Minecraft

From Minecraft to Crippling the Internet

Minecraft is innocent enough, right? Many tales of wicked deeds sometimes have an unlikely, harmless beginning. Here is one such tale.

Even though it’s about something that happened way back in 2016 (a cyberattack on the DNS network that crippled the Internet for a majority of users in North America), this well-written cyberwar article is totally worth sharing in light of recent privacy and security scandals.

Daring to Imagine Cyberwarfare

Daring to Imagine Cyberwarfare

Computer viruses and hacking have been around since the dawn of the Internet. But while some time ago the platform was used almost exclusively by academics and the tech-savvy, the Internet is now quickly becoming one of the central technological pillars of our society. Particularly in developed countries, countless vital social systems are now connected to it, ranging from the run-of-the-mill residential heating system to critical infrastructure such as hospitals, public transport and even military.

In the same time, the skills and tools in the cyber-soldier’s arsenal have greatly increased in potency. Even more importantly, the interest and will to compromise connected systems has increased exponentially in the past decade. Some years ago, the Internet was home to mostly petty crime and the occasional larger security breach. Now-a-days, state actors such as the United States, North Korea, and pretty much all major powers and nation-states involved in military conflicts, train and make use of cyber-hacking squads.

Hackers All Around Us!

Hackers all around Us!

Whenever news comes in about some sort of data breach or hacked service, we’re often treated with pictures of the assumed perpetrators and the way their office (bedroom? garage?) looks. Mentatul managed to get in touch with some of these unique people. They were happy that somebody is interested in their private lives and difficult working conditions.

The AI Stock Market Wars

The AI Stock Market Wars

Before Artificial Intelligence develops free will and would even be in a sufficiently advanced position to decide if humans are necessary on this planet, we seem to be doing a pretty good job of destroying ourselves anyway by giving a dangerous amount of power over to semi-intelligent algorithms. Enter the artificially intelligent hedge fund.

But what’s this talk about “destroying ourselves”? Can these things actually kill? Well, let’s look at this way: these algorithms are designed to make profits for their owners by moving investments from one company to the other. In other words, stock market algorithms are playing with the fate of companies in order to make profits for investors. But unlike a human, an algorithm is not programmed for empathy, mercy or intuition. Such algorithms could potentially annihilate a promising company simply because it made some errors in reporting or short-term financial planning.

Trump Putin and Cold War 2.0

Trump, Putin and Cold War 2.0

I present you with one of the best geopolitical analysis articles I’ve read in the past couple of years. It’s also quite a long read. But if you care about the conflict between the world’s superpowers, this will be an excellent use of your time since it’s also very well written.

The text goes in ample detail regarding cyberwarfare and how Russia has become a force to be reckoned with in the field of social media manipulation. You will also learn why it was possible for Russia to influence the elections in the United States. In turn, this will make it clear that democracy is facing a threat as a result of the intense polarization affecting many societies on Earth.

Cyber Warfare And Hardware Attacks

Cyber-Warfare is Scary

When we read in the press about “hacking”, it’s mostly about software-based attacks. It may be about exploiting a vulnerability to reveal passwords or attacking an insecure computer.

Tiny hardware back-doors can be baked inside any integrated circuit. It’s not news that this is doable, but what is news is that it’s way too easy to achieve and almost impossible to detect. Even in the case of the highly advanced computer processors that are inside all our devices. Apparently it can be done by a single (well trained) person working inside the factory that manufactures the chip.