Public Release: 4-Nov-2016 Fake Tweets, real consequences for the election A USC Viterbi School of Engineering Computer Scientist worries that robot-generated tweets could compromise the presidential election University of Southern California Software robots masquerading as humans are influencing the political… Read More ›
Internet
Knowledge transfer: Computers teach each other Pac-Man
March 27, 2014 Matthew Haugen PULLMAN, Wash. – Researchers in Washington State University’s School of Electrical Engineering and Computer Science have developed a method to allow a computer to give advice and teach skills to another computer in a way that… Read More ›
Rise of robot reporters: when software writes the news
17:00 21 March 2014 by Aviva Rutkin Just three minutes after an earthquake hit California on Monday, the Los Angeles Times broke the story on its website. The short article seemed fairly ordinary. It covered all the major details –… Read More ›
Germany warns US facilities could be targeted in wake of NSA leaks
Published time: November 12, 2013 22:13 The entrance to the US Airbase is pictured in Ramstein, southern German (AFP Photo / Daniel Roland) Officials in Germany have cautioned authorities to prepare for possible attacks against United States facilities overseas as… Read More ›
Artificial intelligence ‘will take the place of humans within five years’
Salespeople, call centre staff and customer service personnel could all be replaced by computers within the next few years, claims one technology entrepreneur. Steven Spielberg’s 2001 film Artificial Intelligence (AI) depicts a future where robots have become eerily human…. Read More ›
E-tattoo monitors brainwaves and baby bump : “now modifying the tattoo to transmit data wirelessly to a smartphone”
26 April 2013 by Sara Reardon Magazine issue 2914. Subscribe and save For similar stories, visit the The Human Brain Topic Guide An electronic patch can analyse complex brainwaves and listen in on a fetus’s heart MIND… Read More ›
GhostShell hackers release 1.6 million NASA, FBI, ESA accounts
Hacktivist crew signs off for Christmas By Iain Thomson in San Francisco Posted in Security, 11th December 2012 01:19 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises The hacking collecting GhostShell has announced it has finished… Read More ›
Couple Claim Cop Stole Their Drugs: Utah does not safeguard personal prescription information from unlawful access or dissemination
By JONNY BONNER SALT LAKE CITY (CN) – A city cop used Utah’s prescription drug database to visit a couple’s home for so-called “pill checks” and steal their pain drugs, hoping “they would be too dumb to notice the pills… Read More ›
New Mac Malware ‘Dockster’ Found on Dalai Lama site
Author : Mohit Kumar on 12/05/2012 03:48:00 AM A new trojan horse app called Dockster is targeting Mac users by exploiting a known Java vulnerability CVE-2012-0507. The trojan is apparently being delivered through a website (gyalwarinpoche.com) dedicated to… Read More ›
Who’s using ‘password’ as a password? TOO MANY OF YOU
Study of hacked websites reveals top 25 common passphrases By John Leyden Posted in Security, 3rd December 2012 12:37 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques A study to find the top 25 leaked passwords of… Read More ›
From sci-fi to reality: The computer-blitzing drone that can cripple a nation’s electronics at the touch of a button
Aircraft manufacturer Boeing have created a weapon that can knock out computers The missile is thought to be able to penetrate bunkers and caves Experts warn, in the wrong hands, could bring Western cities to their knees By Ben Ellery… Read More ›
Microsoft STALKS YOU even more than supermarkets do, says dev
Original URL: http://www.theregister.co.uk/2012/11/29/web_tracking/ Hey, get your tracker kit out of my trouser browser By John Leyden Posted in Security, 29th November 2012 12:57 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Web-tracking is rife on technology vendor websites,… Read More ›
Antivirus biz’s founder unmasked as noted Chinese hacker
Original URL: http://www.theregister.co.uk/2012/11/29/anvisoft_chinese_intrigue/ Blackhat once attacked US Department of Defense By John Leyden Posted in Security, 29th November 2012 09:19 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Antivirus startup Anvisoft was founded by an infamous Chinese hacker… Read More ›
US software firm hacked for years after suing China
Original URL: http://www.theregister.co.uk/2012/11/29/solid_oak_china_hacked_three_years/ Solid Oak nearly went under after three years of persistent attack By Phil Muncaster Posted in Security, 29th November 2012 04:05 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques A Californian software company which sued… Read More ›
Hackers break into International Atomic Energy Agency servers
The UN nuclear watchdog has acknowledged one of its former computer servers had been hacked. The stolen information was contained in a statement by a group with an Iranian-sounding name calling for an inquiry into Israel’s nuclear activities. The International Atomic… Read More ›
Samsung printers have secret admin account
Original URL: http://www.theregister.co.uk/2012/11/28/samsung_printers_have_backdoor_admin_account/ Patch primed to prevent printer p0wnage By Simon Sharwood, APAC Editor Posted in Security, 28th November 2012 05:38 GMT Free whitepaper – IDC: Top Five Considerations for Cloud-Based Security Some Samsung printers, including models the Korean company made… Read More ›
Yahoo! email! hijack! exploit!… Yours! for! $700!
