БЛОГ

Archive for the ‘security’ category: Page 84

Aug 26, 2018

Insecure Medical Devices Are Low-Hanging Fruit for Hackers

Posted by in categories: biotech/medical, economics, health, security

“The big problem is that hospitals don’t buy new devices, and they keep using really dangerous ones ad infinitum — until they just stop working,” Corman said.

Corman wants these old, unsecured devices gone from hospitals. The fear is that, beyond freezing systems or hijacking medical records as they did during WannaCry, hackers could also actively manipulate medical equipment to harm patients by, say, administering a lethal dose of medication via an infusion pump. While newer devices aren’t ironclad, they are typically built with more robust security features. So Corman and others are urging health-care providers to scrap old, or “legacy,” equipment and replace it with newer models.

To nudge health-care providers to trade up, he’s put forth an idea for an incentive program akin to “Cash for Clunkers,” the 2009 federal auto-rebate plan that aimed to run gas-guzzling cars off the road. Under that program, which was formally called the Car Allowance Rebate System, people received cash in exchange for turning in fuel-inefficient vehicles, which they could then put toward new, more efficient ones. (The program fizzled after a few months, when it depleted its allotted budget.) Similarly, in this version, health-care providers would be compensated for junking old equipment, and could use the rebates toward the purchase of new devices. Corman said he hasn’t fully worked out the economics, but he believes device makers might be willing to subsidize the program in part, since it would help them move inventory.

Continue reading “Insecure Medical Devices Are Low-Hanging Fruit for Hackers” »

Aug 16, 2018

Hologram Computers

Posted by in categories: 3D printing, augmented reality, biotech/medical, entertainment, holograms, quantum physics, robotics/AI, science, security, space travel, virtual reality, wearables

Computing innovation, computer-generated images, Virtual Reality Glasses, Hybrid Reality, communications, Holographic platform, AR, VR, PC, lifelike experience, 3D cameras, cosmic computing, computer security, gaming displays, in-flight entertainment, computer code, Holographic ideal/paradigm, gaming mechanics, automotive, medical, space, spatial, holographic memory, Artificial Neural Networks, Robotics, holographic 3D, software company, mixed-realty, holographic data, hologram monitors, hologram keyboards, voice equipment, projector system, Holographic apps, HD photography, smartphones, tablets, TVs, laptops, digital displays, 360 Video, Virtual Realty Headsets, Mobile Platforms, holographic universe, ubiquitous computing paradigm, virtual images, Holoquad, Holographic Projector Pyramid, cloud computing, spaceships, teleportation, anti-gravity devices, emulation, advanced technology, light field displays, Mobile Hologram Technology, computer programs, untethered, Immersive Technology, Computer Chips, Elohim computer, custom software, mobile application development, computing library, human-computer interactions, Artificial Neural Networks, holographic memory, Spider-Robots, pop-up gaming displays, automate machinery, computer-generated simulation, 3D Pyramid, consumer electronics, personal computers, holographic images, real-world objects, hardware interconnection, missionary, virtual assistant, Computer Systems Structure, two-dimensional computer display, computerization, Projection Screen, Portable, 3D printer, Hologram goggles, 3D Holographic Projection Technology, Hologram Computer Table, hologram generator, multilevel computer, mixed reality, Bluetooth enabled, Virtual Reality Display, transparent screen display, quantum computer, computer animation, 3D plasma display, meta surface, Dark Energy, holographic interferograms, photorefractive, Holographic atomic memory, computer-generated hologram, real-time hologram, x-ray mirror mandrels, virtual wavefront recording plane, Artificial intelligence, AI, Human Resources, Advertising, Animation, Graphic Web Design, Photography, Robotics, computer science, human-robot interaction, Emergency Medical Hologram, wearable computing, bio-computing, battlefield simulations, Holographic Associative Memory, artificial neural network, Digital Avatar.

Read more

Aug 7, 2018

NEC unveils facial recognition system for 2020 Tokyo Olympics

Posted by in categories: entertainment, privacy, robotics/AI, security

NEC has announced that it will be providing a large-scale facial recognition system for the 2020 Summer Olympic and Paralympic Games in Tokyo. The system will be used to identify over 300,000 people at the Games, including athletes, volunteers, media, and other staff. It’s the first time that facial recognition technology will ever be used for this purpose at an Olympic Games.

NEC’s system is built around an AI engine called NeoFace, which is part of the company’s overarching Bio-IDiom line of biometric authentication technology. The Tokyo 2020 implementation will involve linking photo data with an IC card to be carried by accredited people. NEC says that it has the world’s leading face recognition tech based on benchmark tests from the US’ National Institute of Standards and Technology.

Read more

Aug 3, 2018

Why the world should adopt a basic income

Posted by in categories: economics, employment, law, robotics/AI, security

A BASIC income (BI) is defined as a modest, regular payment to every legal resident in the community, paid unconditionally as a right, regardless of income, employment or relationship status.

Contrary to conventional wisdom, the case for BI does not rest on the assumption that robots and artificial intelligence will cause mass unemployment or that it would be a more efficient way of relieving poverty than present welfare systems (although it would). The main arguments are ethical and relate to social justice, individual freedom and the need for basic security.

Read more

Jul 26, 2018

Segway’s autonomous security robots fight crime

Posted by in categories: robotics/AI, security, transportation

Segway is using robots to fight crime 🤖👮😮.

Read more

Jul 26, 2018

Google wants you to use its new physical keys to secure your account

Posted by in categories: mobile phones, security

You should already be using two-factor authentication to prevent unauthorized access to your online accounts. While your phone is up to the task of helping you with that, Google believes it’s time for to take the next step: using a physical security key.

At its ongoing Google Cloud Next event, the company announced that it’s launched the Titan Security Key, which lets you log in to your account on your desktop by authenticating your identity with over USB or Bluetooth.

Check out TNW’s Hard Fork.

Continue reading “Google wants you to use its new physical keys to secure your account” »

Jul 24, 2018

Google Employees’ Secret to Never Getting Phished Is Using Physical Security Keys

Posted by in categories: policy, security

If you’ve been hacked in recent years, odds are you fell for that perfectly crafted phishing message in your email. Even the most mindful individuals can slip up, but Google’s employees have reportedly had a flawless security record for more than a year thanks to a recent policy requiring them to use physical security keys.

Krebs on Security reports that in early 2017, Google started requiring its 85,000 employees to use a security key device to handle two-factor authentication when logging into their various accounts. Rather than just having a single password, or receiving a secondary access code via text message (or an app such as Google Authenticator), the employees had to use a traditional password as well as plug in a device that only they possessed. The results were stellar. From the report:

A Google spokesperson said Security Keys now form the basis of all account access at Google.

Continue reading “Google Employees’ Secret to Never Getting Phished Is Using Physical Security Keys” »

Jul 23, 2018

The Digital Poorhouse

Posted by in categories: biotech/medical, economics, information science, robotics/AI, security

About the future death of explainability to understand AI thinking, the writing is on the wall…


These divergent approaches, one regulatory, the other deregulatory, follow the same pattern as antitrust enforcement, which faded in Washington and began flourishing in Brussels during the George W. Bush administration. But there is a convincing case that when it comes to overseeing the use and abuse of algorithms, neither the European nor the American approach has much to offer. Automated decision-making has revolutionized many sectors of the economy and it brings real gains to society. It also threatens privacy, autonomy, democratic practice, and ideals of social equality in ways we are only beginning to appreciate.

At the simplest level, an algorithm is a sequence of steps for solving a problem. The instructions for using a coffeemaker are an algorithm for converting inputs (grounds, filter, water) into an output (coffee). When people say they’re worried about the power of algorithms, however, they’re talking about the application of sophisticated, often opaque, software programs to enormous data sets. These programs employ advanced statistical methods and machine-learning techniques to pick out patterns and correlations, which they use to make predictions. The most advanced among them, including a subclass of machine-learning algorithms called “deep neural networks,” can infer complex, nonlinear relationships that they weren’t specifically programmed to find.

Continue reading “The Digital Poorhouse” »

Jul 23, 2018

Xage secures $12 million Series A for IoT security solution on blockchain

Posted by in categories: bitcoin, internet, security

Xage (pronounced Zage), a blockchain security startup based in Silicon Valley, announced a $12 million Series A investment today led by March Capital Partners. GE Ventures, City Light Capital and NexStar Partners also participated.

The company emerged from stealth in December with a novel idea to secure the myriad of devices in the industrial internet of things on the blockchain. Here’s how I described it in a December 2017 story:

Xage is building a security fabric for IoT, which takes blockchain and synthesizes it with other capabilities to create a secure environment for devices to operate. If the blockchain is at its core a trust mechanism, then it can give companies confidence that their IoT devices can’t be compromised. Xage thinks that the blockchain is the perfect solution to this problem.

Continue reading “Xage secures $12 million Series A for IoT security solution on blockchain” »

Jul 23, 2018

Google: Security Keys Neutralized Employee Phishing

Posted by in category: security

Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.

Read more

Page 84 of 128First8182838485868788Last