IAF seeking approval to increase number of jets from 33 to 50, with a view of eventually having 75 aircraft.
Category: cybercrime/malcode
The things you learn on the DarkWeb. Wonder what will happen when more and more countries and folks onboard to the Quantum Internet, etc. Could we see one last massive apocalyptic raid on accounts, etc.?
X5 simplifies the process of stealing details from contactless debit cards, cloning fake debit cards.
A criminal group going under the name of The CC Buddies is selling a hi-tech device on the Dark Web that’s capable of copying details from contactless debit cards if held as close as eight centimeters away from a victim’s card.
CC Buddies claim that their device, named Contactless Infusion X5, can copy up to 15 bank cards per second, something that may come in hand if a crook is going through a crowd at a concert or through a crowded subway cart.
Boy; wait until next month with China’s Quantum Launch.
By Munish Sharma.
Cyber has been one of the key discussion items during both Prime Minister Modi’s just concluded visit to the United States and President Xi Jinping’s visit to the US some nine months back. After Xi’s visit, China and the US signed a Cyber Agreement in October 2015. India and the US will ink a cyber agreement in the next sixty days. Notwithstanding these similarities, the intent of and expectations from these two agreements are fundamentally different; the former is an attempt to manage insecurity and the latter is a quest for security. An analysis of the joint statements issued at the end of the Modi and Xi visits to the US highlights the contrasting differences in India and China’s bilateral ties with the United States in the cyber realm.
China : US – Cyber and State Visit
Xi Jinping’s state visit to the US took place in the shadow of a massive cyber-attack on the Office of Personnel Management (December 2014), which compromised the fingerprint records of 5.6 million people and Social Security numbers and addresses of around 21 million former and current government employees. 1 The US has been accusing China of theft of intellectual property targeted against its defence industries, private sector and key governmental functions; amounting to economic espionage. Accusations in this regard go back to 2004, when a series of coordinated attacks – dubbed as Titan Rain – targeted the computer networks of Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA. Cyber espionage featured in every high-level talk and security report.
Another article on Quantum Security; this time from Sydney (generating single photons to make communications and information secured).
With enough computing effort most contemporary security systems will be broken. But a research team at the University of Sydney has made a major breakthrough in generating single photons (light particles), as carriers of quantum information in security systems.
The collaboration involving physicists at the Centre for Ultrahigh bandwidth Devices for Optical Systems (CUDOS), an ARC Centre of Excellence headquartered in the School of Physics, and electrical engineers from the School of Electrical and Information Engineering, has been published in Nature Communications.
The team’s work resolved a key issue holding back the development of password exchange which can only be broken by violating the laws of physics. Photons are generated in a pair, and detecting one indicates the existence of the other. This allows scientists to manage the timing of photon events so that they always arrive at the time they are expected.
Some truth to this if the engineering team and designers are not reflective of the broader world population. Good example, is the super race research of the Nazis and attempts to make it happen. Today, AI in the hands of a N. Korea for example could be bad for the world. However, the larger threat that I see with AI is still the hacking of AI, and stolen AI by criminals to use against society.
Sentient machines are a greater threat to human existence than climate change, according to the Oxford philosopher Nick Bostrom.
Wow and just in time for China’s Quantum Satellite launch next month.
News about this “extreme” decision has drawn ire from many Singaporeans who have criticised the government’s decision on social media.
But, in a surprise move, the Singaporean government has resorted to limiting the Internet access for government work stations for over a year for security reasons. The system of “No internet” for public servants should be more clear-cut, experts say.
He added: “As public servants, we have a duty and responsibility to protect the Government and citizens’ information and data”.
China is getting their new Quantum communications infrastructure being prepped for deployment and adoption. Next month, the Quantum Satellite is launched to enable wireless communication that is secured and can block hacking; and we know what the reverse means for everyone else.
Now, China has unveiled that they have been planning and getting their cities ready for Quantum communications/ network adoption.
China leads the world in quantum communications.
China has already begun to establish quant.
Legendary master filmmaker Werner Herzog examines the past, present and constantly evolving future of the Internet in Lo and Behold: Reveries of the Connected World. Working with NETSCOUT, a world leader in-real time service assurance and cybersecurity, which came aboard as a producer and led him into a new world, Herzog conducted original interviews with cyberspace pioneers and prophets such as PayPal and Tesla co-founder Elon Musk, Internet protocol inventor Bob Kahn, and famed hacker Kevin Mitnick. These provocative conversatons reveal the ways in which the online world has transformed how virtually everything in the real world works, from business to education, space travel to healthcare, and the very heart of how we conduct our personal relationships.
According to Mirror Online, the youngster is studying computing at college.
This gave the 18-year-old full control over the site, including the ability to “delete and suspend users, change the site’s name, censor certain words and manage the eventual ads”, as well as being able to “see everyone’s emails”.
Go to starcon.net.kp and you’ll find a very familiar looking website.