Scammers burn crypto and re-configure smart contracts to steal millions
WHY THIS MATTERS IN BRIEF When scammers re-configure crypto and blockchain smart contracts your money is gone forever the instant you transfer it. Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential University, read about exponential tech and trends, connect, watch a keynote, or browse my blog. 2021...
Researchers show it’s possible to load malware onto switched off phones
WHY THIS MATTERS IN BRIEF When your smartphone is off it isn’t and that means certain active components can be hacked even when you think they can’t. Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential University, read about exponential tech and trends, connect, watch...
Researchers find a new way to train AI’s to protect them from deadly adversarial attacks
WHY THIS MATTERS IN BRIEF As more of the world comes to rely on AI adversarial attacks pose a particular challenge to companies and people in critical industries who are responsible for the safety of people and systems. Interested in the Exponential Future? Join our XPotential Community, connect, watch a keynote, or browse my blog....
Researchers eavesdrop on conversations remotely using lightbulbs
WHY THIS MATTERS IN BRIEF Privacy is a myth for most of us, and in the world of espionage and hacker collectives there are a myriad of new tools coming through to spy on people in new ways. Interested in the Exponential Future? Join our XPotential Community, connect, watch a keynote, or browse my blog....
Israeli researchers newest hack uses fans to steal classified data from top secret servers
WHY THIS MATTERS IN BRIEF Security is a game of cat and mouse, and there are plenty of ways to steal top secret data … Interested in the Exponential Future? Connect, download a free E-Book, watch a keynote, or browse my blog. If you have top secret data to protect like, in today’s time...
Chinese researchers turned hard drives into covert listening devices
WHY THIS MATTERS IN BRIEF There are many ways people can spy on you, and now they can listen in on your conversations by monitoring your hard drives vibrations. Everything can be hacked in order to spy on “stuff” it seems, whether it’s hacking ultra secure air gapped systems,...
Hackers use data science to evade state of the art AI cybersecurity systems
WHY THIS MATTERS IN BRIEF By figuring out what data sets cybersecurity are training their AI’s on hackers have found a way to create malware that can’t be detected. Walking around the exhibition floor at this week’s massive Black Hat cybersecurity conference in Las Vegas many people were struck...
Blackhat hackers discover a way to turn satellites into “microwave weapons”
WHY THIS MATTERS IN BRIEF Satellites are ubiquitous and a newly discovered exploit could let hackers turn them into high frequency weapons that fry electronics on the ground. As I discussed in a recent keynote on the future of cybersecurity, even air gaps, thought to be the ultimate in...
Simple pixel hack cripples state of the art AI medical imaging systems
WHY THIS MATTERS IN BRIEF As AI becomes increasingly pervasive in healthcare companies need to be aware that a new simple attack on their AI imaging and diagnostic systems could cause untold chaos, and even result in deaths. Recently we’ve seen how a duelling AI that adjusted a pixel or...
Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions
WHY THIS MATTERS IN BRIEF 51 percent attacks are rare, but as criminals continue to gain access to more computing power smaller cryptocurrency networks are in increasing danger of being comandeered. This week not one but three cryptocurrencies, Bitcoin Gold, Verge Coin, and Monacoin, were hit with a rarely seen cyber...
Deadly new “Cyber RAT” turns any factory, power plant or oil rig into a bomb
WHY THIS MATTERS IN BRIEF One thing about the future is certain, all of our digital and physical systems are going to come under increasing attack, and it’ll be a war without end. Hacks that can jump between and steal data from ultra-secure air gapped systems, fileless malware that...
Hackers use electromagnetic attack to steal data from air gapped systems
WHY THIS MATTERS IN BRIEF Faraday cages are supposed to be the ultimate in stopping air gapped computer systems from being attacked and their data exfiltrated, but hackers in Israel have just proved that’s no longer the case. Two common methods of physical cybersecurity, air gapping and Faraday cages,...
Hackers use infra red CCTV cameras to steal data from air gapped systems
WHY THIS MATTERS IN BRIEF Air gapped computer systems that often hold highly sensitive data are generally thought to be secure, but more hackers are testing that theory than ever before. Even the cleverest malware is stranded unless it can communicate with the people who sent it. This can...
World’s first GPS Spoofing attack puts 20 ships 32km inland at an airport
WHY THIS MATTERS IN BRIEF New technology keeps lowering the bar for criminals and nation states that want to cause mischief and harm, and now the makers of autonomous vehicles have something new to worry about. Recently there have been reports of satellite navigation problems in the Black Sea...
World first as researchers hack a computer using modified DNA
WHY THIS MATTERS IN BRIEF As we increasingly become masters of manipulating the makeup of life criminals will find new, innovative ways, to breach computer systems and cause havoc. We are increasingly becoming masters of manipulating the building blocks of life, whether it’s creating new “alien” life forms that...
Hackers have found a new way to hack Samsung’s iris security system
WHY THIS MATTERS IN BRIEF Biometric security systems are awesome, until they’re hacked, and increasingly companies and individuals are finding that their latest and greatest biometric security systems are easier to hack than the password systems they replaced Criminals know you love taking selfies, and they love your selfies...
Terrorists are using ‘Photo morph’ fraud to circumvent border security
WHY THIS MATTERS IN BRIEF As companies race to create new biometric security systems, criminals are busy finding new ways to beat them and the Photo Morph is the latest example. Biometric systems, like the ones being rolled out in the airports in Australia, were supposed to be the...
Researchers hack classified air gapped systems using drones and LED’s
WHY THIS MATTERS IN BRIEF Air gapped systems are used to hold and protect top secret data, and they’re becoming increasingly vulnerable to hacks. Air gapped computer systems have always held a special fascination for hackers – firstly because of the challenge that surrounds being able to hack a...
A fifth of the Dark Web just got shut down
WHY THIS MATTERS IN BRIEF The Dark Web is home to criminals and political activists, and a hacker who went after the former just showed how vulnerable it is. Last weekend over 10,000 dark web sites were taken down in an attack that aimed to take down sites hosting child...
- 1
- 2