Skip to main content

Home/ Digit_al Society/ Group items tagged Security

Rss Feed Group items tagged

dr tech

Gun Detection AI is Being Trained With Homemade 'Active Shooter' Videos - 0 views

  •  
    "The point of creating this vast portfolio of digital gun art is to feed an algorithm made to detect a firearm as soon as a security camera catches it being drawn by synthetically creating tens of thousands of ways each gun may appear. Arcarithm is one of several companies developing automated active shooter detection technology in the hopes of selling it to schools, hotels, entertainment venues and the owners of any location that could be the site of one of America's 15,000 annual gun murders and 29,000 gun injuries."
dr tech

Goodreads must be destroyed / Boing Boing - 0 views

  •  
    "Goodreads stagnates even as its near-monopoly persists, a wedding of the worst excesses of online commenting, fiction fandom and tech-biz social engineering. The lies, the insecure hatereaders, the impassive tolerance of toxic behavior-all are brought to bear, without mercy, on authors at the precarious margins of career security. And after all that, it's all but useless as a discovery service. At The New Stateman, Sarah Manavis hopes that its "reign of terror" will soon come to an end."
dr tech

TikTok sale: Trump approves Microsoft's plan but says US should get a cut of any deal |... - 0 views

  •  
    "On Monday China's foreign ministry said it strongly opposed any US actions against Chinese software companies, and it hoped the US could stop its "discriminatory policies". Pompeo told Fox that countless Chinese software companies were "feeding data directly to the Chinese Communist party, their national security apparatus". "Could be their facial recognition patterns. It could be information about their residence, their phone numbers, their friends, who they're connected to. Those are the issues that President Trump has made clear we're going to take care of," he said."
dr tech

Encryption Lava Lamps - San Francisco, California - Atlas Obscura - 1 views

  •  
    "As the lava lamps bubble and swirl, a video camera on the ceiling monitors their unpredictable changes and connects the footage to a computer, which converts the randomness into a virtually unhackable code.  Why use lava lamps for encryption instead of computer-generated code? Since computer codes are created by machines with relatively predictable patterns, it is entirely possible for hackers to guess their algorithms, posing a security risk. Lava lamps, on the other hand, add to the equation the sheer randomness of the physical world, making it nearly impossible for hackers to break through."
circuititgs

Surveillance company harassed female employees using its own facial recognition technol... - 0 views

  •  
    "A surveillance startup in Silicon Valley is being accused of sexism and discrimination after a sales director used the company's facial recognition system to harass female workers. Verkada, which was valued in January at $1.6 billion, equips its office with its own security cameras. "
dr tech

Android Users Need to Manually Remove These 16 Infected Apps - 0 views

  •  
    "The Joker malware circumvents the Google Play app vetting process through a combination of code tweaks, execution method variation, and changes to how it downloads the payload allowing it to function, steal information, and trigger the WAP service sign-ups. Google has removed the 16 infected apps from the Play Store and disabled them on devices where they are installed, thought to be in the region of 120,000 devices. "
yeehaw

Mission Impossible PRINTER prints documents that combust 60 seconds after being read | ... - 0 views

  •  
    "'I don't think the security agencies will be using this technology any time soon. 'They're more interested in encryption for digital files.  'There isn't much need for the destruction of hard-copy documents any more.'"
dr tech

Sci-fi surveillance: Europe's secretive push into biometric technology | World news | T... - 0 views

  •  
    ""Often the problem is that the topic itself is unethical," said Gemma Galdon Clavell, an independent tech ethicist who has evaluated many Horizon 2020 security research projects and worked as a partner on more than a dozen. "Some topics encourage partners to develop biometric tech that can work from afar, and so consent is not possible - this is what concerns me." One project aiming to develop such technology refers to it as "unobtrusive person identification" that can be used on people as they cross borders. ¨If we're talking about developing technology that people don't know is being used," said Galdon Clavell, "how can you make that ethical?" "
jhendoooo

Biometric data collection for Digital ID of all Bhutanese to commence from January next... - 0 views

  •  
    "Digital Identity (ID) is one of the main results focused under the main Digital Drukyul Flagship Program of Nu 2.557 bn as the fund also covers results such as Institutionalizing e-Patient Information System, creating Digital Schools, Integrating e-business services (business licensing and Single window for trade), Land records, tax information etc. Citing some examples of what benefits people can expect with the completion of the Digital ID Lobzang Jamtsho, Chief ICT Officer, Application Development Division, Department of Technology and Telecom (DITT) under Ministry of Information and Communication (MoIC) said stated, "Currently the online processes are hybrid in nature, where although we communicate or negotiate online, people still need to be physically present to sign a contract or make online transactions." He said that with the use of Digital ID, one can have bank transactions or even sign up contracts remotely to state a few components that the program encapsulates. The paper found that the biggest advantage of the Digital ID of the person is that all the information of the person will be stored and based around the Digital ID of the person. This could be health records, land records, tax records, revenue and bank records, business records, education records, census records etc. The person can use his digital ID to access all this information and also use his ID to complete online procedures to avail services. To protect the privacy of the person access to the information will be compartmentalized and restricted so some tax officials for example cannot access the health records of a person. A key component of digital ID is collecting the biometric details of people like eyes and all finger prints for verification and security."
neoooo

