Toggle light / dark theme

In the future, industrial robots may create jobs, boost productivity and spur higher wages. But one thing seems more certain for now: They’re vulnerable to hackers.

Factories, hospitals and other big robot users often lack sufficient levels of defense against a digital attack, according to cybersecurity experts, robot manufacturers and engineering researchers. The risk levels are rising as more robots morph from being offline and isolated to being internet-connected machines, often working alongside humans.


5G promises to make factories a lot smarter. And that means they’ll be a lot more vulnerable.

Read more

Blockchain shows major potential to drive positive change across a wide range of industries. Like any disruptive technology, there are ethical considerations that must be identified, discussed, and mitigated as we adopt and apply this technology, so that we can maximize the positive benefits, and minimize the negative side effects.

Own Your Data

For decades we have sought the ability for data subjects to own and control their data. Sadly, with massive proliferation of centralized database silos and the sensitive personal information they contain, we have fallen far short of data subjects having access to, let alone owning or controlling their data. Blockchain has the potential to enable data subjects to access their data, review and amend it, see reports of who else has accessed it, give consent or opt-in / opt-out of data sharing, and even request they be forgotten and their information be deleted.

Monetize Your Data

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1” is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique passwords exposed.

The breach was first reported by Troy Hunt, the security researcher who runs the site Have I Been Pwned (HIBP), where you can check if your email has been compromised in a data breach. In his blog, Hunt says a large file of 12,000 separate files and 87GB of data had been uploaded to MEGA, a popular cloud service. The data was then posted to a popular hacking forum and appears to be an amalgamation of over 2,000 databases. The troubling thing is the databases contain “dehashed” passwords, which means the methods used to scramble those passwords into unreadable strings has been cracked, fully exposing the passwords.

Read more

#MachineLearning and #ArtificialIntelligence are revolutionising the online world. They are capable of reducing costs, analysing data, recognising patterns and trends we can’t see with the human eye and making real- time decisions. Now, they are being used to help prevent financial fraud and they’re learning how to do it better every day.


Machine learning and artificial intelligence are revolutionising the online world. They are capable of reducing costs, analysing data, recognising patterns and trends we can’t see with the human eye and making real-time decisions. Now, they are being used to help prevent financial fraud and they’re learning how to do it better every day.

Currently it is estimated that cybercrime costs the global economy approximately $600 billion, with one of the most common forms being credit card fraud which has grown considerably with the increase in the online market. As more and more people chose to transact online it is becoming increasingly important for financial services to invest in better, faster and more accurate fraud detection and prevention techniques.

How our data helps protect us

Thanks to there being such a large amount of online transactions, this means that there is a huge amount of customer data available which can be studied and learnt by AI. They can learn how to identify valid credit card behavioural patterns and how to detect irregular behaviour which could be fraudulent.

Read more

Cyberconflicts are, right now, at this very moment, like the first military aeroplanes of 1909. Within decades, planes destroyed entire cities. So when we talk about cyber weapons, we’re still basically in 1909.


Despite the devastation cyberweapons have caused around the world over the last decade, they are still in their infancy. David E. Sanger, a New York Times national security correspondent, explains why the threat is growing.

Subscribe: http://bit.ly/U8Ys7n
More from The New York Times Video: http://nytimes.com/video

Whether it’s reporting on conflicts abroad and political divisions at home, or covering the latest style trends and scientific developments, New York Times video journalists provide a revealing and unforgettable view of the world. It’s all the news that’s fit to watch.

Read more

Just like last year, this year’s 60 predictions reveal the state-of-mind of key participants in the cybersecurity industry (on the defense team, of course) and cover all that’s hot today. Topics include the use and misuse of data; artificial intelligence (AI) and machine learning as a double-edge sword helping both attackers and defenders; whether we are going to finally “get over privacy” or see our data finally being treated as a private and protected asset; how the cloud changes everything and how connected and moving devices add numerous security risks; the emerging global cyber war conducted by terrorists, criminals, and countries; and the changing skills and landscape of cybersecurity.

Read more

https://paper.li/e-1437691924#/


A team of researchers from Austria, Italy and Sweden has successfully demonstrated teleportation using on-demand photons from quantum dots. In their paper published in the journal Science Advances, the group explains how they accomplished this feat and how it applies to future quantum communications networks.

Scientists and many others are very interested in developing truly —it is believed that such networks will be safe from hacking or eavesdropping due to their very nature. But, as the researchers with this new effort point out, there are still some problems standing in the way. One of these is the difficulty in amplifying signals. One way to get around this problem, they note, is to generate photons on-demand as part of a quantum repeater—this helps to effectively handle the high clock rates. In this new effort, they have done just that, using semiconductor .

Prior work surrounding the possibility of using has shown that it is a feasible way to demonstrate teleportation, but only under certain conditions, none of which allowed for on-demand applications. Because of that, they have not been considered a push-button technology. In this new effort, the researchers overcame this problem by creating quantum dots that were highly symmetrical using an etching method to create the hole pairs in which the quantum dots develop. The process they used was called a XX (biexciton)–X (exciton) cascade. They then employed a dual-pulsed excitation scheme to populate the desired XX state (after two pairs shed photons, they retained their entanglement). Doing so allowed for the production of on-demand single photons suitable for use in teleportation. The dual pulsed excitation scheme was critical to the process, the team notes, because it minimized re-excitation.

Read more

“We’re sorry this happened,” Facebook said in a statement after disclosing yet another privacy failing.


Facebook said on Friday in a developer-focused blog post that it had discovered a nasty bug in its photo software.

The bug allowed authorized app programmers to access photos that people had uploaded to Facebook but not publicly shared, as well as those posted on Facebook’s Marketplace software or Facebook Stories, the post said.

There are several cases in which someone might have uploaded a photo but didn’t share it, Facebook explained.

Read more