Toggle light / dark theme

Biometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as fingerprint verification and facial recognition are now common features on many of our phones.

Now, researchers have developed a new potential odorous option for the security toolkit: your breath. In a report published in Chemical Communications, researchers from Kyushu University’s Institute for Materials Chemistry and Engineering, in collaboration with the University of Tokyo, have developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath.

Combined with machine learning, this “artificial nose,” built with a 16-channel sensor array, was able to authenticate up to 20 individuals with an average accuracy of more than 97%.

Wood-derived materials can be used to harvest electrical energy from everyday movements such as walking, according to University of Toronto and University of Waterloo researchers.

In a new study recently published in Nano Energy, the team demonstrated the use of lignocellulosic nanofibrils—derived from —in a prototype self-powered device capable of sending a wireless signal to a smartphone via bluetooth.

Such devices can be used to track biometric data such as heart rate, oxygen levels or skin conductivity. The innovation could improve the performance of these devices while lowering their environmental impact.

Anthony J. Ferrante, Global Head of Cybersecurity and Senior Managing Director, FTI Consulting, Inc.

Artificial intelligence (AI) models are built with a type of machine learning called deep neural networks (DNNs), which are similar to neurons in the human brain. DNNs make the machine capable of mimicking human behaviors like decision making, reasoning and problem solving. This presentation will discuss the security, ethical and privacy concerns surrounding this technology. Learning Objectives:1: Understand that the solution to adversarial AI will come from a combination of technology and policy.2: Learn that coordinated efforts among key stakeholders will help to build a more secure future.3: Learn how to share intelligence information in the cybersecurity community to build strong defenses.

The Italian privacy guarantor (GPDP) has imposed a fine of €20,000,000 on Clearview AI for implementing a biometric monitoring network in Italy without acquiring people’s consent.

This decision resulted from a proceeding that launched in February 2021, following relevant complaints about GDPR violations that stemmed directly from Clearview’s operations.

More specifically, the investigation revealed that the American facial recognition software company maintains a database of 10 billion images of people’s faces, including Italians, who had their faces extracted from public website profiles and online videos.

Rather than waiting for multiple crashes to happen at a location before intervening to improve road safety, a new study suggests we can identify dangerous areas proactively — by measuring cyclist stress levels as they navigate city streets.

The challenge: When designing a city’s transportation infrastructure, urban planners must balance the needs of drivers with the safety of pedestrians and cyclists. This is often done through surveys of local residents and best practices learned over time.

This process doesn’t always get it right, though, so sometimes cities have to install safety improvements, such as crosswalks, bike lanes, or stop lights, at dangerous intersections or stretches of road.

A lawsuit filed in a California federal court in June 2020 claims that Google Chrome’s “Incognito Mode” is not as private as people think.

Now, Alphabet CEO Sundar Pichai will need to answer questions over whether Google continues to track users even when they’ve activated the browser’s private browsing mode, as first reported by Bloomberg Law.

The case, Brown et al v. Google LLC, was filed on June 2, 2020, assigned to Judge Lucy H. Koh in a U.S. District Court in San Jose, California.

A deposition order was issued on Monday 27 for Pichai to testify in the case for up to two hours, as the plaintiffs say that Pichai has “unique, personal knowledge of relevant issues relating to the Chrome browser and privacy concerns.” Earlier in the case, the court also issued an order for Google’s Chief Marketing Officer, Lorraine Twohill, to answer questions about how the tech giant promoted the browser’s functionality.

Google’s legal team tried to shield Pichai from testifying in the case. They claimed lower-level employees that worked directly on the Chrome browser were better suited to answer questions about how the browser’s private browsing functionality works.

Full Story:

Go beyond the hype.

Dubbed as the internet of tomorrow, Web 3.0 seems to be the next big thing that’s going to change our lives by fundamentally reshaping the internet.

Web 3.0 is an upgrade to the Web, a meta technology for business software, a social movement for open data, and a new generation for artificial intelligence.

Large corporations are usually getting hacked, resulting in the exposure of millions of user data, and a McKinsey report from last year shows that almost all industries have got a trust rate of less than 50 percent.

But the new generation of the web, Web 3.0, could solve some privacy concerns as it features the internet on blockchain technology. Storing any data on blockchain makes that data decentralized, making the company’s data usage transparent, thus protecting it from breaches. However, returning the ownership of their data back to consumers could potentially disrupt the tech industry since tech giants would eventually lose access to the data that initially gave them a boost in an already competitive market.

Full Story:

People in movies are often quick to resort to sawing off someone’s hand to get past a fingerprint scanner. A report from the Kraken Security Labs Team shows that it would be much easier—and less gruesome—to recreate someone’s fingerprint using a little bit of off-the-shelf wood glue.

Kraken notes that biometric security has become increasingly common as smartphone, tablet, and laptop manufacturers have incorporated fingerprint scanners into their products. These scanners offer a convenient way to access those devices without entering a password.

The report says a fingerprint scanner can be “hacked” by using a picture of the target’s fingerprint, creating a negative in Photoshop, printing the resulting image, and then putting some wood glue on top of the imitated fingerprint so it can be used to trick many commercial scanners.

Imagine that your team is meeting to decide whether to continue an expensive marketing campaign. After a few minutes, it becomes clear that nobody has the metrics on-hand to make the decision. You chime in with a solution and ask Amazon’s virtual assistant Alexa to back you up with information: “Alexa, how many users did we convert to customers last month with Campaign A?” and Alexa responds with the answer. You just amplified your team’s intelligence with AI. But this is just the tip of the iceberg.

Intelligence amplification is the use of technology to augment human intelligence. And a paradigm shift is on the horizon, where new devices will offer less intrusive, more intuitive ways to amplify our intelligence.

Hearables, or wireless in-ear computational earpieces, are an example of intelligence amplification devices that have been adopted recently and rapidly. An example is Apple’s AirPods, which are smart earbuds that connect to Apple devices and integrate with Siri via voice commands. Apple has also filed a patent for earbuds equipped with biometric sensors that could record data such as a user’s temperature, heart rate, and movement. Similarly, Google’s Pixel Buds give users direct access to the Google Assistant and its powerful knowledge graph. Google Assistant seamlessly connects users to information stored in Google platforms, like email and calendar management. Google Assistant also provides users with highly-personalized recommendations, helps automate personal communication, and offloads monotonous tasks like setting timers, managing lists, and controlling IoT devices.