Mapped: The State of Facial Recognition Around the World - 1 views

  •  
    "North America, Central America, and Caribbean In the U.S., a 2016 study showed that already half of American adults were captured in some kind of facial recognition network. More recently, the Department of Homeland Security unveiled its "Biometric Exit" plan, which aims to use facial recognition technology on nearly all air travel passengers by 2023, to identify compliance with visa status."
dr tech

'Conditioning an entire society': the rise of biometric data technology | Biometrics | ... - 0 views

  •  
    "In each case, biometric data has been harnessed to try to save time and money. But the growing use of our bodies to unlock areas of the public and private sphere has raised questions about everything from privacy to data security and racial bias."
dr tech

The US has suffered a massive cyberbreach. It's hard to overstate how bad it is | Techn... - 1 views

  •  
    "This is called a supply-chain attack, because it targets a supplier to an organization rather than an organization itself - and can affect all of a supplier's customers. It's an increasingly common way to attack networks. Other examples of this sort of attack include fake apps in the Google Play store, and hacked replacement screens for your smartphone."
dr tech

China plans control of tech that US can only dream of, Government & Economy - THE BUSIN... - 0 views

  •  
    "The Cyberspace Administration of China (CAC) unveiled a 30-point draft proposal for "algorithm recommendation management regulations" that would directly affect companies including ByteDance, Tencent Holdings and Kuaishou Technology. The rules would forbid practices that "encourage addiction or high consumption", as well as any activities that endanger national security or disrupt social and economic order."
melodyyy

Facial recognition to replace passport checkup at Thailand's most crowded airports | Bi... - 0 views

  • Thailand’s Transport Ministry wants to roll out its biometric-enabled smart airport initiative across five top airports to improve passenger experience, reduce waiting times, and boost airport security
  • “Currently, travelers may be required to show their ID cards or passports up to three times in one trip through an airport,”
  • “They can have their faces scanned just once at check-in counters and then board a plane without the need to show their ID cards, passports or boarding passes.”
dr tech

Egypt detains artist robot Ai-Da before historic pyramid show | Egypt | The Guardian - 0 views

  •  
    "But because of "security issues" that may include concerns that she is part of a wider espionage plot, both Ai-Da and her sculpture were held in Egyptian customs for 10 days before being released on Wednesday, sparking a diplomatic fracas."
dr tech

New IoT botnet launches stealthy DDoS attacks, spreads malware - 1 views

  •  
    "A new botnet is actively targeting IoT devices using payloads compiled for a dozen CPU architectures and uses them to launch several types of DDoS and to spread various types of malware. The Dark Nexus botnet as it was named by the Bitdefender researchers who discovered it has gone through a very fast development process since it was initially spotted."
dr tech

AI bot ChatGPT stuns academics with essay-writing skills and usability | Technology | T... - 0 views

  •  
    "Dan Gillmor, a journalism professor at Arizona State University, asked the AI to handle one of the assignments he gives his students: writing a letter to a relative giving advice regarding online security and privacy. "If you're unsure about the legitimacy of a website or email, you can do a quick search to see if others have reported it as being a scam," the AI advised in part. "I would have given this a good grade," Gillmor said. "Academia has some very serious issues to confront.""
dr tech

Amazon and the Rise of 'Luxury Surveillance' - The Atlantic - 0 views

  •  
    "It would be a bit glib-and more than a little clichéd-to call this some kind of technological dystopia. Actually, dystopia wouldn't be right, exactly: Dystopian fiction is generally speculative, whereas all of these items and services are real. At the end of September, Amazon announced a suite of tech products in its move toward "ambient intelligence," which Amazon's hardware chief, Dave Limp, described as technology and devices that slip into the background but are "always there," collecting information and taking action against it. This intense devotion to tracking and quantifying all aspects of our waking and non-waking hours is nothing new-see the Apple Watch, the Fitbit, social media writ large, and the smartphone in your pocket-but Amazon has been unusually explicit about its plans. The Everything Store is becoming an Everything Tracker, collecting and leveraging large amounts of personal data related to entertainment, fitness, health, and, it claims, security. It's surveillance that millions of customers are opting in to."
dr tech

'The future is bleak': how AI concerns are shaping graduate career choices | Graduate c... - 0 views

  •  
    "Carolan, who is 18 and has just completed an art foundation course in Cardiff, decided architecture would be a safer path to follow. "It feels like it will be a more secure degree. Lots of psychology goes into architecture," he says. "You need to understand the core of what you're doing." He is doubtful that images made by artificial intelligence will replace the art exhibited in galleries, but he worries that commercial projects previously requiring a team of artists may in the future need only one to work with AI and neaten up the final product. "The options will probably get limited as time goes on. Personally, I'd find it a bit depressing if there wasn't a human element, but whether or not we'd notice I'm not sure. I always thought things like art would be one of the last things robots would be able to do.""
dr tech

CERT-In rules: Data privacy and security not mutually exclusive - 0 views

  •  
    "As the significant number of cybersecurity incidents and data breaches have shown, there is no question that we urgently need concerted action and clear policy at the government level. However, recognising that privacy and cybersecurity can be mutually reinforcing is key. "
« First ‹ Previous 201 - 220 of 748 Next › Last »
Showing 20 items per page