Cybercrook: It’s a bargain, guys… They usually cost way more By John Leyden • Get more from this author Posted in Security, 27th November 2012 10:58 GMT Free whitepaper – The Benefits of a Hybrid Security Architecture A cross-site scripting (XSS)… Read More ›
Is Facebook a Factor in Psychotic Symptoms?
Tuesday, November 20, 2012 TAU researcher connects computer communications and psychosis As Internet access becomes increasingly widespread, so do related psychopathologies such as Internet addiction and delusions related to the technology and to virtual relationships. Computer communications such… Read More ›
Cyber blaggers autoplunder bulging accounts on Euro pay network
‘Operation High Roller’ rascals in mass slurpening By John Leyden • Get more from this author Posted in Security, 23rd November 2012 06:27 GMT Free whitepaper – The Benefits of a Hybrid Security Architecture Cybercrooks have developed a Trojan that targets… Read More ›
Flame Malware against French Government
The news is sensational, according the French magazine L’Express the offices of France’s former president Sarkozy were victim of a cyber attack, but what is even more remarkable is that for the offensive was used the famous malware Flame. …. Read More ›
Man arrested in Athens over ID theft of most of Greek population
Reuters – Tue, Nov 20, 2012 ATHENS (Reuters) – Greek police have arrested a man on suspicion of stealing the personal data of roughly two thirds of the country’s population, police officials in Athens said on Tuesday. The 35-year… Read More ›
U.S. Hangs Citizen Out to Dry in a Cuban Prison
By IULIA FILIP WASHINGTON (CN) – The United States and its contractor left a U.S. citizen to rot in a Cuban prison, failing to warn him that his U.S.-sponsored mission to distribute Internet equipment in Cuba is illegal, Alan Gross… Read More ›
Quantum crypto – with nothing more than STANDARD broadband fibre
Original URL: http://www.theregister.co.uk/2012/11/20/quantum_crypto_breakthrough/ Theoretical un-crackability cracked By John Leyden Posted in Security, 20th November 2012 17:58 GMT Free whitepaper – Blue Coat Systems 2012 Malnet Report Boffins have worked out how to run quantum cryptography systems over a standard broadband… Read More ›
Former Top Official Files Scorching Complaint Against SEC : Claims “Cover up” of Catastrophic Security Breach of the SEC
By IULIA FILIP WASHINGTON (CN) – A former assistant inspector general claims the SEC fired and defamed him for reporting misconduct by SEC officers and exposing potential security breaches at the agency. David P. Weber sued the U.S. Securities and… Read More ›
Israeli Hackers Leak Credit Card Data from Palestine ISP
!!EEV: Again, always proceed with caution when clicking unknown links!! Along war with airstrikes between Israel and Palestine, Cyber war between hackers from both country on fire. . First Hackers from all over world who supporting Palestine start attacking Israeli… Read More ›
David Cameron ‘orders new curbs on internet porn’ : “Such as viewing social networking sites such as Facebook “
David Cameron has ordered tough new controls on web pornography to protect children, it has been reported. David Cameron, an avid iPad user, has pushed for tighter than expected curbs on internet pornography Photo: REX FEATURES <!– remove the whitespace… Read More ›
How metadata brought down CIA boss David Petraeus
13:59 16 November 2012 by Hal Hodson Every move we make online leaves a trace. This is a lesson former CIA director David Petraeus and his lover, Paula Broadwell, learned in dramatic fashion a few weeks ago after an FBI… Read More ›
NASA breach update: Stolen laptop had data on 10,000 users
Breached unencrypted laptop puts personal data of NASA employees and contractors at risk, spokesman says Jaikumar Vijayan November 15, 2012 (Computerworld) Personally identifiable information of “at least” 10,000 NASA employees and contractors remains at risk of compromise following last month’s… Read More ›
