Menu

Blog

Archive for the ‘privacy’ category: Page 18

Mar 6, 2018

The increasing use of artificial intelligence is stoking privacy concerns in China

Posted by in categories: economics, privacy, robotics/AI

State broadcaster China Central Television (CCTV) and Tencent Research surveyed 8.000 respondents on their attitudes toward AI as part of CCTV’s China Economic Life Survey. The results show that 76.3 per cent see certain forms of AI as a threat to their privacy, even as they believe that AI holds much development potential and will permeate different industries. About half of the respondents said that they believe AI is already affecting their work life, while about a third see AI as a threat to their jobs.


A China Central Television and Tencent Research survey found that three in four respondents are worried about the threat that artificial intelligence poses to their privacy.

Read more

Feb 17, 2018

Worldwide AI consciousness may replace human speech

Posted by in categories: privacy, robotics/AI

In just 32 years, humans won’t speak to each other and will instead communicate through a worldwide consciousness instead – using just our brains — new research shows.

According to artificial intelligence research, this “hybrid intelligence” will understand the feelings of the people connected to it, and use their minds to help it grow.

Called HIBA, which stands for Hybrid Intelligence Biometric Avatar, it will take on the personas of its users, exchange information with them and become part of the very fabric of the human brain.

Continue reading “Worldwide AI consciousness may replace human speech” »

Feb 17, 2018

Japanese researchers develop ultrathin, highly elastic skin display

Posted by in categories: biotech/medical, health, mobile phones, privacy, wearables

A new ultrathin elastic display that fits snugly on the skin can show the moving waveform of an electrocardiogram recorded by a breathable, on-skin electrode sensor. Combined with a wireless communication module, this integrated biomedical sensor system, called “skin electronics,” can transmit biometric data to the cloud.

This latest research by a Japanese academic-industrial collaboration, led by Professor Takao Someya at the University of Tokyo’s Graduate School of Engineering, is slated for a news briefing and talk at the AAAS Annual Meeting in Austin, Texas on February 17th.

Thanks to advances in semiconductor technology, wearable devices can now monitor health by measuring vital signs or taking an electrocardiogram, and then transmitting the data wirelessly to a smartphone. The readings or electrocardiogram waveforms can be displayed on the screen in real time, or sent to the cloud or a memory device where the information is stored.

Continue reading “Japanese researchers develop ultrathin, highly elastic skin display” »

Jan 28, 2018

How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI

Posted by in categories: cybercrime/malcode, military, privacy, robotics/AI

A look at Lt. Gen. Paul Nakasone’s public statements about artificial intelligence, offense, and defense.

The Army general likely to be tapped to head U.S. Cyber Command and the NSA has some big plans for deploying cyber forces and using artificial intelligence in information attacks.

Lt. Gen. Paul Nakasone, who currently leads U.S. Army Cyber Command, is expected to nominated in the next few months to replace Adm. Michael Rogers, as first reported by The Cipher Brief (and confirmed by the Washington Post and a Pentagon source of our own). But caution is in order: the rumor mill says several other contenders are in the running, including Army Lt. Gen. William Mayville. Neither Cyber Command nor the Pentagon would comment about the potential nomination.

Continue reading “How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI” »

Jan 12, 2018

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

Posted by in categories: encryption, military, privacy

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Here are few of the key areas:

Continue reading “The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators” »

Dec 10, 2017

The WIRED Guide to Digital Security

Posted by in categories: cybercrime/malcode, mobile phones, privacy

IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.


In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Read more

Nov 20, 2017

Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them

Posted by in category: privacy

He said, she said.

Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them.

Moscow-based AV provider challenges claims it helped Russian spies.

Continue reading “Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them” »

Nov 12, 2017

Life without cash

Posted by in categories: innovation, privacy

As digital innovations continue to transform the way we live, a lot of things we once took for granted are falling by the wayside. Paper money and coins could soon be among them.

The use of digital payments in all forms is fast becoming commonplace. A cashless society, once considered remote if not unimaginable, is now more imminent, with staggering amounts of transactions being digitally processed daily. In Nordic countries, especially Sweden and Denmark, the majority of all transactions are now made through electronic or digital means.

Governments around the world are working to prepare their citizens to fully benefit from a digital future. India, for example, has hundreds of millions of people in the database of its Aadhaar biometric identity and payment system. But the country’s Supreme Court recently ruled that the system could compromise citizens’ fundamental right to privacy, underscoring one of the key concerns about the new digital era.

Read more

Oct 12, 2017

Israel hacked Kaspersky, then tipped the NSA that its tools had been breached

Posted by in categories: cybercrime/malcode, government, privacy

Israel notified the NSA, where alarmed officials immediately began a hunt for the breach, according to people familiar with the matter, who said an investigation by the agency revealed that the tools were in the possession of the Russian government.

Israeli spies had found the hacking material on the network of Kaspersky Lab, the global anti-virus firm under a spotlight in the United States because of suspicions that its products facilitate Russian espionage.

Last month, the Department of Homeland Security instructed federal civilian agencies to identify Kaspersky Lab software on their networks and remove it on the grounds that “the risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. national security.” The directive followed a decision by the General Services Administration to remove Kaspersky from its list of approved vendors. And lawmakers on Capitol Hill are considering a governmentwide ban.

Continue reading “Israel hacked Kaspersky, then tipped the NSA that its tools had been breached” »

Oct 7, 2017

Using Behavioral Biometrics for Wearable Glasses

Posted by in categories: privacy, security, wearables

Through behavioral biometrics, a wearable glasses continuous authentication system improves privacy protection by detecting imposters through voice & touch.

Read more

Page 18 of 30First1516171819202122Last