Menu

Blog

Archive for the ‘security’ category: Page 103

Jul 23, 2018

The Digital Poorhouse

Posted by in categories: biotech/medical, economics, information science, robotics/AI, security

About the future death of explainability to understand AI thinking, the writing is on the wall…


These divergent approaches, one regulatory, the other deregulatory, follow the same pattern as antitrust enforcement, which faded in Washington and began flourishing in Brussels during the George W. Bush administration. But there is a convincing case that when it comes to overseeing the use and abuse of algorithms, neither the European nor the American approach has much to offer. Automated decision-making has revolutionized many sectors of the economy and it brings real gains to society. It also threatens privacy, autonomy, democratic practice, and ideals of social equality in ways we are only beginning to appreciate.

At the simplest level, an algorithm is a sequence of steps for solving a problem. The instructions for using a coffeemaker are an algorithm for converting inputs (grounds, filter, water) into an output (coffee). When people say they’re worried about the power of algorithms, however, they’re talking about the application of sophisticated, often opaque, software programs to enormous data sets. These programs employ advanced statistical methods and machine-learning techniques to pick out patterns and correlations, which they use to make predictions. The most advanced among them, including a subclass of machine-learning algorithms called “deep neural networks,” can infer complex, nonlinear relationships that they weren’t specifically programmed to find.

Continue reading “The Digital Poorhouse” »

Jul 23, 2018

Xage secures $12 million Series A for IoT security solution on blockchain

Posted by in categories: bitcoin, internet, security

Xage (pronounced Zage), a blockchain security startup based in Silicon Valley, announced a $12 million Series A investment today led by March Capital Partners. GE Ventures, City Light Capital and NexStar Partners also participated.

The company emerged from stealth in December with a novel idea to secure the myriad of devices in the industrial internet of things on the blockchain. Here’s how I described it in a December 2017 story:

Xage is building a security fabric for IoT, which takes blockchain and synthesizes it with other capabilities to create a secure environment for devices to operate. If the blockchain is at its core a trust mechanism, then it can give companies confidence that their IoT devices can’t be compromised. Xage thinks that the blockchain is the perfect solution to this problem.

Continue reading “Xage secures $12 million Series A for IoT security solution on blockchain” »

Jul 23, 2018

Google: Security Keys Neutralized Employee Phishing

Posted by in category: security

Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.

Read more

Jul 23, 2018

Ytterbium: The quantum memory of tomorrow

Posted by in categories: encryption, internet, quantum physics, security

Quantum communication and cryptography are the future of high-security communication. But many challenges lie ahead before a worldwide quantum network can be set up, including propagating the quantum signal over long distances. One of the major challenges is to create memories with the capacity to store quantum information carried by light. Researchers at the University of Geneva (UNIGE), Switzerland, in partnership with CNRS, France, have discovered a new material in which an element, ytterbium, can store and protect the fragile quantum information even while operating at high frequencies. This makes ytterbium an ideal candidate for future quantum networks, where the aim is to propagate the signal over long distances by acting as repeaters. These results are published in the journal Nature Materials.

Quantum cryptography today uses optical fibre over several hundred kilometres and is marked by its high degree of security: it is impossible to copy or intercept information without making it disappear.

However, the fact that it is impossible to copy the signal also prevents scientists from amplifying it to diffuse it over long distances, as is the case with the Wi-Fi network.

Read more

Jul 20, 2018

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States

Posted by in category: security

Remote-access software and modems on election equipment ‘is the worst decision for security short of leaving ballot boxes on a Moscow street corner.’

Read more

Jul 19, 2018

Barack Obama suggests cash handouts be considered to address workforce challenges

Posted by in categories: economics, robotics/AI, security

But even though money is necessary, it’s not sufficient to provide human beings a sense of satisfaction, Obama cautioned. As more and more tasks and services become automated with the rise of artificial intelligence, “that’s going to make the job of giving everybody work that is meaningful tougher, and we’re going to have to be more imaginative, and the pace of change is going to require us to do more fundamental re-imagining of our social and political arrangements, to protect the economic security and the dignity that comes with a job.”


The former president says “we’re going to have to consider new ways of thinking” as technology threatens current labor markets.

Read more

Jul 16, 2018

Aston Martin

Posted by in categories: law, policy, security, transportation

We may also process your information for legitimate reasons associated with your use or ownership of an Aston Martin car, for reasons concerning information or network security, to defend or pursue legal rights or to meet regulatory requirements. Any information processed for contacts based in the EU will not be transferred outside the EU.

You can update your contact details at any time by emailing [email protected] or change your mind by clicking “unsubscribe” in any email you receive from us.

For further details on how your data is used and stored please refer to our PRIVACY POLICY.

Continue reading “Aston Martin” »

Jul 15, 2018

What if people were paid for their data?

Posted by in categories: economics, finance, health, security

“DATA SLAVERY.” Jennifer Lyn Morone, an American artist, thinks this is the state in which most people now live. To get free online services, she laments, they hand over intimate information to technology firms. “Personal data are much more valuable than you think,” she says. To highlight this sorry state of affairs, Ms Morone has resorted to what she calls “extreme capitalism”: she registered herself as a company in Delaware in an effort to exploit her personal data for financial gain. She created dossiers containing different subsets of data, which she displayed in a London gallery in 2016 and offered for sale, starting at £100 ($135). The entire collection, including her health data and social-security number, can be had for £7,000.

Only a few buyers have taken her up on this offer and she finds “the whole thing really absurd”. Yet if the job of the artist is to anticipate the Zeitgeist, Ms Morone was dead on: this year the world has discovered that something is rotten in the data economy. Since it emerged in March that Cambridge Analytica, a political consultancy, had acquired data on 87m Facebook users in underhand ways, voices calling for a rethink of the handling of online personal data have only grown louder. Even Angela Merkel, Germany’s chancellor, recently called for a price to be put on personal data, asking researchers to come up with solutions.

Read more

Jul 14, 2018

Drug to Treat Smallpox Approved

Posted by in categories: biotech/medical, security

Though the disease was eradicated decades ago, national security experts fear that stocks of the virus in labs could be released as a bioweapon.

Read more

Jul 14, 2018

The Nuclear Reactor Renaissance: Space Exploration and National Security

Posted by in categories: climatology, nuclear energy, security, solar power, space travel, sustainability

The nuclear power sector is seeing a resurgence in innovation, supported by new policies and emerging technologies. The general public and various governments are starting to grasp the value of nuclear power as an alternative, sustainable energy source. Unlike renewables, such as wind and solar power, nuclear energy is not dependent on weather conditions for power generation, having a capacity factor of over 90 percent. Nuclear power is also more eco-friendly than natural gas and coal and its “carbon-free” attributes are seen as critical in the fight against climate change.

For decades, advancements in the nuclear power sector have been incremental and focused largely on making systems “walk away safe.” Today, the industry is pushing the boundaries and exploring applications for nuclear power in ways that have never before been considered.

BWXT is at the forefront of this nuclear renaissance. This 6,000-employee company operates on the model of letting capital drive strategy. BWXT is constantly evaluating new ways to ensure workers, funding, and policies are utilized in the most effective way possible. The company also analyzes the needs of numerous other industries to determine how nuclear power could provide innovative solutions.

Continue reading “The Nuclear Reactor Renaissance: Space Exploration and National Security” »