Menu

Blog

Archive for the ‘security’ category: Page 102

Sep 7, 2018

Why Unidentified Aerial Phenomena Are A National Security Risk And Also An Opportunity For Progress

Posted by in categories: education, government, security

A career’s worth of intelligence work for the U.S. Government has taught me one key lesson: national security is a lot like playing a game of chess. You have to anticipate your opponent’s every move in order to remain one step ahead.

Disclosing your strategy will be used against you. But if you recognize certain opportunities, you can win the match.

When I headed the government’s highly sensitive Advanced Aerospace Threat Identification Program (AATIP), I worked with a team to assess whether a particular chess piece — in this case in the form of an unfamiliar aerial technology — was a threat to our side of the chess board.

Continue reading “Why Unidentified Aerial Phenomena Are A National Security Risk And Also An Opportunity For Progress” »

Sep 6, 2018

Baidu has created a ‘no code’ platform to make building AI models easier

Posted by in categories: business, internet, robotics/AI, security

Hoping to make up ground in the hotly contested artificial intelligence battleground, Chinese Internet giant Baidu Inc. is releasing a tool that allows businesses to create and deploy AI models without coding skills.

Announced Saturday, EZDL is a “no-code platform to build custom machine learning models,” designed with ease of use and security in mind, the company said.

Continue reading “Baidu has created a ‘no code’ platform to make building AI models easier” »

Aug 30, 2018

Google Titan Security Key Kit Now on Sale for $50

Posted by in category: security

Starting today, Google’s Titan Security Keys are now on sale via the Google Store for $50. The kit provides buyers with two security keys, one of which can act as a backup, in case you lose the other.

Titan Security Keys look and function like any other security keys on the market, so don’t expect anything game-changing. But Google’s keys can help you protect your Google, Facebook, or Dropbox accounts from sophisticated phishing attacks.

A security key is a device that essentially adds another step to the account sign-in process. To break in, a hacker would need your password and the physical key, which can sign a digital authentication request to unlock your account.

Continue reading “Google Titan Security Key Kit Now on Sale for $50” »

Aug 26, 2018

Insecure Medical Devices Are Low-Hanging Fruit for Hackers

Posted by in categories: biotech/medical, economics, health, security

“The big problem is that hospitals don’t buy new devices, and they keep using really dangerous ones ad infinitum — until they just stop working,” Corman said.

Corman wants these old, unsecured devices gone from hospitals. The fear is that, beyond freezing systems or hijacking medical records as they did during WannaCry, hackers could also actively manipulate medical equipment to harm patients by, say, administering a lethal dose of medication via an infusion pump. While newer devices aren’t ironclad, they are typically built with more robust security features. So Corman and others are urging health-care providers to scrap old, or “legacy,” equipment and replace it with newer models.

To nudge health-care providers to trade up, he’s put forth an idea for an incentive program akin to “Cash for Clunkers,” the 2009 federal auto-rebate plan that aimed to run gas-guzzling cars off the road. Under that program, which was formally called the Car Allowance Rebate System, people received cash in exchange for turning in fuel-inefficient vehicles, which they could then put toward new, more efficient ones. (The program fizzled after a few months, when it depleted its allotted budget.) Similarly, in this version, health-care providers would be compensated for junking old equipment, and could use the rebates toward the purchase of new devices. Corman said he hasn’t fully worked out the economics, but he believes device makers might be willing to subsidize the program in part, since it would help them move inventory.

Continue reading “Insecure Medical Devices Are Low-Hanging Fruit for Hackers” »

Aug 16, 2018

Hologram Computers

Posted by in categories: 3D printing, augmented reality, biotech/medical, entertainment, holograms, quantum physics, robotics/AI, science, security, space travel, virtual reality, wearables

