Menu

Blog

Archive for the ‘security’ category: Page 126

Apr 18, 2016

Implanted Medical Devices Save Our Lives And Tempt Computer Hackers

Posted by in categories: biotech/medical, computing, cyborgs, health, internet, mobile phones, neuroscience, security

All true and good points. Until the under pinning technology and net infrastructures are update; all things connected will mean all things hackable.


Medical devices like pacemakers and insulin pumps will save many lives, but they also represent an opportunity to computer hackers who would use the Internet to cause havoc. Former futurist-in-residence at the FBI, Marc Goodman says it is easy to take for granted how connected we’ve already become to the Internet. Most American adults keep their phones within arm’s reach all day, and keep their devices on their nightstand while they sleep — and forget about actually remembering people’s phone numbers. That is a job we have outsourced to machines.

In this sense, says Goodman, we are already cyborgs. But digital devices connected to the Internet will continue to move inside our bodies, just as pacemakers and insulin pumps have. In his interview, Goodman discusses cases of computer hackers taking advantage of these devices’ connectivity to show how vulnerable we could soon become to their potentially destructive wishes. In one case, a hacker demonstrated he could release several weeks of insulin into a diabetic’s body, certain to cause a diabetic coma and death. In another, hackers induced epileptic seizures by hacking the Epilepsy Foundation’s webpage.

Continue reading “Implanted Medical Devices Save Our Lives And Tempt Computer Hackers” »

Apr 15, 2016

Ghost in the Shell and the transhumanist future of sexuality

Posted by in categories: military, security, surveillance, transhumanism

The sky above Osaka Bay is saturated in light pollution teeming from the neon-soaked metropolis below. Military bi-copters circle in patterns between the antenna towers of Niihama City’s looming skyscrapers as they survey the scene of an ongoing domestic security operation. Kneeling from atop the edge of one of these towers is a figure; a mauve-haired saboteur of the state clad in a leotard, side holster, and leather jacket. Combat boots and leggings hiked just past her knees with her upper thighs left exposed. An external HD cable juts from a small input jack indented at the base of her neck.

Her pupils dilate, sifting through the visual noise of an embedded surveillance feed while combing the room below for suspicious movements. She detaches the cable at her subordinate’s signal, stands upright and removes her clothing. She leans over the edge of the building, a smirk streaking across her otherwise stoic expression. A rappel line heaves sharply, suspending her body directly adjacent to that of her target, who is now only a trigger pull from annihilation.

Read more

Apr 12, 2016

Long-range secure quantum communication system developed

Posted by in categories: business, encryption, finance, information science, quantum physics, security

Scientists from ITMO University in Saint Petersburg, Russia have enabled the longer distance (250 Kilos) of secured data transmission occur via Quantum. Nice; and should be a wake up call to the US as well on advancing their efforts more.


A group of scientists from ITMO University in Saint Petersburg, Russia has developed a novel approach to the construction of quantum communication systems for secure data exchange. The experimental device based on the results of the research is capable of transmitting single-photon quantum signals across distances of 250 kilometers or more, which is on par with other cutting edge analogues. The research paper was published in the Optics Express journal.

Information security is becoming more and more of a critical issue not only for large companies, banks and defense enterprises, but even for small businesses and individual users. However, the data encryption algorithms we currently use for protecting our data are imperfect — in the long-term, their logic can be cracked. Regardless of how complex and intricate the algorithm is, getting round it is just the matter of time.

Continue reading “Long-range secure quantum communication system developed” »

Apr 10, 2016

Researchers: Attackers could use holes in Firefox add-ons to target your PC

Posted by in categories: computing, security

It goes without saying that any given piece of computer code—be it an app, a part of your operating system, or even a browser plug-in—may contain flaws that could leave your PC open to attack. But a team of researchers from Northwestern University have come across a new method of attack that can take advantage of holes in one or more installed Firefox add-ons.

