Toggle light / dark theme

Ransomware attacks in 2022 impacted more than 200 hundred larger organizations in the U.S. public sector in the government, educational, and healthcare verticals.

Data collected from publicly available reports, disclosure statements, leaks on the dark web, and third-party intelligence show that hackers stole data in about half of these ransomware attacks.

The size of an economy is measured by GDP (Gross Domestic Product). GDP is calculated by adding up the value of all goods and services produced within a country’s borders in a given year. This includes the value of goods and services produced by both the government and the private sector. GDP is typically measured in monetary terms, using current market prices for goods and services. GDP is used as a measure of the size and strength of an economy, as well as its overall level of economic activity. It is often used to compare the economies of different countries and to track economic growth over time.

Full Story:


One of the factors limiting the GDP is the number of skilled workers. Can AI usher in an era where that factor is no longer the limitation? This article explores how AI has the potential to increase the GDP and eventually lead to a limitless economy.

The U.K.’s desire to expand nuclear energy as greener power has gone beyond its November acquisition of China’s nuclear power plant and a 50 percent share in the company planning the megaproject on England’s east coast.

The government is also looking for proposals from teams in the construction and development sectors for small modular nuclear reactor (SMR) technologies, according to a report published by Engineering News-Record on Friday.

One afternoon in the fall of 2019, in a grand old office building near the Arc de Triomphe, I was buzzed through an unmarked door into a showroom for the future of surveillance. The space on the other side was dark and sleek, with a look somewhere between an Apple Store and a doomsday bunker. Along one wall, a grid of electronic devices glinted in the moody downlighting—automated license plate readers, Wi-Fi-enabled locks, boxy data processing units. I was here to meet Giovanni Gaccione, who runs the public safety division of a security technology company called Genetec. Headquartered in Montreal, the firm operates four of these “Experience Centers” around the world, where it peddles intelligence products to government officials. Genetec’s main sell here was software, and Gaccione had agreed to show me how it worked.

He led me first to a large monitor running a demo version of Citigraf, his division’s flagship product. The screen displayed a map of the East Side of Chicago. Around the edges were thumbnail-size video streams from neighborhood CCTV cameras. In one feed, a woman appeared to be unloading luggage from a car to the sidewalk. An alert popped up above her head: “ILLEGAL PARKING.” The map itself was scattered with color-coded icons—a house on fire, a gun, a pair of wrestling stick figures—each of which, Gaccione explained, corresponded to an unfolding emergency. He selected the stick figures, which denoted an assault, and a readout appeared onscreen with a few scant details drawn from the 911 dispatch center. At the bottom was a button marked “INVESTIGATE,” just begging to be clicked.

When a German security researcher, Matthias Marx, found a United States military device for sale on eBay—an instrument previously used to identify wanted individuals and known terrorists during the War in Afghanistan—Marx gambled a little and placed a low bid of $68.

He probably didn’t expect to win, since he offered less than half the seller’s asking price, $149.95. But win he did, and after that, he had an even bigger surprise coming, The New York Times reported. When the device arrived with a memory card still inside, Marx was shocked to realize he had unwittingly purchased the names, nationalities, photographs, fingerprints, and iris scans of 2,632 people whose biometric data had allegedly been scanned by US military.

The device allegedly stored not just personal identifiable information (PII) of seemingly suspicious persons, but also of US military members, people in Afghanistan who worked with the government, and ordinary people temporarily detained at military checkpoints. Most of the data came from residents of Afghanistan and Iraq.

A new survey conducted by the Canadian government has found that polar bears in the country’s Western Hudson Bay, are dying at alarming rates. The researchers aerially surveyed the Bay and its nearby town of Churchill also referred to as the ‘Bear capital of the World’ in 2021 and found there were 618 bears only, compared to 842, five years ago when last counted.

The survey added that a significant decline has been noted in the population of adult female bears and cubs between 2011 and 2021.

“The observed declines are consistent with long-standing predictions regarding the demographic effects of climate change on polar bears,” said the researchers.

Check out all the on-demand sessions from the Intelligent Security Summit here.

The adoption of a password-free future is hyped by some of the biggest tech companies, with Apple, Google, and Microsoft committing to support the FIDO standard this past May. Along with the Digital ID Bill reintroduced to Congress this past July, we’re poised to take a giant leap away from the password to a seemingly more secure digital future. But as we approach a post-password world, we still have a long way to go in ensuring the security of our digital lives.

As companies continue developing solutions to bridge us to a passwordless world, many have prioritized convenience over security. Methods of two-factor authentication (2FA) and multi-factor authentication (MFA) such as SMS or email verification — or even the use of biometrics — have emerged as leading alternatives to the traditional username/password. But here’s the catch: Most of these companies are validating devices alone and aren’t properly leveraging this technology, leaving the door open for bad actors.