Menu

Blog

Page 11435

Feb 19, 2016

Tactics to Protect Against Most Common Cyber Attacks

Posted by in categories: business, cybercrime/malcode, energy, mobile phones, quantum physics, robotics/AI

This is a good baseline around common known issues — the real problem is cyber terrorists (as I call them) learns from each attack they instigate and like an artist, they constantly are fine tuning their own skill. So, the attacker’s approach and execution may be done one way, and by the next attack they can easily have changed their whole attack model completely which makes it very cumbersome for experts to trace at times. If we believe this is bad now; wait until AI is more widely available and adopted. Or, Quantum ends up in the hands of these guys.


Cybercrimes in today’s technologically advanced society have become much more sophisticated and progressive. We can thank mobility for the ease of extended access to our personal data, as with every use of our mobile phones, laptops or tablets in public areas we further increase our risk and vulnerability. As business owners, online shoppers, students, employees and even house wives, we remain at high risk for intrusion of our virtual systems. In this digital day in age, our personal data is used everywhere from when we make an online banking transaction to buying a new shirt at the mall, and even working on a project at the local coffee shop. It is hardly responsible to think that your information is safe anywhere.

Continue reading “Tactics to Protect Against Most Common Cyber Attacks” »

Feb 19, 2016

Medical Facilities Are Inviting Targets for Cyber Attacks

Posted by in categories: biotech/medical, computing

Really a sad fact.


Los Angeles hospital pays $17,000 ransom to get its computer system unlocked. Expert says hackers find medical institutions as easy, profitable targets.

Read more

Feb 19, 2016

Could hacking your pacemaker and holding it ransom be a 2016 cyber trend?

Posted by in categories: biotech/medical, computing, security

So, we’re now adding possible murder to the charges of hackers?.


The Hollywood Presbyterian Medical Center in Los Angeles paid a ransom of 17,000 U.S. dollars to hackers after two weeks of being shut out of their computer network. We talk to cyber security expert Jay Radcliffe about medical cyber vulnerabilities.

Read more

Feb 19, 2016

Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016

Posted by in categories: privacy, security, transportation

Northrup Grumman’s new Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases being showcase at the WEST 2016 navel conference on February 17.


Northrop Grumman Corporation (NYSE: NOC) has announced that it will be showcasing key naval capabilities at the WEST 2016 navel conference on February 17, 2016. The corporation will unveil its full-spectrum cyber solutions, biometric defense solutions, unmanned aircraft and much more at the event. WEST 2016 is co-sponsored by AFCEA and the US Naval institute in San Diego. Northrop Grumman is a platinum sponsor of the conference, which is themed “how we make the strategy work.”

The defense contractor will be showcasing its sea serving operations and capabilities that will help the US armed forces combat challenges and difficulties more efficiently. It is also expected to display how it integrates cyber-technology into all of its defense segments. The key highlight of its cyber-suite is its Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases.

Continue reading “Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016” »

Feb 19, 2016

Don’t Miss Out on This Cyber Security Stock

Posted by in categories: cybercrime/malcode, security

Unless you haven’t been in touch with the real world lately; it truly would be hard not to recognize that real investment opportunities exist in cyber security technology space.


Don’t Miss Out on This Cyber Security Stock, Stocks: CYBR, FEYE, PANW, CSCO, release date: Feb 19, 2016.

Read more

Feb 19, 2016

Russia steps up Syria cyber assault

Posted by in categories: cybercrime/malcode, military

Russia’s cyber war in Syria.


Russia is mounting a far-reaching cyber espionage campaign against Syrian opposition groups and NGOs, as Moscow seeks to influence the flow of information on the country’s humanitarian crisis and obscure the full extent of its military operations.

Read more

Feb 19, 2016

Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks

Posted by in categories: cybercrime/malcode, internet, military, transportation

US Navy fighting the real war that is ramping up by unpluging from certain networks. Well, that is an option; but also very limiting to “sneaker net” information file transfers. Definitely not uncommon across other areas of government.


SAN DIEGO — For the Navy, the best defense against a high-tech enemy may be a low-tech strategy.

After decades of building equipment, aircraft and ships designed to communicate with each other and back to shore, the Navy is now looking to “selectively disconnect” its systems to minimize vulnerability to cyberattacks, said Rear Adm. Lorin Selby, commander of the Naval Surface Warfare Center.

Continue reading “Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks” »

Feb 19, 2016

Silly Putty-like substance is helping researchers make shape-shifting robots

Posted by in category: robotics/AI

One of the largest drawbacks in robotics is the rigid parts and movements of the robots. Well, soon that maybe changing due to non-Newtonian fluids.


(Inside Science) — By using fluids similar to Silly Putty that can behave as both liquids and solids, researchers say they have created fluid robots that might one day perform tasks that conventional machines cannot.

Conventional robots are made of rigid parts that are vulnerable to bumps, scrapes, twists and falls. In contrast, researchers worldwide are increasingly developing robots made from soft, elastic plastic and rubber that are inspired by worms, starfish and octopuses. These soft robots can resist many of the kinds of damage, and can squirm past many of the obstacles, that can impede hard robots.

Continue reading “Silly Putty-like substance is helping researchers make shape-shifting robots” »

Feb 19, 2016

This Robot Lawyer Can Get You Out of a Parking Ticket for Free

Posted by in category: robotics/AI

This maybe true in the UK. However, I am in the US. In the US, if I have a robot representing me and I lose my case; can I claim improper representation? I believe that I can. Also, which states and counties/ cities recognize a robot as an attorney? What federal/ state/ county/ and city ordinances and laws will need to be changed for robots to be recognized as attorney in the US? Just having a robot that interprets laws is not enough in the US.

http://mic.com/articles/135693/this-robot-lawyer-can-get-you…t-for-free


It has already saved people millions of dollars.

Read more

Feb 19, 2016

Three-Armed Cyborg Drummer Is the Killer Beat Machine of the Future

Posted by in categories: cyborgs, media & arts, robotics/AI, wearables

Seeking to “push the limits of what humans can do,” researchers at Georgia Tech have developed a wearable robotic limb that transforms drummers into three-armed cyborgs.

The remarkable thing about this wearable arm, developed at GT’s Center for Music Technology, is that it’s doing a lot more than just mirroring the movements of the drummer. It’s a “smart arm” that’s actually responding to the music, and performing in a way that compliments what the human player is doing.

The two-foot long arm monitors the music in the room, so it can improvise based on the beat and rhythm. If the drummer is playing slowly, for example, the arm will mirror the tempo.

Read more