Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 211

Mar 2, 2016

Want To Hack The Pentagon? New Defense Department Program Challenges Hackers To Breach US Cyber Security

Posted by in categories: cybercrime/malcode, military

A challenge by the US Pentagon.


A new Defense Department competition will invite vetted hackers to find vulnerabilities in U.S. cyber security.

Read more

Mar 2, 2016

How Hackers Recruit New Talent

Posted by in category: cybercrime/malcode

I wanted to share this article; not to promote a career as a hacker, only to share how organized these groups have become.


It involves job postings on the dark web, Skype interviews, and digital voice-changing technology.

Read more

Mar 1, 2016

Autonomous Killing Machines Are More Dangerous Than We Think

Posted by in categories: cybercrime/malcode, drones, ethics, law, military, policy, robotics/AI

I see articles and reports like the following about military actually considering fully autonomous missals, drones with missals, etc. I have to ask myself what happened to the logical thinking.


A former Pentagon official is warning that autonomous weapons would likely be uncontrollable in real-world situations thanks to design failures, hacking, and external manipulation. The answer, he says, is to always keep humans “in the loop.”

The new report, titled “ Autonomous Weapons and Operational Risk,” was written by Paul Scharre, a director at the Center for a New American Security. Scharre used to work at the office of the Secretary of Defense where he helped the US military craft its policy on the use of unmanned and autonomous weapons. Once deployed, these future weapons would be capable of choosing and engaging targets of their own choosing, raising a host of legal, ethical, and moral questions. But as Scharre points out in the new report, “They also raise critically important considerations regarding safety and risk.”

Continue reading “Autonomous Killing Machines Are More Dangerous Than We Think” »

Mar 1, 2016

These are the 13 jobs in London where a robot is most likely to steal your job

Posted by in categories: cybercrime/malcode, employment, robotics/AI

The interesting piece in the articles that I have seen on robots taking jobs have only occurred in Asia and in certain situations in the UK. I believe that companies across the US see some of the existing hacking risks (especially since the US has the highest incidents of hackings among the other countries) that prevents companies from just replacing their employees with connected autonomous robots plus I am not sure that robotics is at the level of sophistication that most consumers want to spend a lot of money on at the moment.

Bottom line is that until hacking is drastically reduce (if not finally eliminated); that autonomous AI like connected robots and humanoids will find they will have a hard time being adopted by the US collective mass of the population.


In the future the global employment market will rely heavily on robots, artificial intelligence, and all sorts of automation.

Continue reading “These are the 13 jobs in London where a robot is most likely to steal your job” »

Mar 1, 2016

Utilities Cautioned About Potential for a Cyberattack After Ukraine’s

Posted by in categories: cybercrime/malcode, energy

Working remotely, attackers conducted “extensive reconnaissance” of the Ukraine power system’s networks, stole the credentials of operators and learned how to switch off the breakers, plunging more than 225,000 Ukrainians into darkness.

Read more

Feb 29, 2016

Kaspersky Labs rolls out targeted threat detection platform for enterprises

Posted by in category: cybercrime/malcode

“Kaspersky admits that targeted attacks represent less than one percent of the entire threat landscape”;

Hmmm (wonder how much it cost to develop and deploy?) At least it’s a start.

https://lnkd.in/bzjHfzF

Continue reading “Kaspersky Labs rolls out targeted threat detection platform for enterprises” »

Feb 29, 2016

What is the Dark Web?

Posted by in category: cybercrime/malcode

This has been around for a really, really long time. I remember many years ago one could go online without too much hassel and locate software code that the hacking network shared to teach folks their trade. I actually tested some of it for a firm to help test their infrastructure security; and it worked really well. However, now days it’s about the trade of id’s, credit card information, etc.


Beyond the regular Web, there is the Dark Web. You’ve probably heard something about it but probably just enough to know you didn’t want to know too much more about it. Well, here are some answers to some common questions about the Dark Web.

Read more

Feb 29, 2016

Google opens applications for free DDoS blocker to prevent hackers taking out the Web

Posted by in categories: cybercrime/malcode, internet

The DDoS prevention tool is part of Google Ideas, renamed Jigsaw, whose stated mission is to “build products to help people investigate corruption.”

Read more

Feb 29, 2016

Want to avoid breaches Think like a hacker

Posted by in category: cybercrime/malcode

One philosophy that I have often practice and encourage my team to do is to think like a hacker. It has served me and my teams well. At times; I have shared areas where risks exist in the emerging technologies; and hope that I don’t make folks too nervous. However, we all have to start thinking like hackers or pay the cost some day.


C-level executives from giant corporations and officials from the smallest companies all must think like hackers and test their cyber defenses regularly if they expect to avoid breaches of their systems.

That’s according to a panel of cybersecurity experts who recently spoke to a crowd gathered at the Donald Danforth Plant Science Center.

Continue reading “Want to avoid breaches Think like a hacker” »

Feb 29, 2016

IS hacks UK solar firm site in revenge

Posted by in categories: cybercrime/malcode, solar power

I always caution folks to never say “never” especially around hacking and worst case scenarios relating to security. Granted there is a balance around not going too overboard. However, when it comes to being risk adverse and determining how much risk your company can absorb must be a core piece of your assessment. And, an attack like the one by ISIS in this article can not be allowed.

https://lnkd.in/b-_mdNW


LONDON: ISIS terrorists hacked the website of a UK-based solar firm as revenge for the killing of one of their British Muslim members, a media report said on Sunday.

Continue reading “IS hacks UK solar firm site in revenge” »