Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 179

Jul 3, 2018

How to See Who’s On Your Wi-Fi

Posted by in categories: cybercrime/malcode, internet

Is your internet moving a little slower than usual? Are you seeing hints of devices you don’t recognize in Windows Explorer, or when you cast media to your TV? If you suspect a neighbor is stealing your Wi-Fi, here’s how to check (and boot them off).

“So someone’s watching Netflix on my internet,” you may say. “What’s the big deal?” Even if you have a little bandwidth to spare, you probably don’t want other people on your network, especially if it’s unsecured. If someone has access to your network, they have access to all the computers on that network, and that’s dangerous. They could access files you’re unknowingly sharing, they could infect you with malware, and in certain situations they could even steal your passwords and other personal information.

As a result, you should take care to make sure each device connected to your network is one you can trust. Thankfully, there are free tools that’ll help you see everyone on your Wi-Fi right now.

Read more

Jul 2, 2018

Why Space Warfare is Inevitable

Posted by in categories: biological, cybercrime/malcode, geopolitics, military, space, treaties

There is increasing chatter among the world’s major military powers about how space is fast becoming the next battleground. China, Russia, and the United States are all taking steps that will ultimately result in the weaponisation of space. Any satellite that can change orbit can be considered a space weapon, but since many of the possible space-based scenarios have yet to occur, cybersecurity experts, military commanders, and policymakers do not fully understand the range of potential consequences that could result.

During the Cold War, the Soviet Union was interested in paralysing America’s strategic forces, strategic command, and control and communications, so that its military command could not communicate with its forces. They would do so by first causing electromagnetic pulse (EMP) to sever communication and operational capabilities, and then launch a mass attack across the North Pole to blow up US Intercontinental Ballistic Missiles (ICBMs).

In 1967, the US, UK and Soviet Union signed the Outer Space Treaty, which was either ratified by or acceded to 105 countries (including China). It set in place laws regarding the use of outer space and banned any nation from stationing nuclear warheads, chemical or biological weapons in space. However, the Treaty does not prohibit the placement of conventional weapons in orbit, so such weapons as kinetic bombardment (i.e. attacking Earth with a projectile) are not strictly prohibited.

Continue reading “Why Space Warfare is Inevitable” »

Jul 2, 2018

The Biggest Digital Heist in History Isn’t Over Yet

Posted by in categories: business, cybercrime/malcode, finance

Since late 2013, this band of cybercriminals has penetrated the digital inner sanctums of more than 100 banks in 40 nations, including Germany, Russia, Ukraine, and the U.S., and stolen about $1.2 billion, according to Europol, the European Union’s law enforcement agency. The string of thefts, collectively dubbed Carbanak—a mashup of a hacking program and the word “bank”—is believed to be the biggest digital bank heist ever. In a series of exclusive interviews with Bloomberg Businessweek, law enforcement officials and computer-crime experts provided revelations about their three-year pursuit of the gang and the mechanics of a caper that’s become the stuff of legend in the digital underworld.


Carbanak’s suspected ringleader is under arrest, but $1.2 billion remains missing, and his malware attacks live on.

Read more

Jul 2, 2018

Top 5 Ways Supercomputing Is Impacting Scientific Research

Posted by in categories: cybercrime/malcode, employment, government, supercomputing

Government news resource covering technology, performance, employment, telework, cybersecurity, and more for federal employees.

Read more

Jun 25, 2018

Ransom Demands and Frozen Computers: Hackers Hit Towns Across the U.S.

Posted by in categories: bitcoin, cybercrime/malcode

The attack on Rockport is one example in a rising tide of similar invasions of municipal systems across the U.S.—from major cities like Atlanta, which got hit in March, to counties, tiny towns and even a library system in St. Louis. Local governments are forced to spend money on frantic efforts to recover data, system upgrades, cybersecurity insurance and, in some cases, to pay their online extortionists if they can’t restore files some other way.


Hackers are targeting small towns’ computer systems, with public-sector attacks appearing to be rising faster than those in the private sector. Online extortionists demand bitcoin ransom in return for decryption keys.

Read more

Jun 14, 2018

Why a DNA data breach is much worse than a credit card leak

Posted by in categories: biotech/medical, cybercrime/malcode, encryption, genetics, health, neuroscience

As the Equifax hack last year showed, there’s a lack of legislation governing what happens to data from a breach. And ultimately, a breach of genetic data is much more serious than most credit breaches. Genetic information is immutable: Vigna points out that it’s possible to change credit card numbers or even addresses, but genetic information cannot be changed. And genetic information is often shared involuntarily. “Even if I don’t use 23andMe, I have cousins who did, so effectively I may be genetically searchable,” says Ram. In one case, an identical twin having her genetic data sequenced created a tricky situation for her sister.


