Toggle light / dark theme

Lookout for MAZAR Bot — Androids should be scared.


One interesting feature of Mazar is that it can not be installed on smartphones running Android with “Russian” selected as the operating system’s language.

The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.

Turn off “Unknown Sources” on your device — The best way to avoid downloading malicious items is to not allow unknown sources to install stuff on your device. The app asks for wide ranging permissions, including the ability to send SMS, have full internet access, and the ability to erase a phone.

Read more

Government and tech + telecom & ISPs need to come to an agreement in how to ensure innocent people’s privacy are respected. When a person murders, stalk, threaten, kidnap, and/ or assault a person then we have a responsibility first to protect the innocent public. And, with the resistance being displayed by Apple, are we running the risk of further alienating the consumers and business customers more when it comes to releasing AI like robots, self driving cars, etc. onto the public where criminals can buy AI technology and use it to hurt others?

We really need to be addressing these issues soon.


Tim Cook is playing a dangerous game of brinkmanship with the U.S. government. In the process, he may set in motion political and judicial processes that will endanger the security of all our mobile devices.

First, let me say that I agree with the spirit of Mr. Cook’s open letter rebuffing a court order that Apple Inc. create a new version of the iPhone’s operating system to allow the Federal Bureau of Investigation to access the…

To Read the Full Story, Subscribe or Sign In.

Read more

The bottom line is robots are machines; and like any other machine, a robot system can be (with the right expertise) reprogram. And, a connected robot to the net, etc. poses a risk as long as hackers poses a risk in the current Cyber environment. Again, I encourage government, tech companies, and businesses work collectively together in addressing the immediate challenge around Cyber Security.

And, there will need to be some way to also track robots & deactivate them remotely especially when the public are allowed to buy them (including criminals).


“We believe story comprehension in robots can eliminate psychotic-appearing behavior and reinforce choices that won’t harm humans and still achieve the intended goal”.

There’s no manual for being a good human, but greeting strangers as you walk by in the morning, saying thank you and opening doors for people are probably among the top things we know we should do, even if we sometimes forget.

The Quixote technique is best for robots that have a limited objective but need to interact with humans to achieve it, and it is a primitive first step toward general moral reasoning in AI, Riedl says.

Read more

The lack of collaboration on cyber security between the senior levels of business is leaving UK firms exposed to fines and reputational damage, a study has revealed.

One in 10 C-level respondents to a survey by Palo Alto Networks said they “kind of” understand what defines an online security risk, but admitted they “still have to use Google to help explain it”.

This finding suggests that the lack of consensus on where the responsibility for cyber security lies could stem from some lack of cyber security understanding at the leadership level.

Read more

Although this article highlights the lack of awareness by some CEOs and board members on all things around Cyber Security; I do see a larger gap and risk. I do believe if a fully funded and dedicated joint task force effort among Silicon Valley, US Government, and Wall Street are not in place tackling this jointly to help the country and economy to diffuse this situation within the next 14 to 18 months that AI could fail in its delivery due to public’s concerns around trust and security.

Therefore, tech spent millions if not billions on new AI technology that businesses and consumers see no value in due to risks.


Some board executives still need help from a search engine to explain cyber security issues, warns report.

Read more

Cyber Carjacking the new way to steal someone’s auto.


Cyber security was one of the topics on the agenda at the recent CyberTech conference held in Tel Aviv.

Last year, hackers in the US managed to remotely access a Jeep Cherokee SUV through its on-board computer, taking control of its steering, transmission and brakes.

A similar hack into the Tesla Model S, was carried out, officials say.

Read more

This is very true; everyone knows in order for AI to truly be embraced by both consumers and industry; that Cyber Security on multiple fronts will need to be invested in to ensure better adoption of all the great technology on the horizon.


Though the cyber security industry has lost its momentum in the past several months, partially due to the weakness in the broad technology sector, it is poised for exponential growth in the coming years in the face of increasing cybercrime and the need to protect against these threats. According to Gartner, global security spending will increase 4.7% year over year to $75.4 billion in 2015 with some analysts projecting the global market to grow from $77 billion in 2015 to $170 billion by 2020.

The Q4 earnings reports of several industry players reflect this trend as most of them have beaten our earnings and revenue estimates with an encouraging outlook. Yet, they failed to drive the space and its ETFs higher that might suggest attractive entry point at the current level (read: 16 Bold ETF Predictions for 2016 ).

Let’s dig into the earnings results of some of the cyber security firms that have the largest allocation to the ETFs in this industry:

Read more

See even Space gets it — the importance of great Cyber Security is needed now.


The disruption of capabilities that space assets provide would have immediate, far-reaching and devastating economic, political, and geostrategic consequences. Over the past two decades, space vulnerabilities have grown dramatically in a manner commensurate with terrestrial dependency on space-based capabilities and enablers. This is true for both civilian and military activities. Purposeful interference with space systems could rather easily trigger a retaliatory spiral of actions that could compromise a safe and secure operating environment in space. Accordingly, having available a range of measures to prevent or preempt an incident, or even full-up conflict, is of rapidly growing importance to an increasing number of countries.

The interruption of space services through a cyber attack could involve large, and possibly very complex, knock-on effects. As the space and cyberspace domains are linked operationally—space cannot exist without cyber and cyber, in some cases, without space—and they permeate all other warfighting domains (i.e. land, air, and sea), cyber-related vulnerabilities of space assets are a major concern. Global effects would be virtually instantaneous.

Given these realities, space-dependent civilian governments are wise to be seeking new ways to engage in serious international discussions concerning how best to ensure responsible behavior in these two connected domains. Meanwhile, space-dependent militaries are, to varying degrees, bracing themselves for the worst by the establishment of crisis management mechanisms to address fast-moving security threats emanating from cyber-related vulnerabilities embedded in space systems and operations. In some cases, this mechanism includes taking proper account of growing government dependency on commercial providers as key parts of both military and civilian missions.

Read more

82% of Energy Industry (power grids, nuclear, solar, gas, etc.) say that a Cyber Attack Could Cause Physical Damage — and they didn’t highlight those on some sort of life support or machine to help patients, etc. to live.


According to the results of a recent Tripwire survey of more than 150 IT professionals in the energy, utilities, and oil and gas industries, 82 percent of respondents said a cyber attack on operational technology (OT) in their organization could cause physical damage.

The survey, conducted in November 2015 by Dimensional Research, also found that almost 60 percent of respondents said they aren’t able to track all the threats targeting their OT networks, either because they don’t have the visibility necessary to track all threats (16.2 percent), because they only track threats that directly target their department (8.1 percent) or because there are just too many threats (35.4 percent).

“After hundreds of years protecting our nation’s geographic borders, it is sobering to note that possibly the most vulnerable frontier happens to be the infrastructure that runs the largest companies in the country,” Rekha Shenoy, vice president and general manager of industrial IT cyber security for Tripwire parent company Belden, said in a statement.

Read more

Are you feeling confident about those robots and other AI machines and apps connected to the cloud environments self managing themselves?


The latest round of embarrassing federal data breaches struck the very agencies charged with protecting Americans, evidence one leading member of Congress believes is proof that throwing money at a problem doesn’t solve much unless there’s accountability to go with it.

Last week, the personal data of some 20,000 FBI employees and more than 9,000 Department of Homeland Security workers was released.

Days later, the story took on additional embarrassment when authorities arrested the perpetrator, a 16-year-old boy in Great Britain. The teen said he gained access to the information through weak security in the Department of Justice email system.

Read more