Category: Security

0

Hacker Superstar Ang Cui’s Symbiotes will Defend Your Mind

Ang’s research focuses on embedded devices such as routers, printers and VOIP phones. And he is the inventor of a novel, host-based defense mechanism known as Symbiotes. Symbiotes are software defenses “designed specifically to retrofit black-box, vulnerable, legacy embedded systems withsophisticated anti-exploitation mechanisms”. Ang’s work with symbiotes might very well be the first line of defense for your future cybernetically enhanced mind.

0

Cyber-espionage: The greatest transfer of wealth in history

Cybercrime groups, governments, and groups of hacktivists tend to lean toward the spread of malicious agents that have the capacity to silently infiltrate their targets, stealing confidential information from them. The Chinese government is considered the biggest aggressor in cyber espionage, while US networks are the privileged targets of cyber attacks that hit every sector, from media to military.

0

Stylometric analysis to track anonymous users in the underground

According an interesting study presented by researcher Sadia Afroz at last edition of Chaos Communication Congress in Germany, the 29C3, up to 80 percent of certain anonymous underground forum users can be identified using linguistics, a data that is stunning in my opinion. Sadia is member of the The Drexel and George Mason universities research team composed of Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, and Damon McCoy.

1

Critical infrastructures & Manipulation of the name Anonymous

Once nations used arms and military power, intimidating opponents in this way. Today the way of fighting is radically changed, the battleground is cyberspace, the armies are composed by groups of hackers and cyber weapons are sophisticated weapons designed to attack strategic targets … and mainly the wars today are silent.