Menu

Blog

Archive for the ‘privacy’ category: Page 10

Aug 12, 2020

Deepfakes declared top AI threat, biometrics and content attribution scheme proposed to detect them

Posted by in categories: privacy, robotics/AI

Biometrics may be the best way to protect society against the threat of deepfakes, but new solutions are being proposed by the Content Authority Initiative and the AI Foundation.

Deepfakes are the most serious criminal threat posed by artificial intelligence, according to a new report funded by the Dawes Centre for Future Crime at the University College London (UCL), among a list of the top 20 worries for criminal facilitation in the next 15 years.

The study is published in the journal Crime Science, and ranks the 20 AI-enabled crimes based on the harm they could cause.

Aug 12, 2020

Artificial Intelligence And Data Privacy – Turning A Risk Into A Benefit

Posted by in categories: information science, privacy, robotics/AI

On the higher end, they work to ensure that development is open in order to work on multiple cloud infrastructures, providing companies the ability to know that portability exists.

That openness is also why deep learning is not yet part of a solution. There is still not the transparency needed into the DL layers in order to have the trust necessary for privacy concerns. Rather, these systems aim to help manage information privacy for machine learning applications.

Artificial intelligence applications are not open, and can put privacy at risk. The addition of good tools to address privacy for data being used by AI systems is an important early step in adding trust into the AI equation.

Aug 8, 2020

30-year-old file format behind MacOS hack

Posted by in categories: cybercrime/malcode, privacy

A security expert revealed this week that an exploit commonly used against Windows users who own Microsoft Office can sneak into MacOS systems as well.

A former NSA security specialist who addressed the Black Hat security conference this week summarized his research into the new use for a very old exploit.

Patrick Wardle explained that the exploit capitalizes on the use of macros in Microsoft Office. Hackers have long used the approach to trick users into granting permission to activate the macros, which in turn surreptitiously launch .

Aug 4, 2020

Top 5 Countries to Adopt Facial Recognition Technology

Posted by in categories: business, finance, mobile phones, privacy, robotics/AI, security

Consumers are ending up increasingly responsive about sharing their data, as data integrity and security has turned into a developing concern. In any case, with the advent of nations teching up with facial recognition, even explorers need to truly begin thinking about what sort of data they could be reluctantly offering to nations, individuals and places.

Facial recognition innovation is a framework that is fit for identifying or confirming an individual from an advanced picture or a video frame. It works by comparing chosen facial highlights and faces inside a database. The technology is utilized in security frameworks and can be compared with different biometrics, for example, fingerprint or iris recognition frameworks. As of late, it has been grabbed and utilized as a business identification and advertising tool. The vast majority have a cell phone camera fit for recognizing features to perform exercises, for example, opening said a cell phone or making payments.

The worldwide market for facial recognition cameras and programming will be worth of an expected $7.8 billion, predicts Markets and Markets. Never again consigned to sci-fi films and books, the technology is being used in various vertical markets, from helping banks recognize clients to empowering governments to look out for criminals. Let’s look at some of the top countries adopting facial recognition technology.

Jul 19, 2020

How to force Google to automatically delete the information it saves about what you do online

Posted by in categories: internet, privacy

Google has begun rolling out a feature that allows you to configure how long it can save data from all of the Google services you use, like maps, search and everything you do online. Until now, you had to manually delete this data or turn it off entirely. Deleting it means Google doesn’t always have enough information about you to make recommendations on what it thinks you’ll like, or where you might want to go.

Now, you can tell Google to automatically delete personal information after three months or 18 months. Here’s how you can do that.


Google has a new feature that will automatically delete the data it has on how you use its apps and what you do on the web.

Jul 18, 2020

Trust Stamp integrating biometric hash solution with Mastercard on children’s vaccine record system

Posted by in categories: biotech/medical, cybercrime/malcode, encryption, privacy

Digital identity capabilities from Trust Stamp are now being integrated with Mastercard’s Wellness Pass solution, which it will launch in cooperation with Gavi in West Africa. Proving identity without revealing any information about it is the idea behind Trust Stamp’s zero knowledge approach to online identity verification, according to a profile by Mastercard.

Gareth Genner, Trust Stamp co-founder and CEO, explains in an interview how the company’s Evergreen Hash technology uses biometrics without taking on the risk of spoofing or a data breach that he says come with standard biometric implementations.

The Evergreen Hash is created from the customers face, palm or fingerprint biometrics, which the company uses to generate a “3D mask,” discarding raw data and adding encryption to associate the data with the user.

Jul 6, 2020

Indie Comics Spotlight: Biohacking, transhumanism, and gender identity in ‘The Dark’

Posted by in categories: bioengineering, biotech/medical, cyborgs, government, military, privacy, transhumanism

Sable co-created the story with artist Kristian Donaldson (Unthinkable, The Guild) and Mey Rude, a transgender woman who served as a consulting editor on the project. Sable took some time to talk to SYFY WIRE about biohacking, transhumanism, and how science fiction often predicts the future.


The Dark, by screenwriter and playwright Mark Sable (Unthinkable, Godkillers), is a graphic novel about a world plunged into chaos when a biotech virus pulls everything offline. The plot twists around government conspiracies, techno warfare, biohacking, and the unlikely pair out to stop it before another world war breaks loose. To make it all the scarier, Sable bases his fiction on fact. As a futurist who has consulted with think tanks and The Art of Future Warfare Project, he is well versed in techno warfare scenarios.

The Dark begins in 2035 and follows Master Sergeant Robert Carter, a N.E.O. (Networked Exoskeleton Operator) Marine whose power armor links him to the world’s technology, and whose implants mentally connect him to his unit. He feels what they feel, which proves torturous when his unit is attacked. The Dark takes on a double meaning as the experience leaves him both physically and technologically blind as the world’s tech crashes.

Continue reading “Indie Comics Spotlight: Biohacking, transhumanism, and gender identity in ‘The Dark’” »

Jun 27, 2020

Congress introduces bill that bans facial recognition use

Posted by in categories: government, habitats, law enforcement, privacy, robotics/AI, surveillance

“Facial recognition is a uniquely dangerous form of surveillance. This is not just some Orwellian technology of the future — it’s being used by law enforcement agencies across the country right now, and doing harm to communities right now,” Fight for the Future deputy director Evan Greer said in a statement shared with VentureBeat and posted online.


Members of the United States Congress introduced a bill today, The Facial Recognition and Biometric Technology Moratorium Act of 2020, that would prohibit the use of U.S. federal funds to acquire facial recognition systems or “any biometric surveillance system” use by federal government officials. It would also withhold federal funding through the Byrne grant program for state and local governments that use the technology.

The bill is sponsored by Senators Ed Markey (D-MA) and Jeff Merkley (D-OR) as well as Representatives Ayanna Pressley (D-MA) and Pramila Jayapal (D-WA). Pressley previously introduced a bill prohibiting use of facial recognition in public housing, while Merkley introduced a facial recognition moratorium bill in February with Senator Cory Booker (D-NJ).

Continue reading “Congress introduces bill that bans facial recognition use” »

Jun 20, 2020

FaceApp’s Gender Swap is a Scary Insight to AI and Privacy Concerns

Posted by in categories: privacy, robotics/AI

FaceApp looks pretty harmless. However, when you realise that you are uploading your photos for an AI to work on, things start to look bleak.

May 28, 2020

NSA: Russia’s Sandworm Hackers Have Hijacked Mail Servers

Posted by in categories: cybercrime/malcode, privacy

A warning that hackers are exploiting vulnerable email servers doesn’t qualify as an unusual event in general. But when that warning comes from the National Security Agency, and the hackers are some of the most dangerous state-sponsored agents in the world, run-of-the-mill email server hacking becomes significantly more alarming.

On Thursday, the NSA issued an advisory that the Russian hacker group known as Sandworm, a unit of the GRU military intelligence agency, has been actively exploiting a known vulnerability in Exim, a commonly used mail transfer agent—an alternative to bigger players like Exchange and Sendmail—running on email servers around the world. The agency warns that Sandworm has been exploiting vulnerable Exim mail servers since at least August 2019, using the hacked servers as an initial infection point on target systems and likely pivoting to other parts of the victim’s network. And while the NSA hasn’t said who those targets have been, or how many there are, Sandworm’s history as one of the most aggressive and destructive hacking organizations in the world makes any new activity from the group worth noting.

“We still consider this to be one of the most, if not the most aggressive and potentially dangerous actor that we track,” says John Hultquist, the director of intelligence at FireEye, who also led a team at iSight Partners when that company first discovered and named Sandworm in 2014.

Page 10 of 30First7891011121314Last