hackers   4355

« earlier    

Pentagon Turns to High-Speed Traders to Fortify Markets Against Cyberattack
Oct. 15, 2017 7| WSJ | By Alexander Osipovich.

"What it would be like if a malicious actor wanted to cause havoc on U.S. financial markets?".....Dozens of high-speed traders and others from Wall Street are helping the Pentagon study how hackers could unleash chaos in the U.S. financial system. The Department of Defense’s research arm, DARPA, over the past year and a half has consulted executives at high-frequency trading firms and quantitative hedge funds, and people from exchanges and other financial companies, participants in the discussions said. Officials described the effort, the Financial Markets Vulnerabilities Project, as an early-stage pilot project aimed at identifying market vulnerabilities.

Among the potential scenarios: Hackers could cripple a widely used payroll system; they could inject false information into stock-data feeds, sending trading algorithms out of whack; or they could flood the stock market with fake sell orders and trigger a market crash......Among potential targets that could appeal to hackers given their broad reach are credit-card companies, payment processors and payroll companies such as ADP, which handles the paychecks for one in six U.S. workers, participants said.....The goal of Darpa’s project is to develop a simulation of U.S. markets, which could be used to test scenarios, Such software would need to model complex, interrelated markets—not just stocks but also markets such as futures—as well as the behavior of automated trading systems operating within them....Many quantitative trading firms already do something similar.......
In 2009, military experts took part in a two-day war game exploring a “global financial war” involving China and Russia, according to “Currency Wars: The Making of the Next Global Crisis,” a 2011 book by James Rickards. ....“Our charge at Darpa is to think far out,” he said. “It’s not ‘What is the attack today?’ but ‘What are the vectors of attack 20 years from now?’”
Pentagon  financial_markets  financial_system  vulnerabilities  high-frequency_trading  DARPA  traders  hedge_funds  Wall_Street  hackers  books  rogue_actors  scenario-planning  scenario  cyber_security  cyber_warfare  cyberattacks 
5 days ago by jerryking
Twitter
It's 10pm Saturday night @ & in are investing in learning. I'd put this community up…
hackers  ethwateoo  Waterloo  from twitter_favs
5 days ago by kartik
Protecting The Sensitive Files On Your Computer From Hackers
Although technology has evolved to keep our files secure, computer hacking is still a very serious threat.
hackers  computers  documents 
7 days ago by Adventure_Web
Tips for Securing Your Wireless Network
Hackers have discovered a myriad of ways to get your personal information through your wireless network. Stay safe with these tips!
firewalls  hackers  wireless-network 
14 days ago by Adventure_Web
Post a boarding pass on Facebook, get your account stolen | Michal Špaček
Post a boarding pass on Facebook, get your account stolen - Holiday time is in full swing. When you want to brag about your final destination, be careful of what you post on Facebook and Instagram. Leave your boarding passes (and other barcodes) for yourself (and get a shredder). I've known Petr Mára for few years now, he's a nice guy. via Pocket, added September 23, 2017 at 08:39PM
Pocket  social  boardingpass  travel  IFTTT  picture  facebook  networks  hackers 
26 days ago by janhoek

« earlier    

related tags

$1  /  -  0day  2016_presidential_race  2017  4chan  a...  a  aaronswartz  accounts  adversity  ai  anarchism  and  anonymous  anthropology  are  arrest  artificialintelligence  ask  assholes...  at  autism  auto-fill  automation  banned  be  better  bigbrother  bitcoin  blockchain  blog  boardingpass  book  books  bots  bouncing_back  breaking  british  buggy  business  buy  by  cars  casinos  celebs  certifications  cfaa  charlottesville  chatbots  claim  coding  comedy  commands  commentary  competition  computer_science  computer_security  computer_viruses  computers  consider  copies  crime  cryptocurrency  cryptography  cs_history  culture  cyber_security  cyber_warfare  cyberattacks  cyberintrusions  cyberrisks  cybersecurity  cyberthreats  cyberweapons  dailystormer  darpa  data_breaches  decentralisation  def_con  design  developer  digital  digital_currency  digital_infrastructure  digitalmarketing  dinero  disclosure  discourse  dna  dnc  do  documents  email  employment  energy  entertainment_industry  entrepreneurs  equifax  ethereum  ethical  ethwateoo  even  events  exploits  extradition  facebook  fbi  features  female_empowerment  films  finance  financial_markets  financial_system  fine  firewalls  for  free  frisbee  from  game  gameplay  getting  gigeconomy  godaddy  google  graham  graphic-novels  grid  growt  guide  hack  hackathons  hacking  hacktheplanet  have  health  health_care  heartbleed  hedge_funds  hey  high-frequency_trading  history  hollywood  how  humanrights  hustle  hutchinsmarcus  ico  identity  ifttt  illegal  including  info  infographic  information  informationtechnology  infosec  infrastructure  instagram  installation  instcon  instcon17  international_relations  internet-security  internet  internet2015  investigation  it’s  ja  jm  julianassange  kronos  law  leaks  legal  leon_panetta  lets  libertarianism  linux  lisp  listening  localgovernment  lovelauri  macbook  malware  manafortpaul  many  marketing  midlife  millions  mistakes  mod  modding  mods  movies  murder  ne...  negative  neo-nazism  networks  neuralnetworks  news  nginx  north_korea  nsa  object  of  on  online  onlinesafety  openiv  password  paul  pentagon  personal  personaldata  picture  pinterest  pinteres…  play  pocket  policing  politics  populism  power_grid  prague  privacy  producers  product  product_management  programming  project_zero  projectzero  prosecution  protecting  protection  proxy  python  questions  ransomware  recognition  reference  regulators  reinvention  research  review  reviews  rfw  risks  rng  robot  robots  rockstar  rogue_actors  russia  sales  samurais  saudiarabia  scenario-planning  scenario  screencast  seattle  sec  security  security_&_intelligence  self-motivation  send  seo  serio…  server  servers  sex  shares  shiny  shinyobject  shinyobjectreviews.com  signal  signapore  silent  slack  smart  smarter  social  software  sony  soundcloud  speech  spoof  spyware  ssh  ssl  start  startups  statement  step  stop  studios  substitution_of_humans  sudan  surveillance  swartzaaron  system  systems  take  taking  tech  techcrunch  technology  teenvogue  tensorflow  that  their  they  time  tips  to  tolearn  toread  totry  tounderstand  traders  translated  transparency  travel  trust  tutorial  two  udemy  uk  ukraine  ultrasound  universalbasicincome  up  usa  users  uzbekistan  video  virginia  vpn  vulnerabilities  wall_street  wannacry  waterloo  wham-o  what  whitehat  whitesupremacism  wired  wireless-network  with  women  wordpress  yanukovychviktor  yourself  |     

Copy this bookmark:



description:


tags: