My 1st PCT Patent is published!

My 1st PCT Patent is published!

Happy to report my 1st PCT patent for ‘Blockchain & Artificial Intelligence: Zero-Day Fraud Prevention in Blockchain Transaction Systems‘ was published yesterday: WO/2023/174683 (EN) COMPUTER IMPLEMENTED METHOD FOR DETECTING A MALICIOUS EVENT OCCURRING IN A BLOCKCHAIN DATA STRUCTURE, A COMPUTING DEVICE, A COMPUTER PROGRAM AND A COMPUTER PROGRAM PRODUCT (FR) PROCÉDÉ MIS EN ŒUVRE PAR ORDINATEUR POUR…

Breaking RSA with a Quantum Computer

Breaking RSA with a Quantum Computer

03 JAN 2023 A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But…

Recent Investments in Cyber Security Firms

Recent Investments in Cyber Security Firms

Cybersecurity Market worth over $400 Bn by 2027 IBM to Acquire Randori for Attack Surface Management Tech Technology giant IBM has announced plans to acquire early-stage attack surface management startup Randori in a deal that signals a major expansion of Big Blue’s cybersecurity ambitions. Randori, a Boston area startup with a well-established reputation in the…

“We are actively working on the digital blockade of the Russian Federation.”

“We are actively working on the digital blockade of the Russian Federation.”

Palantir Technologies Inc. CEO Alex Karp, in the white shirt, speaks with Ukrainian President Volodymyr Zelenskyy, far right, and other officials June 2 in Kyiv. (Mykhailo Fedorov/Provided) Palantir’s Karp is first western CEO to visit Zelenskyy amid invasion WASHINGTON — The chief executive officer of Palantir Technologies Inc. quietly visited Ukraine this week, meeting with the country’s…

Russia, Ukraine and the Danger of a Global Cyberwar

Russia, Ukraine and the Danger of a Global Cyberwar

By Kevin Townsend on February 24, 2022 A conversation with Marcus Willett, former director of cyber at GCHQ On the morning of February 22, 2022, the world woke to the news that Russia had moved troops into two separatist regions of eastern Ukraine. At the time of writing, it is not yet a full invasion of Ukraine,…

Deadly Secret: Electronic Warfare Shapes Russia-Ukraine War

Deadly Secret: Electronic Warfare Shapes Russia-Ukraine War

By Associated Press on June 03, 2022 On Ukraine’s battlefields, the simple act of powering up a cellphone can beckon a rain of deathly skyfall. Artillery radar and remote controls for unmanned aerial vehicles may also invite fiery shrapnel showers. This is electronic warfare, a critical but largely invisible aspect of Russia’s war against Ukraine. Military commanders…

NSA TAO Chief on Disrupting Nation State Hackers

NSA TAO Chief on Disrupting Nation State Hackers

Rob Joyce, Chief, Tailored Access Operations, National Security Agency From his role as the Chief of NSA’s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce talks about the security practices and capabilities that most effectively frustrate people seeking to exploit networks. Rob Joyce began serving as the Chief of the National Security…

MacOS Being Picked Apart by $49 XLoader Data Stealer

MacOS Being Picked Apart by $49 XLoader Data Stealer

Cheap, easy and prolific, the new version of the old FormBook form-stealer and keylogger has added Mac users to its hit list, and it’s selling like hotcakes. There’s a new version of the old FormBook form-stealer and keylogger that’s added Mac users to its hit list, and it’s selling like hotcakes on underground markets for…

We Infiltrated a Counterfeit Check Ring! Now What?

We Infiltrated a Counterfeit Check Ring! Now What?

A counterfeit check image [redacted] that was intended for a person helping this fraud gang print and mail phony checks tied to a raft of email-based scams. One fraud-fighting group is intercepting hundreds to thousands of these per day. By Brian Krebs – Krebs on Security Imagine waking up each morning knowing the identities of…

How a Bitcoin Trail Led to a Massive Dark Web Child-Porn Site Takedown

How a Bitcoin Trail Led to a Massive Dark Web Child-Porn Site Takedown

Federal investigators focused not on offensive hacking efforts or surveilling communications, but on the transactions using cryptocurrency. The Department of Justice said today that it has taken down the massive dark web child-porn site Welcome to Video. The site generated and distributed exploitative content, and had infrastructure in place that could have supported up to…

Morphing computer chip repels hundreds of professional DARPA hackers

Morphing computer chip repels hundreds of professional DARPA hackers

Trying to hack the “unhackable” Morpheus system is described as like trying to solve a Rubik’s Cube that is constantly being rearranged [signature-free security!! — TJACK]   By Michael Irving May 24, 2021 Engineers have designed a computer processor that thwarts hackers by randomly changing its microarchitecture every few milliseconds. Known as Morpheus, the puzzling processor…