Scammers burn crypto and re-configure smart contracts to steal millions

Scammers burn crypto and re-configure smart contracts to steal millions

WHY THIS MATTERS IN BRIEF When scammers re-configure crypto and blockchain smart contracts your money is gone forever the instant you transfer it.   Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential University, read about exponential tech and trends,  connect, watch a keynote, or browse my blog. 2021...

Read more
Researchers show it’s possible to load malware onto switched off phones

Researchers show it’s possible to load malware onto switched off phones

WHY THIS MATTERS IN BRIEF When your smartphone is off it isn’t and that means certain active components can be hacked even when you think they can’t.   Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential University, read about exponential tech and trends,  connect, watch...

Read more
Researchers find a new way to train AI’s to protect them from deadly adversarial attacks

Researchers find a new way to train AI’s to protect them from deadly adversarial attacks

WHY THIS MATTERS IN BRIEF As more of the world comes to rely on AI adversarial attacks pose a particular challenge to companies and people in critical industries who are responsible for the safety of people and systems.   Interested in the Exponential Future? Join our XPotential Community, connect, watch a keynote, or browse my blog....

Read more
Researchers eavesdrop on conversations remotely using lightbulbs

Researchers eavesdrop on conversations remotely using lightbulbs

WHY THIS MATTERS IN BRIEF Privacy is a myth for most of us, and in the world of espionage and hacker collectives there are a myriad of new tools coming through to spy on people in new ways.   Interested in the Exponential Future? Join our XPotential Community, connect, watch a keynote, or browse my blog....

Read more
Israeli researchers newest hack uses fans to steal classified data from top secret servers

Israeli researchers newest hack uses fans to steal classified data from top secret servers

WHY THIS MATTERS IN BRIEF Security is a game of cat and mouse, and there are plenty of ways to steal top secret data …   Interested in the Exponential Future? Connect, download a free E-Book, watch a keynote, or browse my blog. If you have top secret data to protect like, in today’s time...

Read more
Chinese researchers turned hard drives into covert listening devices

Chinese researchers turned hard drives into covert listening devices

WHY THIS MATTERS IN BRIEF There are many ways people can spy on you, and now they can listen in on your conversations by monitoring your hard drives vibrations.   Everything can be hacked in order to spy on “stuff” it seems, whether it’s hacking ultra secure air gapped systems,...

Read more
Hackers use data science to evade state of the art AI cybersecurity systems

Hackers use data science to evade state of the art AI cybersecurity systems

WHY THIS MATTERS IN BRIEF By figuring out what data sets cybersecurity are training their AI’s on hackers have found a way to create malware that can’t be detected.   Walking around the exhibition floor at this week’s massive Black Hat cybersecurity conference in Las Vegas many people were struck...

Read more
Blackhat hackers discover a way to turn satellites into “microwave weapons”

Blackhat hackers discover a way to turn satellites into “microwave weapons”

WHY THIS MATTERS IN BRIEF Satellites are ubiquitous and a newly discovered exploit could let hackers turn them into high frequency weapons that fry electronics on the ground.   As I discussed in a recent keynote on the future of cybersecurity, even air gaps, thought to be the ultimate in...

Read more
Simple pixel hack cripples state of the art AI medical imaging systems

Simple pixel hack cripples state of the art AI medical imaging systems

WHY THIS MATTERS IN BRIEF As AI becomes increasingly pervasive in healthcare companies need to be aware that a new simple attack on their AI imaging and diagnostic systems could cause untold chaos, and even result in deaths.   Recently we’ve seen how a duelling AI that adjusted a pixel or...

Read more
Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

WHY THIS MATTERS IN BRIEF 51 percent attacks are rare, but as criminals continue to gain access to more computing power smaller cryptocurrency networks are in increasing danger of being comandeered.   This week not one but three cryptocurrencies, Bitcoin Gold, Verge Coin, and Monacoin, were hit with a rarely seen cyber...

Read more
Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb

WHY THIS MATTERS IN BRIEF One thing about the future is certain, all of our digital and physical systems are going to come under increasing attack, and it’ll be a war without end.   Hacks that can jump between and steal data from ultra-secure air gapped systems, fileless malware that...

Read more
Hackers use electromagnetic attack to steal data from air gapped systems

Hackers use electromagnetic attack to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Faraday cages are supposed to be the ultimate in stopping air gapped computer systems from being attacked and their data exfiltrated, but hackers in Israel have just proved that’s no longer the case.   Two common methods of physical cybersecurity, air gapping and Faraday cages,...

Read more
Hackers use infra red CCTV cameras to steal data from air gapped systems

Hackers use infra red CCTV cameras to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Air gapped computer systems that often hold highly sensitive data are generally thought to be secure, but more hackers are testing that theory than ever before.   Even the cleverest malware is stranded unless it can communicate with the people who sent it. This can...

Read more
World’s first GPS Spoofing attack puts 20 ships 32km inland at an airport

World’s first GPS Spoofing attack puts 20 ships 32km inland at an airport

WHY THIS MATTERS IN BRIEF New technology keeps lowering the bar for criminals and nation states that want to cause mischief and harm, and now the makers of autonomous vehicles have something new to worry about.   Recently there have been reports of satellite navigation problems in the Black Sea...

Read more
World first as researchers hack a computer using modified DNA

World first as researchers hack a computer using modified DNA

WHY THIS MATTERS IN BRIEF As we increasingly become masters of manipulating the makeup of life criminals will find new, innovative ways, to breach computer systems and cause havoc.   We are increasingly becoming masters of manipulating the building blocks of life, whether it’s creating new “alien” life forms that...

Read more
Hackers have found a new way to hack Samsung’s iris security system

Hackers have found a new way to hack Samsung’s iris security system

WHY THIS MATTERS IN BRIEF Biometric security systems are awesome, until they’re hacked, and increasingly companies and individuals are finding that their latest and greatest biometric security systems are easier to hack than the password systems they replaced   Criminals know you love taking selfies, and they love your selfies...

Read more
Terrorists are using ‘Photo morph’ fraud to circumvent border security

Terrorists are using ‘Photo morph’ fraud to circumvent border security

WHY THIS MATTERS IN BRIEF As companies race to create new biometric security systems, criminals are busy finding new ways to beat them and the Photo Morph is the latest example.   Biometric systems, like the ones being rolled out in the airports in Australia,  were supposed to be the...

Read more
Researchers hack classified air gapped systems using drones and LED’s

Researchers hack classified air gapped systems using drones and LED’s

WHY THIS MATTERS IN BRIEF Air gapped systems are used to hold and protect top secret data, and they’re becoming increasingly vulnerable to hacks.   Air gapped computer systems have always held a special fascination for hackers – firstly because of the challenge that surrounds being able to hack a...

Read more
A fifth of the Dark Web just got shut down

A fifth of the Dark Web just got shut down

WHY THIS MATTERS IN BRIEF The Dark Web is home to criminals and political activists, and a hacker who went after the former just showed how vulnerable it is.   Last weekend over 10,000 dark web sites were taken down in an attack that aimed to take down sites hosting child...

Read more
Never seen before fileless malware infects hundreds of global banks

Never seen before fileless malware infects hundreds of global banks

WHY THIS MATTERS IN BRIEF A new form of never seen before malware has been discovered and it’s getting more common, unlike previous forms of malware that rely on files to do their dirty work this one lives in computer memory – and that’s a problem.   Just a couple...

Read more