Major Data Breach in State Tax System : 3.6 million people and 650,000 businesses may have been compromised
By JACK BOUBOUSHIAN CHICAGO (CN) -South Carolina’s cyber-security contractor, Trustwave, let hackers into the state tax system, compromising the personal information of 3.6 million South Carolinians, taxpayers claim in a federal class action. Lead plaintiff Amber Strautins sued Trustwave Corp…. Read More ›
The Hack on Stratfor / from Jan 2012 with video
Reposted in regards to the david petraeus affair January 11, 2012 | 1400 GMT By George Friedman In early December I received a call from Fred Burton, Stratfor’s vice president of intelligence. He told me he had received information… Read More ›
Anonymous Hackers may have hacked Former CIA Director David Petraeus
Posted by Mohit Kumar on 11/10/2012 10:55:00 PM | CIA Director was uncovered when a woman described as close to him received harassing emails and complained to authorities. The FBI traced the emails and found that they had been sent… Read More ›
Navy Awards Contracts for Effort to Attack Enemy Networks
Nov. 9, 2012 – 03:57PM | By ARAM ROSTON | The Navy appears to be ramping up its cyber war capabilities with a contract award that includes support for offensive cyber technology that could “destroy” enemy computer networks and… Read More ›
Guadeloupe National Domain registrar hacked, Twitter & Google domain credentials leaked
Posted by Mohit Kumar on 11/10/2012 02:35:00 AM | Guadeloupe is a Caribbean island located in the Leeward Islands, in the Lesser Antilles. Today a hacker going by name “UR0B0R0X” claimed to hack into the “Network Information Center Guadeloupe”… Read More ›
Why David Petraeus’s Gmail account is a national security issue: “enormous value to foreign hackers”
Posted by Max Fisher on November 10, 2012 at 11:14 am CIA Director David Petraeus speaks during a high-level meeting in the White House Situation Room. (Pete Souza/The White House via Getty Images) The beginning of the end came for… Read More ›
Google’s China service disrupted without explanation
By Agence France-Presse Friday, November 9, 2012 16:14 EST Google on Friday reported unexplained disruptions to its service in China. “We’ve checked and there is nothing wrong on our end,” a Google spokeswoman told AFP. An online tool that tracks… Read More ›
Generation Hate Attacks and Creative Islamic hackers
November 9, 2012: In late October Israeli police were ordered to stop using the Internet or plugging USB memory sticks into their PCs. All this was prompted by the recent discovery of stealthy hacker software hidden in some police… Read More ›
Anonymous hack 30000 accounts and Social Security Numbers from ‘Telecom Italy’
Engineering Evil: Please use Caution when Clicking on any unknown links…. Posted by Mohit Kumar on 11/05/2012 07:44:00 AM | “Please don’t mind, its 5th of November” slogan for today ! Anonymous Hackers hacked into “Telecom Italy” (www.telecomitalia.it) and dump… Read More ›
Could we copy a specific brain or transfer our minds to another device? Research suggests this amazing idea might be feasible
Mind transfer: human brains in different materials 02 November 2012 by Randal A. Koene Magazine issue 2888. Subscribe and save For similar stories, visit the The Big Idea , The Human Brain and Death Topic Guides HUMAN brains and the… Read More ›
Google told to pay victim for criminal results
Thursday, 1 November 2012 Google was yesterday found liable for damages by a jury in Australia after a man complained that the website’s search results had harmed his reputation by wrongly linking him to Melbourne gang crime. Milorad… Read More ›
