Breakthrough AI hacking tool cracks millions of user passwords in minutes

Breakthrough AI hacking tool cracks millions of user passwords in minutes

WHY THIS MATTERS IN BRIEF Artificial Intelligence is a cyber security game changer, for better and worse, and we need to be better prepared for what’s coming.   Last year the credit reporting agency Equifax announced that malicious hackers had leaked the personal information of over 143 million people after their system...

Read more
UK and Singapore set 2021 deadline to launch world’s first quantum communications cubesat

UK and Singapore set 2021 deadline to launch world’s first quantum communications cubesat

WHY THIS MATTERS IN BRIEF Unlike traditional communications technologies quantum communications are unhackable, so countries are racing to deploy them.   Highly secure global communication based on Quantum Key Distribution (QKD), a secure communications cryptographic protocol that’s based on the eerie phenomenon of quantum mechanics, could eventually be made possible...

Read more
US military identifies virtual nations as a potential security threat to US sovereignty

US military identifies virtual nations as a potential security threat to US sovereignty

WHY THIS MATTERS IN BRIEF The internet means citizens can now become part of large, virtual collectives, or nations, and there are fears these nations, with their own rules, welfare and support systems, could threaten the power and influence of sovereign nations.   When is a nation not a nation?...

Read more
Futurist Keynote, Antwerp: Investing in the Future, Infosys Finacle

Futurist Keynote, Antwerp: Investing in the Future, Infosys Finacle

WHY THIS MATTERS IN BRIEF As the pace of change continues to accelerate many companies find keeping up with it a daunting prospect, and it’s no less of an issue for the financial services community.   Firstly, thank you to Bharadwaj and the team for inviting me to be this...

Read more
“Sticky, evolving botnet” gets top cyber experts worried about the future

“Sticky, evolving botnet” gets top cyber experts worried about the future

WHY THIS MATTERS IN BRIEF A new form of modular, multi-stage malware that’s capable of infecting anything and almost everything is getting cybersecurity experts worried.   A dangerous and potentially destructive new IoT malware sample has recently surfaced that for the first time this year is not just another cheap...

Read more
An immune system for the internet, new good samaritan malware surprises experts

An immune system for the internet, new good samaritan malware surprises experts

WHY THIS MATTERS IN BRIEF Cyber attacks are getting out of control, but evolving, roving “good samaritan” forms of malware could become the new cops of the internet and the future of cybersecurity.   Security researchers have discovered a very odd new botnet that, rather than posing a threat, seems...

Read more
Unhackable “Quantum Alphabet” encryption ushers in new era in cybersecurity

Unhackable “Quantum Alphabet” encryption ushers in new era in cybersecurity

WHY THIS MATTERS IN BRIEF Noone likes hackers, so everyone is trying to find ways to create the ultimate unhackable system, and this breakthrough in quantum mechanics could be one of the most promising.   In the wake of countless data breaches there has been a dramatic rise in the...

Read more
Estonia becomes the world’s first virtual nation capable of rebooting itself

Estonia becomes the world’s first virtual nation capable of rebooting itself

WHY THIS MATTERS IN BRIEF Technology is showing us how ancient the concept of the traditional nation state is, and as virtual nations take shape being able to reboot them in times of war is crucial.   How do you reboot an entire country? It’s an odd question, but in...

Read more
Telepathic warfare takes center stage as US military bets big on neuro tech

Telepathic warfare takes center stage as US military bets big on neuro tech

WHY THIS MATTERS IN BRIEF Today’s brain machine interfaces are rudimentary or require invasive surgery, this program could bring brain interfaces to the masses and be the next step in human-technological evolution.   Until now the advanced and cutting edge neuroscience programs at DARPA, the self proclaimed mad science wing...

