Toggle light / dark theme

In the US we have an old saying “fight fire with fire” and in this case “fight bots with bot/s” It should be noted, having a bot or any type of AI on your network is not necessarily going to prevent 100% of the hacking and Cyber threats today due to the weak connected infrastructure across the net, etc. However, to counter attack the pesky bots that we’re seeing around online ads, click monitoring can be limited by AI.


Roughly half of all Web traffic comes from bots and crawlers, and that’s costing companies a boatload of money.

That’s one finding from a report released Thursday by DeviceAtlas, which makes software to help companies detect the devices being used by visitors to their websites.

Non-human sources accounted for 48 percent of traffic to the sites analyzed for DeviceAtlas’s Q1 Mobile Web Intelligence Report, including legitimate search-engine crawlers as well as automated scrapers and bots generated by hackers, click fraudsters and spammers, the company said.

Read more

CRISPR to take bio- and dirty-bombs to new levels.
Great; however, QC needs to be front and center on this; or, I see a bunch of funding spent on research that will be render useless by the time it goes to market due to the progress in QC.

I truly feel bad for the labs who are having to tests for bio- and dirty-bomb material. Really a dangerous job.


The Defense Advanced Research Projects Agency (DARPA) is looking for research proposals to develop a system that would enable the government and law enforcement to identify the actual individual behind a cyber attack.

The Enhanced Attribution Program proposal is looking to create the technology that would allow not only the collection of data that could pinpoint the perpetrator, but do so in a way that would not put at risk the sources and methods used to find the person or group. From DARPA’s perspective the need for this is quite straightforward.

“Malicious actors in cyberspace currently operate with little fear of being caught due to the fact that it is extremely difficult, in some cases perhaps even impossible, to reliably and confidently attribute actions in cyberspace to individuals,” DARPA wrote in the 43-page proposal.

Read more

Luv it!!!! Another fellow experienced AI SME having the same point of view that many other well seasoned AI experts have. Cerf is more concerned about coding bugs and not killer robots; and I and others are also concern about the weakness of the connected infrastructure, weak under pinning technology, and hacking/ criminals hotwiring or overriding AI systems to do their dirty deed and we’re not (like Cerf) concerned over robots and machines taking over the world.


Robots won’t take over humans, but buggy software might, according to the Google exec known as the “father of the Internet.”

Asked for his thoughts on the risk of a robotic overthrow, Google’s chief internet evangelist, Vint Cerf, said he doesn’t fear that problem — especially because artificial intelligence technology isn’t that sophisticated.

However, flawed software could pose a real threat to humans, he said.

Read more

Hotwiring your Apple watch to run Win95. My 1st question is why? Why would anyone want to work with such a dated system; and I worked many years at Microsoft and don’t understand the logic on this one. I would at least try Win 10. Granted the person states they like retro. If I want retro, I just hook up a PS2, or Wang VS.


Developer Nick Lee managed to get Windows 95 working on his Apple Watch. And Apple Watch definitely has the specs (check our full review). The watch packs in a 520 MHz processor, 512 MB of RAM, and 8GB of internal storage. Compared with Nick’s original $3,000, 300 MHz Pentium II powered PC with 256MB of RAM, the Apple Watch is practically the Computeress from Dexter’s Laboratory. There were quite a few hurdles to overcome, however, before Windows 95 was up and running.

First, Apple does not provide a direct way to install new operating systems. Apple’s WatchKit SDK also does not allow one to access user touch locations directly. Lee therefore patched files within WatchKit and loaded his own application code.

Second, Apple Watch typically hibernates when not in use. To fix this issue, Lee created a motorized tube that constantly turns the Watch’s crown and prevents the watch from falling asleep.

Read more

Due to the pace of Quantum Computing is developing; NIST is rushing to create a Quantum proof cryptographic algorithms to prevent QC hacking. Like I have stated, I believe we’re now less that 7 years away for QC being in many mainstream devices, infrastructure, etc. And, China and it’s partnership with Australia; the race is now on and hotter than ever.


The National Institute for Standards and Technology has begun to look into quantum cybersecurity, according to a new report that details and plans out ways scientists could protect these futuristic computers.

April 29, 2016.

Ransomware has taken off in 2016, already eclipsing the number of attacks observed in a recently published threat report from Symantec.

Read more

Post-quantum cryptography discussion in Tacoma WA on May 5th discussing hacking by QC hackers and leveraging Cryptography algorithms to offset the attacks; may be of interest to sit in and even join in the debates. I will try attend if I can because it would be interesting to see the arguments raised and see the responses.


The University of Washington Tacoma Institute of Technology will present a discussion about the esoteric field of post-quantum cryptography at the Northwest Cybersecurity Symposium on May 5.

“I’ve been researching post-quantum cryptography for years, finding ways to protect against a threat that doesn’t yet exist,” said Anderson Nascimento, assistant professor of computer science at the institute, in a release.

Post-quantum cryptography refers to encryption that would be secure against an attack by a quantum computer — a kind of supercomputer using quantum mechanics, which, so far, exists only in theory.

Read more

There’s a website on the Dark Web offering to store Dox and accept a ransom payment to have it removed; provided the person responsible for uploading the information pays a commission and a processing fee to the website for services rendered.

In addition, it also provides a Doxing-as-a-Service platform, which promises to collect a complete profile on a person for $150.

The website is Ran$umBin (Ransom Bin). Designed to be friendly, easy to use extortion service, its existence was brought to Salted Hash’s attention by Cymmetria’s head of threat intelligence research, Nitsan Saddan. For those not familiar, Cymmetria is a cyber deception startup founded by Gadi Evron and Dean Sysman.

Read more

I am not surprised by this; I do expect this given the existing cyber threat risks around AI especially around the existing under pinning technology/ platforms and net infrastructures.


The finance world is cautiously optimistic about the future of artificial intelligence and how it can be used, but, there is more work needed on regulating the technology when it comes to world markets.

“Financial institutions have been fined billions of dollars because of illegality and compliance breaches by traders. A logical response by banks is to automate as much decision-making as possible, hence the number of banks enthusiastically embracing AI and automation,” said Baker and McKenzie head of financial services regulation Arun Srivastava.

“But while conduct risk may be reduced, the unknown risks inherent in aspects of AI have not been eliminated.”

Read more