According to the team’s research paper (PDF), this newly discovered attack “leverages capability leaks from legitimate extensions to avoid the inclusion of security-sensitive API calls within the malicious extension itself.”

Put another way: Firefox doesn’t enforce any isolation between the add-ons you install, as Ars Technica notes, which could potentially result in security problems. As a result of this lack of isolation, researchers say, an attacker could write a malicious Firefox add-on that appears harmless, but can use security flaws in other installed add-ons to do its bidding.

Continue reading “Researchers: Attackers could use holes in Firefox add-ons to target your PC” »

Apr 10, 2016

Statements: OSAKA – When the foreign ministers from the Group of Seven industrialized nations gather in Hiroshima for a two-day meeting from Sunday

Posted by in categories: government, military, security

They will visit Hiroshima Peace Park and conclude their gathering with a “Hiroshima Declaration” that will likely express hope for a world without nuclear weapons.

The future of such weapons and how to reduce them is shaping discussions in Tokyo and Hiroshima this year, following the nuclear security summit held in Washington on March 31 and April 1 and the upcoming G-7 Ise-Shima summit at the end of next month.

But even as Japan seeks to play a larger role in international nonproliferation efforts, past personal statements by Prime Minister Shinzo Abe, his allies, and, more recently, official government replies about nuclear weapons for Japan, raise questions about how politically credible any leadership in that role might be.

Continue reading “Statements: OSAKA – When the foreign ministers from the Group of Seven industrialized nations gather in Hiroshima for a two-day meeting from Sunday” »

Apr 10, 2016

Alphabet Inc Uses Its Head in AI

Posted by in categories: business, information science, robotics/AI, security, singularity

I imagine that Alphabet has been already exploring the whole online bot technology with its cloud as well as other AI technology. However, one real opportunity in the online cloud services is the “personable” experiences for consumers and businesses. Granted big data & analytics in the cloud is proving to be exceptional for researchers and industry; however, how do we now make the leap to make things more of a personable experience as well as make it available/ attractive for individual consumers & small business especially we look at connected AI & singularity. Personally, I have not seen any viable and good answers at the moment to my question. Security & privacy still is a huge hurdle that must be addressed properly to ensure adoption by consumers from a personable experience perspective.


The market for cloud services is expected to skyrocket in the years ahead. With hundreds of billions of dollars at stake, industry leaders including Microsoft, IBM, and Alphabet are going all-in to capture their fair share of the cloud revenue pie. Alphabet has taken a different path than its tech brethren in the cloud market, but it appears that’s about to change.

Until recently, Alphabet seemed content to focus its cloud efforts on data hosting, or Infrastructure-as-a-Service (IaaS). Not a bad plan given that the amount of data amassed in today’s digital world is unparalleled and is expected to continue growing as consumers become more connected. But even at this early stage of the cloud, data hosting has become a commodity. The real opportunity lies in cloud-based Software-as-a-Service (SaaS) and data analytics solutions, which Alphabet is beginning to address.

Continue reading “Alphabet Inc Uses Its Head in AI” »

Apr 10, 2016

Second digital revolution

Posted by in categories: habitats, internet, neuroscience, quantum physics, robotics/AI, security

Many folks talk about the whole AI revolution; and indeed it does change some things and opens the door the for opportunities. However, has it truly changed the under lying technology? No; AI is still reliant on existing digital technology. The real tech revolution will come in the form of Quantum tech over the next 7 to 8 years; and it will change everything in our lives and industry. Quantum will change everything that we know about technology including devices, medical technologies, communications including the net, security, e-currency, etc. https://lnkd.in/bJnS37r


If you were born in the 1970s or 1980s, you probably remember the Jetsons family. The Jetsons are to the future what the Flintstones are to the past. That futuristic lifestyle vision goes back several decades; self-driving vehicles, robotic home helpers and so on. What looked like a cartoon series built on prolific imagination seems somewhat more real today. Newly developed technologies are becoming available and connecting everything to the internet. This is the-internet-of-things era.