Read more
IBM injected a virus into a neural net to create an undetectable cyberweapon

IBM injected a virus into a neural net to create an undetectable cyberweapon

WHY THIS MATTERS IN BRIEF Even today’s cutting edge cybersecurity products have no defence against virus laden, weaponised neural networks.   It’s been a very busy few weeks in the field of Artificial Intelligence (AI) and neural networks with the creation of the world’s first DNA neural network, and the world’s...

Read more
Hackers use data science to evade state of the art AI cybersecurity systems

Hackers use data science to evade state of the art AI cybersecurity systems

WHY THIS MATTERS IN BRIEF By figuring out what data sets cybersecurity are training their AI’s on hackers have found a way to create malware that can’t be detected.   Walking around the exhibition floor at this week’s massive Black Hat cybersecurity conference in Las Vegas many people were struck...

Read more
IBM finds a way to watermark AI’s to protect them from theft and sabotage

IBM finds a way to watermark AI’s to protect them from theft and sabotage

WHY THIS MATTERS IN BRIEF Creating complex neural networks and AI’s takes a lot of expertise, money and resources so being able to watermark them will help protect them from theft.   What if machine learning models, much like photographs, movies, music, and manuscripts, could be watermarked nearly imperceptibly to denote...

Read more
Blackhat hackers discover a way to turn satellites into “microwave weapons”

Blackhat hackers discover a way to turn satellites into “microwave weapons”

WHY THIS MATTERS IN BRIEF Satellites are ubiquitous and a newly discovered exploit could let hackers turn them into high frequency weapons that fry electronics on the ground.   As I discussed in a recent keynote on the future of cybersecurity, even air gaps, thought to be the ultimate in...

Read more
Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

WHY THIS MATTERS IN BRIEF Industrial Control Systems (ICS) that enable the safe and efficient operation of our CNI assets are becoming increasingly smart and connected, making them more vulnerable to attack, and new technologies bring  new challenges.   Firstly, thanks to James for inviting me to be the keynote...

Read more
IBM joins Sovrin Foundation to give individuals back control of their data

IBM joins Sovrin Foundation to give individuals back control of their data

WHY THIS MATTERS IN BRIEF Today there is no way you can control who uses or shares your information, despite regulations like GDPR, but Self-Soverign ID systems like this one gives users the power to control their own online information.   It looks almost inevitable that Facebook will be punished,...

Read more
New quantum resistant crypto stops quantum computers spying on your data

New quantum resistant crypto stops quantum computers spying on your data

WHY THIS MATTERS IN BRIEF When large quantum computers come online circa 2025 over 70 percent of the world’s encryption will be at risk, so companies need to adopt new method to protect themselves and their data.   As quantum computing becomes an increasingly “real” technology, moving out of the...

Read more
Simple pixel hack cripples state of the art AI medical imaging systems

Simple pixel hack cripples state of the art AI medical imaging systems

WHY THIS MATTERS IN BRIEF As AI becomes increasingly pervasive in healthcare companies need to be aware that a new simple attack on their AI imaging and diagnostic systems could cause untold chaos, and even result in deaths.   Recently we’ve seen how a duelling AI that adjusted a pixel or...

Read more
Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

WHY THIS MATTERS IN BRIEF 51 percent attacks are rare, but as criminals continue to gain access to more computing power smaller cryptocurrency networks are in increasing danger of being comandeered.   This week not one but three cryptocurrencies, Bitcoin Gold, Verge Coin, and Monacoin, were hit with a rarely seen cyber...

Read more
Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

WHY THIS MATTERS IN BRIEF One thing about the future is certain, all of our digital and physical systems are going to come under increasing attack, and it’ll be a war without end.   Hacks that can jump between and steal data from ultra-secure air gapped systems, fileless malware that...

Read more
Hackers use electromagnetic attack to steal data from air gapped systems

Hackers use electromagnetic attack to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Faraday cages are supposed to be the ultimate in stopping air gapped computer systems from being attacked and their data exfiltrated, but hackers in Israel have just proved that’s no longer the case.   Two common methods of physical cybersecurity, air gapping and Faraday cages,...

Read more