The Surgeon Who Wants to Connect You to the Internet with a Brain Implant | MIT Technol... - 0 views
-
"But Leuthardt, for one, expects he will live to see it. "At the pace at which technology changes, it's not inconceivable to think that in a 20-year time frame everything in a cell phone could be put into a grain of rice," he says. "That could be put into your head in a minimally invasive way, and would be able to perform the computations necessary to be a really effective brain-computer interface.""
The Fresh Smell of ransomed coffee - Avast Threat Labs - 0 views
-
"Let's say you have an IoT device that is well protected with functions that can be accessed through a well-defined API; even if you can control the device through the API, you probably can't do too much harm. Firmware, the programming inside the device has logical constraints that don't allow you, for example, to close garage doors while someone is in the way of them or overheat a device so that it combusts. We used to trust that hardware, such as a common kitchen appliance, could be trusted and could not be easily altered without physically dismounting the device. But with today's "smart" appliances, this is no longer the case."
Facebook 'SilentFade' Malware Attack Stole Credentials For Years | Threatpost - 0 views
-
"Dubbed SilentFade (short for "Silently running Facebook Ads with Exploits"), the malware compromised Facebook accounts and used them to promote malicious ads, steal browser cookies and more. The social-media giant said that the Chinese malware campaign started in 2016, but it was first discovered in December 2018, due to a suspicious traffic spike across a number of Facebook endpoints. After an extensive investigation, Facebook shut down the campaign and pursued legal action against the cybercriminals behind the attack in December 2019. "
2 hospital data breaches on Monday exposed patient data | Thaiger - 0 views
-
"Two prominent hospitals were the victims of data breaching hackers in the last few days with each hospital having over 40,000 patients' personal information at risk. On Monday, Phetchabun Hospital had the personal data of 46,000 of their patients compromised while Bhumirajanagarindra Kidney Institute Hospital had the data from 40,000 patients stolen in parallel attacks."
The great data robbery - 0 views
-
"A major data breach at Phetchabun Hospital last week served as a loud wake-up call to state and private organisations to pay attention to their cybersecurity measures, as experts warned cybercrimes could become more commonplace in the years to come. The breach involved the data of 10,095 patients, including their names and dates of admission and discharge."
Amazon's Ring is the largest civilian surveillance network the US has ever seen | Laure... - 1 views
-
"Ring is effectively building the largest corporate-owned, civilian-installed surveillance network that the US has ever seen. An estimated 400,000 Ring devices were sold in December 2019 alone, and that was before the across-the-board boom in online retail sales during the pandemic. Amazon is cagey about how many Ring cameras are active at any one point in time, but estimates drawn from Amazon's sales data place yearly sales in the hundreds of millions. The always-on video surveillance network extends even further when you consider the millions of users on Ring's affiliated crime reporting app, Neighbors, which allows people to upload content from Ring and non-Ring devices."
The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 1 views
-
"The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
-
"Increasing numbers of implantable medical devices are now gaining internet connectivity, giving doctors the ability to monitor patients health remotely, and even update the devices to tweak a treatment plan. Unfortunately, that flexibility offers a way for hackers to hijack that hardware, and even potentially make changes to the way the devices work. While so far no attacks have been successful, proof-of-concept attacks have been available for years"
Japan firms to jointly develop facial recognition payment system - 0 views
-
Four Japanese firms will jointly develop a payment system using facial recognition technology that will allow customers to make deposits and withdrawals at banks and shop at stores without presenting anything if they register their facial images in advance.
-
While the registration of facial images would require the consent of customers, many people may hesitate to provide their image data due to privacy concerns. How to ensure the security of the planned system will be key to its widespread use. The four companies plan to develop a system under which facial image data will be stored on a server that cannot be accessed from the outside. Resona will manage the system.
Costco finds five card skimmers at four Chicago-area warehouses, warns customers of pot... - 0 views
-
"Costco customers at four of the retailer's Chicago-area warehouses may have had their payment information compromised after employees discovered five card-skimming devices during routine PIN pad inspections at the end of August. "We promptly removed the skimmers, notified law enforcement, and engaged a forensics firm to analyze the devices," A Costco spokesperson told FOX Business in a statement. "It appears that these skimmers had the ability to capture information on the magnetic stripe of a payment card, including name, card number, expiration date, and CVV.""
