Hackers use data science to evade state of the art AI cybersecurity systems

Hackers use data science to evade state of the art AI cybersecurity systems

WHY THIS MATTERS IN BRIEF By figuring out what data sets cybersecurity are training their AI’s on hackers have found a way to create malware that can’t be detected.   Walking around the exhibition floor at this week’s massive Black Hat cybersecurity conference in Las Vegas many people were struck...

Read more
IBM finds a way to watermark AI’s to protect them from theft and sabotage

IBM finds a way to watermark AI’s to protect them from theft and sabotage

WHY THIS MATTERS IN BRIEF Creating complex neural networks and AI’s takes a lot of expertise, money and resources so being able to watermark them will help protect them from theft.   What if machine learning models, much like photographs, movies, music, and manuscripts, could be watermarked nearly imperceptibly to denote...

Read more
Blackhat hackers discover a way to turn satellites into “microwave weapons”

Blackhat hackers discover a way to turn satellites into “microwave weapons”

WHY THIS MATTERS IN BRIEF Satellites are ubiquitous and a newly discovered exploit could let hackers turn them into high frequency weapons that fry electronics on the ground.   As I discussed in a recent keynote on the future of cybersecurity, even air gaps, thought to be the ultimate in...

Read more
Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

WHY THIS MATTERS IN BRIEF Industrial Control Systems (ICS) that enable the safe and efficient operation of our CNI assets are becoming increasingly smart and connected, making them more vulnerable to attack, and new technologies bring  new challenges.   Firstly, thanks to James for inviting me to be the keynote...

Read more
IBM joins Sovrin Foundation to give individuals back control of their data

IBM joins Sovrin Foundation to give individuals back control of their data

WHY THIS MATTERS IN BRIEF Today there is no way you can control who uses or shares your information, despite regulations like GDPR, but Self-Soverign ID systems like this one gives users the power to control their own online information.   It looks almost inevitable that Facebook will be punished,...

Read more
New quantum resistant crypto stops quantum computers spying on your data

New quantum resistant crypto stops quantum computers spying on your data

WHY THIS MATTERS IN BRIEF When large quantum computers come online circa 2025 over 70 percent of the world’s encryption will be at risk, so companies need to adopt new method to protect themselves and their data.   As quantum computing becomes an increasingly “real” technology, moving out of the...

Read more
Simple pixel hack cripples state of the art AI medical imaging systems

Simple pixel hack cripples state of the art AI medical imaging systems

WHY THIS MATTERS IN BRIEF As AI becomes increasingly pervasive in healthcare companies need to be aware that a new simple attack on their AI imaging and diagnostic systems could cause untold chaos, and even result in deaths.   Recently we’ve seen how a duelling AI that adjusted a pixel or...

Read more
Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

WHY THIS MATTERS IN BRIEF 51 percent attacks are rare, but as criminals continue to gain access to more computing power smaller cryptocurrency networks are in increasing danger of being comandeered.   This week not one but three cryptocurrencies, Bitcoin Gold, Verge Coin, and Monacoin, were hit with a rarely seen cyber...

Read more
Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

WHY THIS MATTERS IN BRIEF One thing about the future is certain, all of our digital and physical systems are going to come under increasing attack, and it’ll be a war without end.   Hacks that can jump between and steal data from ultra-secure air gapped systems, fileless malware that...

Read more
Hackers use electromagnetic attack to steal data from air gapped systems

Hackers use electromagnetic attack to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Faraday cages are supposed to be the ultimate in stopping air gapped computer systems from being attacked and their data exfiltrated, but hackers in Israel have just proved that’s no longer the case.   Two common methods of physical cybersecurity, air gapping and Faraday cages,...

Read more
Hackers use infra red CCTV cameras to steal data from air gapped systems

Hackers use infra red CCTV cameras to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Air gapped computer systems that often hold highly sensitive data are generally thought to be secure, but more hackers are testing that theory than ever before.   Even the cleverest malware is stranded unless it can communicate with the people who sent it. This can...

Read more
The world’s first Quantum blockchain is a “quantum time machine”

The world’s first Quantum blockchain is a “quantum time machine”

WHY THIS MATTERS IN BRIEF The introduction of Quantum computers threaten to undermine the encryption that supports all of today’s blockchain technologies so researchers are trying to develop blockchains that are immune from future attacks.   A newly proposed Quantum Blockchain, which at first glance loosely resembles the Quantum Safe...

Read more
NIST scientists say they’ve created an “unhackable quantum machine”

NIST scientists say they’ve created an “unhackable quantum machine”

WHY THIS IS IMPORTANT In the future one thing is certain, there will be a plethora of new cyber threats so we need new ways to secure our systems and defend against them.   New research published in the journal Nature by scientists at the National Institute for Standards and Technology (NIST) in the...

Read more
Hackers found a way to steal data from air gapped networks using powerlines

Hackers found a way to steal data from air gapped networks using powerlines

WHY THIS MATTERS IN BRIEF Air gapped systems normally hold highly sensitive and secret data, and the number of ways to exfiltrate data from them, once compromised, is growing.   Hot on the heels of exploits that use fan noise, infra red cameras, heat, LED lights and drones, magnetic fields and...

Read more
IBM breaks the record for the world’s smallest computer

IBM breaks the record for the world’s smallest computer

WHY THIS MATTERS IN BRIEF As computers continue to shrink it allows organisations to dream up new ways of using them, and in IBM’s case they want to use their new tech to help cryptographically secure the Internet of Things.   Each year IBM showcases “5 in 5” technologies coming...

Read more
Blackberry’s AI Robo-hacker gets to work finding bugs in connected cars code

Blackberry’s AI Robo-hacker gets to work finding bugs in connected cars code

WHY THIS MATTERS IN BRIEF As more products become reliant on software to function, and as  programs get increasingly complex, human developers are finding it increasingly difficult to find and patch all the bugs and vulnerabilities.   As cars, especially self-driving ones, become more reliant on software it’s critical automakers...

Read more
MIT’s new secure, low power chip helps create the “Internet of Secure Things”

MIT’s new secure, low power chip helps create the “Internet of Secure Things”

WHY THIS MATTERS IN BRIEF More cyber criminals are choosing to target Internet of Things devices than ever before because they are easy to gain access to and exploit at scale, MIT’s new chip hopes to reverse that trend.   From data breaches to weaponised devices, the Internet of Things...

Read more
Hundreds of US banks just adopted an automated cyber defense framework

Hundreds of US banks just adopted an automated cyber defense framework

WHY THIS MATTERS IN BRIEF As the volume and severity of cyber attacks increases, and as AI powered cyber attacks emerge, this is the first major step towards large institutions automating their cyber defense.   Experts in the cyber security field are all too aware that we are rapidly approaching...

Read more
Ingenious new bot discovers hacks companies haven’t told their users about

Ingenious new bot discovers hacks companies haven’t told their users about

WHY THIS MATTERS IN BRIEF Many of your online accounts have already likely been compromised but very few companies own up to the fact, putting you and your data at risk,but now a bot can tell you which companies have been hacked – even if they don’t want you to...

Read more
DARPA drops $4m to build the world’s first unhackable ‘self-reconfiguring’ computer system

DARPA drops $4m to build the world’s first unhackable ‘self-reconfiguring’ computer system

WHY THIS MATTERS IN BRIEF Cyber attacks are becoming the pandemic of the 21st Century, and as the number of AI fuelled cyber attacks increase matters will only get worse, but now DARPA hopes a new reconfiguring “Rubik’s Cube” computing system will stop hackers in their tracks.   This week...

Read more