Toggle light / dark theme

For Sale: A Scylex malware Kit please contact your nearest Dark Web for details.


Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities.

Security experts from the Heimdal security firm have discovered a new DIY financial crime kit offered for sale on a notorious malicious hacker forum on the dark web called Lampeduza.

The new crime kit, dubbed Scylex malware kit, allows cyber criminals to roll their own ZeuS-like malware. The malware implements the features of common banking trojan, such as stealing online banking passwords, intercept web traffic and of course establish a backdoor on the infected Windows-based machine.

Read more

Although this another article that highlights again China’s planned launch; I wanted to share it because it does (in a pragmatic approach) highlight a couple of the key benefits for having QC.


The imminent launch of the world’s first quantum communication satellite is widely believed to herald a breakthrough in China’s development of quantum technology.

Mysterious and confusing, the study of minute particles smaller than atoms has been applied in fields as diverse as computer processing, lasers and nuclear technology.

How will quantum communication change our lives — especially in the age of cyber attacks, wiretapping and information leakage?

Read more

Just days away from launch; what will a Chinese owned Quantum Satellite and network mean for the world particularly for the US, Canada, and Europe?


Beijing: China is set to launch the world’s first quantum communication satellite which boasts of hack-proof ultra high security features to prevent wiretapping and intercepts.

If the satellite works well, it will pave the way to a hack-proof communication system, state-run Xinhua news agency reported on Sunday.

It will launch the satellite in a matter of days.

Read more

New method on how to attend Def Con.


LAS VEGAS (AP) — Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats.

As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.

And for the good guys, knowing how to pick locks is important for learning how to defend against it.

Read more

Researchers at the University of Washington in Seattle say that we need to act fast to implement a privacy and security framework to prevent our brain signals from being used against us before the technology really takes off…


Brain-computer interfaces offer new applications for our brain signals—and a new vector for security and privacy violations.

Read more

Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.


A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.

DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.

So while the DARPA competition presents itself as a smiley affair, it dies represent the new face of an emerging weapon – and the most promising weapon on display came from the aforementioned ForAllSecure, a startup with close ties to Pittsburgh’s Carnegie Mellon University.

Read more

Many folks have voiced the concerns over autonomous autos for many legitimate reasons including hacking and weak satellite signals for navigation especially when you review mountain ranges of the east coast.


The world has witnessed enormous advances in autonomous passenger vehicle technologies over the last dozen years.

The performance of microprocessors, memory chips and sensors needed for autonomous driving has greatly increased, while the cost of these components has decreased substantially.

Software for controlling and navigating these systems has similarly improved.

Read more

I already voiced my concerns of this technology in the hands of criminals and terrorists. If we can have it so can others. Only when QC and a Quantum net is in place will we be truly protected with bots.


Cybersecurity could soon be another place where bots become invaluable for experts. DARPA recently organized The Cyber Grand Challenge, where computer algorithms showed how easy it is to clean up vulnerabilities in code written by humans. ( DARPA )

The Cyber Grand Challenge took place under DARPA patronage, and it is good to see how preoccupied the U.S. Department of Defense is with cybersecurity.

The event pitted computers against each other in an attempt to uncover which one can best fulfill the tasks of human cybersecurity researchers, that is, discovering a bug in a software program and fixing it.

Read more

I have reported on this threat for a very long time as we see more BMI technology advance. However, one are where things could drastically reduce hacking and breeches is the migration to a Quantum based net and infrastructure.


Cyberthieves might be mining personal information from your brainwaves at this very moment.

And although this may sound like a plot from a science fiction film, it is a growing concern among researchers who have demanded officials implement a privacy and security framework to block hackers from reading our neural signals.

Experts at the University of Washington have revealed how hackerscould inserting images into dodgy apps and recording our brain’s unintentional reaction using brain-computer interfaces.

Read more

Hackers fighting hackers; wonder what will happen in another20 years when super humans start to become more and more introduced into the mainstream, in this space. Stating dark web hackers will not have access to BMI and other enhancing technologies is not reality either.


The final round of DARPA’s Cyber Grand Challenge pits computers against one another as human programmers watch the future of cybersecurity unfold.

Read more