Why you and I will pay the price for the next big cybersecurity crisis | John Naughton ... - 0 views
-
"Virtually every company and organisation now has - indeed has to have - an online presence. But many still take only rudimentary cybersecurity precautions and are sitting ducks for hackers. For most of companies, that's a matter for them and their boards of directors - it's their lookout if a ransomware attack makes them insolvent."
Will blockchain fulfil its democratic promise or will it become a tool of big tech? | J... - 0 views
-
"The problem with digital technology is that, for engineers, it is both intrinsically fascinating and seductively challenging, which means that they acquire a kind of tunnel vision: they are so focused on finding solutions to the technical problems that they are blinded to the wider context. At the moment, for example, the consensus-establishing processes for verifying blockchain transactions requires intensive computation, with a correspondingly heavy carbon footprint. Reducing that poses intriguing technical challenges, but focusing on them means that the engineering community isn't thinking about the governance issues raised by the technology. There may not be any central authority in a blockchain but, as Vili Lehdonvirta pointed out years ago, there are rules for what constitutes a consensus and, therefore, a question about who exactly sets those rules. The engineers? The owners of the biggest supercomputers on the chain? Goldman Sachs? These are ultimately political questions, not technical ones."
Recently uncovered software flaw 'most critical vulnerability of the last decade' | Sof... - 0 views
-
"The flaw, dubbed "Log4Shell", may be the worst computer vulnerability discovered in years. It was uncovered in an open-source logging tool that is ubiquitous in cloud servers and enterprise software used across the industry and the government. Unless it is fixed, it grants criminals, spies and programming novices alike, easy access to internal networks where they can loot valuable data, plant malware, erase crucial information and much more."
More on Roblox's exploitation of children | Boing Boing - 0 views
-
"Why? Because it has an internal app store that puts its young player base to work making virtual stuff and selling it for scrip or peanuts while the company pockets the profits. It even promotes the far-right personalities and groups using it to recruit. It is a ruthless money machine that embodies the perverse incentives of social media, aimed directly at children and operated by amoral reptiles."
Can anyone avoid CCTV surveillance? We ask an expert | Social trends | The Guardian - 0 views
-
"You're nailing the problem: the tech sales people and the politicians are all on the same drug, which is "This tech is perfect", because it's cheaper than more police. There's a lawsuit in the US because a black man was wrongly arrested based on facial recognition. Tech companies need to be held to account. One company we focused on, Clearview AI, scraped social networks - collected images of people's faces and data from publicly available information - to create its software. Facial recognition relies on artificial intelligence. It needs to study faces. And only the government - the DVLA etc - and social networking companies have access to a lot of faces."
Cracking apps: are crimefighters going too far to bring down cartels? | Organised crime... - 0 views
-
"The Italian supreme court ordered prosecutors last month to disclose how the Sky ECC data had been retrieved, arguing that it was impossible to have a fair trial if the accused is unable to access the evidence or assess its reliability and legality, a position supposed by the NGO Fair Trials. Whether prosecutors choose to do so could determine whether the arrests made this week lead to convictions or not. Prosecutors in the UK face a similar dilemma in relation to the hacking of EncroChat, another secret messaging platform that had the added facility of a "panic" button that when pressed would immediately erase the phone's contents."
Overstay crackdown uses facial recognition tech | Thaiger - 0 views
-
"And some provinces are using some creepy Big Brother technology to do it. In Surat Thani, the province that contains the tourism hotspot islands of Koh Samui, Koh Phangan, and Koh Tao, the immigration office is employing new technology. Officers have equipped Smart Patrol Cars that is using advanced facial recognition to check foreigners quickly. Immigration officers are patrolling in WiFi-enabled cars, usually a BMW, to crack down on foreigners who have overstayed."
« First
‹ Previous
701 - 720 of 748
Next ›
Last »
Showing 20▼ items per page