Computing innovation, computer-generated images, Virtual Reality Glasses, Hybrid Reality, communications, Holographic platform, AR, VR, PC, lifelike experience, 3D cameras, cosmic computing, computer security, gaming displays, in-flight entertainment, computer code, Holographic ideal/paradigm, gaming mechanics, automotive, medical, space, spatial, holographic memory, Artificial Neural Networks, Robotics, holographic 3D, software company, mixed-realty, holographic data, hologram monitors, hologram keyboards, voice equipment, projector system, Holographic apps, HD photography, smartphones, tablets, TVs, laptops, digital displays, 360 Video, Virtual Realty Headsets, Mobile Platforms, holographic universe, ubiquitous computing paradigm, virtual images, Holoquad, Holographic Projector Pyramid, cloud computing, spaceships, teleportation, anti-gravity devices, emulation, advanced technology, light field displays, Mobile Hologram Technology, computer programs, untethered, Immersive Technology, Computer Chips, Elohim computer, custom software, mobile application development, computing library, human-computer interactions, Artificial Neural Networks, holographic memory, Spider-Robots, pop-up gaming displays, automate machinery, computer-generated simulation, 3D Pyramid, consumer electronics, personal computers, holographic images, real-world objects, hardware interconnection, missionary, virtual assistant, Computer Systems Structure, two-dimensional computer display, computerization, Projection Screen, Portable, 3D printer, Hologram goggles, 3D Holographic Projection Technology, Hologram Computer Table, hologram generator, multilevel computer, mixed reality, Bluetooth enabled, Virtual Reality Display, transparent screen display, quantum computer, computer animation, 3D plasma display, meta surface, Dark Energy, holographic interferograms, photorefractive, Holographic atomic memory, computer-generated hologram, real-time hologram, x-ray mirror mandrels, virtual wavefront recording plane, Artificial intelligence, AI, Human Resources, Advertising, Animation, Graphic Web Design, Photography, Robotics, computer science, human-robot interaction, Emergency Medical Hologram, wearable computing, bio-computing, battlefield simulations, Holographic Associative Memory, artificial neural network, Digital Avatar.

Read more

Aug 7, 2018

NEC unveils facial recognition system for 2020 Tokyo Olympics

Posted by in categories: entertainment, privacy, robotics/AI, security

NEC has announced that it will be providing a large-scale facial recognition system for the 2020 Summer Olympic and Paralympic Games in Tokyo. The system will be used to identify over 300,000 people at the Games, including athletes, volunteers, media, and other staff. It’s the first time that facial recognition technology will ever be used for this purpose at an Olympic Games.

NEC’s system is built around an AI engine called NeoFace, which is part of the company’s overarching Bio-IDiom line of biometric authentication technology. The Tokyo 2020 implementation will involve linking photo data with an IC card to be carried by accredited people. NEC says that it has the world’s leading face recognition tech based on benchmark tests from the US’ National Institute of Standards and Technology.

Read more

Aug 3, 2018

Why the world should adopt a basic income

Posted by in categories: economics, employment, law, robotics/AI, security

A BASIC income (BI) is defined as a modest, regular payment to every legal resident in the community, paid unconditionally as a right, regardless of income, employment or relationship status.

Contrary to conventional wisdom, the case for BI does not rest on the assumption that robots and artificial intelligence will cause mass unemployment or that it would be a more efficient way of relieving poverty than present welfare systems (although it would). The main arguments are ethical and relate to social justice, individual freedom and the need for basic security.

Read more

Jul 26, 2018

Segway’s autonomous security robots fight crime

Posted by in categories: robotics/AI, security, transportation

Segway is using robots to fight crime 🤖👮😮.

Read more

Jul 26, 2018

Google wants you to use its new physical keys to secure your account

Posted by in categories: mobile phones, security

You should already be using two-factor authentication to prevent unauthorized access to your online accounts. While your phone is up to the task of helping you with that, Google believes it’s time for to take the next step: using a physical security key.

At its ongoing Google Cloud Next event, the company announced that it’s launched the Titan Security Key, which lets you log in to your account on your desktop by authenticating your identity with over USB or Bluetooth.

Check out TNW’s Hard Fork.

Continue reading “Google wants you to use its new physical keys to secure your account” »

Jul 24, 2018

Google Employees’ Secret to Never Getting Phished Is Using Physical Security Keys

Posted by in categories: policy, security

If you’ve been hacked in recent years, odds are you fell for that perfectly crafted phishing message in your email. Even the most mindful individuals can slip up, but Google’s employees have reportedly had a flawless security record for more than a year thanks to a recent policy requiring them to use physical security keys.

Krebs on Security reports that in early 2017, Google started requiring its 85,000 employees to use a security key device to handle two-factor authentication when logging into their various accounts. Rather than just having a single password, or receiving a secondary access code via text message (or an app such as Google Authenticator), the employees had to use a traditional password as well as plug in a device that only they possessed. The results were stellar. From the report:

A Google spokesperson said Security Keys now form the basis of all account access at Google.

Continue reading “Google Employees’ Secret to Never Getting Phished Is Using Physical Security Keys” »