabilities, According to New Research

Posted by in categories: biotech/medical, internet, life extension, nanotechnology, Ray Kurzweil, security, wearables

This is not good especially as we look at those aspirations for more nanobots to connect us to the cloud plus Mr. Kurzweil’s desire to live forever.


Medical device manufacturers are struggling to safeguard their newly connected designs from current and emerging security threats.

Natick, MA (PRWEB) January 29, 2016.

Continue reading “Connected Medical Devices Are Sick with Vulnerabilities, According to New Research” »