This week, DNA testing service MyHeritage revealed that hackers had breached 92 million of its accounts. Though the hackers only accessed encrypted emails and passwords — so they never reached the actual genetic data — there’s no question that this type of hack will happen more frequently as consumer genetic testing becomes more and more popular. So why would hackers want DNA information specifically? And what are the implications of a big DNA breach?

One simple reason is that hackers might want to sell DNA data back for ransom, says Giovanni Vigna, a professor of computer science at UC Santa Barbara and co-founder of cybersecurity company Lastline. Hackers could threaten to revoke access or post the sensitive information online if not given money; one Indiana hospital paid $55,000 to hackers for this very reason. But there are reasons genetic data specifically could be lucrative. “This data could be sold on the down-low or monetized to insurance companies,” Vigna adds. “You can imagine the consequences: One day, I might apply for a long-term loan and get rejected because deep in the corporate system, there is data that I am very likely to get Alzheimer’s and die before I would repay the loan.”

Continue reading “Why a DNA data breach is much worse than a credit card leak” »

Jun 12, 2018

Britain’s first ‘unhackable’ internet network may solve quantum computing threat

Posted by in categories: cybercrime/malcode, encryption, finance, internet, quantum physics

S cientists have created the UK’s first ever “unhackable” fibre network in anticipation of the dawn of quantum computers, a technology that could render current security systems completely useless and leave critical infrastructure, banking and healthcare networks open to hackers.

The network, constructed by researchers from BT, the University of York and the University of Cambridge over the past two years, is secured by the laws of quantum physics which dictate how light and matter behave at a fundamental level. Using this, it is able to block anyone attempting to crack into the fibre link.

This could be a game changer for the healthcare and financial sector, when it is feared existing encryption…

Continue reading “Britain’s first ‘unhackable’ internet network may solve quantum computing threat” »

Jun 12, 2018

Why fascism is so tempting — and how your data could power it

Posted by in categories: business, cybercrime/malcode, energy, holograms

In a profound talk about technology and power, author and historian Yuval Noah Harari explains the important difference between fascism and nationalism — and what the consolidation of our data means for the future of democracy. Appearing as a hologram live from Tel Aviv, Harari warns that the greatest danger that now faces liberal democracy is that the revolution in information technology will make dictatorships more efficient and capable of control. “The enemies of liberal democracy hack our feelings of fear and hate and vanity, and then use these feelings to polarize and destroy,” Harari says. “It is the responsibility of all of us to get to know our weaknesses and make sure they don’t become weapons.” (Followed by a brief conversation with TED curator Chris Anderson)

Check out more TED Talks: http://www.ted.com

Continue reading “Why fascism is so tempting -- and how your data could power it” »

Jun 6, 2018

Quantum Computing: Is it the end of blockchain?

Posted by in categories: bitcoin, cybercrime/malcode, encryption, internet, quantum physics

E xperts are suggesting quantum computing may render blockchain obsolete. As the tech giants such as Google and IBM are showing interest in Quantum computing the danger is evident. According to MIT Technology Review, this type of computing can hack the cryptography hash that universally secures the blockchain and in general the internet. This would suggest quantum computers may complete fraudulent transactions and steal coins. With its exponential power, quantum computers threaten blockchain’s future security.

Blockchain consists of encrypted nodes connected on a chain, which currently makes it almost impossible to hack. The order of entries adheres to the blockchain protocol, which makes it counterfeit-resistant.

To successfully hack a blockchain, you would need to alter both the targeted block and all of the blocks connected. Blockchains are synced throughout a peer-to-peer network. In this type of system, there is no central point of failure for hackers to penetrate. For a hacker to have a chance of penetrating the network, they would need to simultaneously alter at least 51% of the blockchain.

Continue reading “Quantum Computing: Is it the end of blockchain?” »

May 15, 2018

Inside Google, A Debate Rages: Should It Sell Artificial Intelligence to the Military?

Posted by in categories: business, cybercrime/malcode, government, military, robotics/AI

Pichai’s challenge is to find a way of reconciling Google’s dovish roots with its future. Having spent more than a decade developing the industry’s most formidable arsenal of AI research and abilities, Google is keen to wed those advances to its fast-growing cloud-computing business. Rivals are rushing to cut deals with the government, which spends billions of dollars a year on all things cloud. No government entity spends more on such technology than the military. Medin and Alphabet director Schmidt, who both sit on the Pentagon’s Defense Innovation Board, have pushed Google to work with the government on counter-terrorism, cybersecurity, telecommunications and more.


To win in the business of cloud computing, the company tiptoes into the business of war. Some staff fear it’s a first step toward autonomous killing machines.

Read more