Megaupload and the Government’s Attack on Cloud Computing: Gov’t Claims Mr. Goodwin lost his property rights in his data by storing it on a cloud computing service
October 31, 2012 | By Cindy Cohn and Julie Samuels Megaupload and the Government’s Attack on Cloud Computing Yesterday, EFF, on behalf of its client Kyle Goodwin, filed a brief proposing a process for the Court in the Megaupload case… Read More ›
U.S. Army Sponsored Artificial Intelligence Surveillance System Attempts to Predict The Future
10/29/2012 @ 5:12AM |4,088 views In something that looks straight out of the CBS show “Person of Interest“, the science website Phsy.org is reporting on a potentially important breakthrough from researchers at Carnegie Mellon. In research sponsored by… Read More ›
Researchers caught espionage malware mastermind on webcam: linked Russian Official Security Agencies
Posted by Mohit Kumar on 10/30/2012 09:02:00 AM | In march 2011 CERT-Georgia has Discovered Cyber Espionage Attack Incident on country of Georgia. Advanced Malicious Software was Collecting Sensitive, Confidential Information about Georgian and American Security Documents and then uploading… Read More ›
Titan Supercomputer Debuts: Computer Churns Through More Than 20,000 Trillion Calculations Each Second
Oak Ridge National Laboratory is home to Titan, the world’s most powerful supercomputer for open science with a theoretical peak performance exceeding 20 petaflops (quadrillion calculations per second). That kind of computational capability—almost unimaginable—is on par with each of the… Read More ›
Critical infrastructure managing software vulnerable to Unauthorized access
Posted by Mohit Kumar on 10/25/2012 08:57:00 AM | Reid Wightman from security firm ioActive reported that there is an undocumented backdoor available in CoDeSys software that actually used to manage equipment in power plants, military environments, and nautical ships…. Read More ›
Anonymous going to lauch wikileaks like project called TYLER
Posted by Mohit Kumar on 10/23/2012 10:42:00 AM | International hacker group Anonymous is going to create a WikiLeaks competitor scandalous leak portal called Tyler, for the publication of secret information from governments of various countries. One of the group’s… Read More ›
Seen a threatening Tweet? Alert the Secret Service
By Laura J. NelsonOctober 24, 2012, 2:54 p.m. Twitter users sent more than 6.5 million Tweets during the third presidential debate Monday – and a few of them were death threats against President Obama and Republican presidential nominee Mitt Romney…. Read More ›
Study Reveals Impact of Public DNS Services; Researchers Develop Tool to Help
Oct 25, 2012 11:00 AM A new study by Northwestern University researchers has revealed that public DNS services could actually slow down users’ web-surfing experience. As a result, researchers have developed a solution to help avoid such an impact: a… Read More ›
Brain waves reveal video game aptitude
Contact: Diana Yates diya@illinois.edu 217-333-5802 University of Illinois at Urbana-Champaign CHAMPAIGN, Ill. — Scientists report that they can predict who will improve most on an unfamiliar video game by looking at their brain waves. IMAGE:University of Illinois postdoctoral researcher… Read More ›
After snagging $4.6B contract, Lockheed plans ‘cyber kill chain’ for Global Information Grid
Oct. 22, 2012 – 07:10PM | By DEBRA WERNER SAN FRANCISCO — The Defense Department’s day-to-day operations are linked in a vast, international in-house data communications network called the Global Information Grid. Seven million people — uniformed members of… Read More ›
Dutch Government Proposes Cyberattacks Against… Everyone
October 22, 2012 | By Eva Galperin and Katitza Rodriguez and Peter Eckersley Last week, the Dutch Minister of Safety and Justice asked the Parliament of the Netherlands1 to pass a law allowing police to obtain warrants to do the… Read More ›