These ‘things’ are not new. They are just standard devices – lights, garage doors, kitchen appliances, household appliances – equipped with a little intelligence. Intelligence that is possible thanks to three emerging technologies: sensors to collect information from surroundings; the ability to control something; and communication capability allowing devices to talk to each other.

Continue reading “Second digital revolution” »

Apr 7, 2016

Your next car will need a firewall

Posted by in categories: cybercrime/malcode, internet, security, transportation

As our cars become increasingly connected to the internet, and eventually drive themselves, we’re going to want them to be rock-solid secure. The recent Chrysler exploit and FBI warning both highlighted just how vulnerable our vehicles can be to malicious hackers.

The idea of anti-virus software for cars has been around for several years, and this year there’s even an entire conference about in-car cybersecurity. Karamba Security is a new company in the space that is offering what amounts to a firewall for your ride.

Don’t miss our biggest TNW Conference yet! Join us May 26 & 27 in Amsterdam.

Continue reading “Your next car will need a firewall” »

Apr 5, 2016

Federal legislation to jumpstart space solar power

Posted by in categories: climatology, economics, food, government, law, nuclear energy, security, solar power, space, sustainability

The United States is transitioning from a primary reliance on fossil fuels to greater use of sustainable natural and nuclear energy sources. There are two reasons for this transition. The first reason is that the abnormally high and increasing level of atmospheric carbon dioxide has created scientific uncertainty and concern as to the detrimental impact this may have on the environment and, consequentially, human civilization. Almost certainly, this abnormal level is due to anthropogenic causes linked to the tremendous expansion in the human population since the early 1700s, the growth of human civilization (e.g., agriculture and industrialization), and the increasing use of fossil fuels. Although fossil fuels have enabled worldwide progress in elevating the standard of living, most of the world’s nations have reached the conclusion that the world should transition entirely to sustainable energy by 2100 (see “The Paris climate agreement and space solar power”, The Space Review, February 29, 2016). It is, however, very important to manage this transition carefully to avoid economic hardship or energy deprivation.

While the United States has large remaining fossil fuel resources, only some are technically recoverable with current safe, legal, and profitable extraction methods. The remaining known and yet-to-be-discovered domestic technically recoverable fossil fuels are inadequate to sustain US fossil fuel energy needs to the end of this century, especially given likely continued immigration-driven US population growth (see “US fossil fuel energy insecurity and space solar power”, The Space Review, March 7, 2016). While the United States has an ethical environmental obligation to end its use of fossil fuels by the end of the century, the reality of having inadequate oil and natural gas resources makes the urgency of transitioning successfully to new sustainable energy sources a clear matter of national energy security. This warrants federal government leadership and strong American private sector engagement.

Unfortunately, due to its large and growing population and per capita energy needs, the United States lacks sufficient suitable land to utilize terrestrial renewable energy to replace fossil fuels. (see “US terrestrial non-fossil fuel energy vs. space solar power”, The Space Review, March 14, 2016). While the United States will utilize terrestrial domestic renewable energy to the extent it is politically acceptable, many factors will likely limit their scale-up. The expansion of nuclear fission energy is also not a satisfactory approach, given the large number of reactors needed. These factors lead to the conclusion that only space-based sustainable energy, such as space solar power, will enable the United States to practically transition away from fossil fuels.

Read more

Apr 5, 2016

How artificial intelligence will impact the role of security pros

Posted by in categories: quantum physics, robotics/AI, security

Granted AI performs well at identifying, predicting how to respond through analyzing patterns and information, etc. However, AI is not completely hacker proof at this point. AI still requires close monitoring by humans. The bottom line is until the existing net infrastructure and digital platforms are Quantum based; it will be hard to make AI hacker proof and fully autonomous due to the risks with the existing digital technology.


In the new battle between man and machine, how does artificial intelligence impact the security professional?

Posted by Ben Rossi.

Continue reading “How artificial intelligence will impact the role of security pros” »