Toggle light / dark theme

By next year, Volvo wants to become the first manufacturer to sell cars without keys. Instead of a physical key or even a Bluetooth key fob, Volvo customers will use a “digital key” in a smartphone app to access (and share that access) to their cars.

Drivers will be able to use the app (and a Bluetooth connection) to start their car, open the trunk, mess with the security system, or — like with a key fob — simply have the car unlock as you approach it. But the biggest implications of this change could be for ride-sharing. Customers (and manufacturers) have begun entertaining new ideas about how to use cars to get around without owning them outright, and something like a digital key makes it easier for multiple people to have control over one particular vehicle. That could mean something as simple as just sharing access with your family, but Volvo will also make it work on the cars it provides to Sunfleet, a Swedish car-sharing service.

Read more

Northrup Grumman’s new Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases being showcase at the WEST 2016 navel conference on February 17.


Northrop Grumman Corporation (NYSE: NOC) has announced that it will be showcasing key naval capabilities at the WEST 2016 navel conference on February 17, 2016. The corporation will unveil its full-spectrum cyber solutions, biometric defense solutions, unmanned aircraft and much more at the event. WEST 2016 is co-sponsored by AFCEA and the US Naval institute in San Diego. Northrop Grumman is a platinum sponsor of the conference, which is themed “how we make the strategy work.”

The defense contractor will be showcasing its sea serving operations and capabilities that will help the US armed forces combat challenges and difficulties more efficiently. It is also expected to display how it integrates cyber-technology into all of its defense segments. The key highlight of its cyber-suite is its Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases.

Northrop Grumman is committed to building resilience into its cyber solutions to protect and defend critical information of the armed forces. The cyber solution focuses on delivering complete end-to-end mission capabilities, including situational awareness, real-time mission analytics and damage assessment, and utmost integrated security. The defense contractor’s Blue WASP software tool will also be on display at the conference. The tool alerts navy boats of attacks against US navy vessels.

Read more

InVisage has just announced their release of a new Infrared scanner for eye scan security recognition device. Since InVisage also developed and release a new film leveraging Q-Dot technology; the scanner is also leveraging this technology for more accurate readings and imaging.


InVisage’s new image sensor for infrared cameras could help drones avoid trees and could aid virtual reality headsets in seeing where you’re pointing.

Read more

Lookout for MAZAR Bot — Androids should be scared.


One interesting feature of Mazar is that it can not be installed on smartphones running Android with “Russian” selected as the operating system’s language.

The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.

Turn off “Unknown Sources” on your device — The best way to avoid downloading malicious items is to not allow unknown sources to install stuff on your device. The app asks for wide ranging permissions, including the ability to send SMS, have full internet access, and the ability to erase a phone.

Read more

Government and tech + telecom & ISPs need to come to an agreement in how to ensure innocent people’s privacy are respected. When a person murders, stalk, threaten, kidnap, and/ or assault a person then we have a responsibility first to protect the innocent public. And, with the resistance being displayed by Apple, are we running the risk of further alienating the consumers and business customers more when it comes to releasing AI like robots, self driving cars, etc. onto the public where criminals can buy AI technology and use it to hurt others?

We really need to be addressing these issues soon.


Tim Cook is playing a dangerous game of brinkmanship with the U.S. government. In the process, he may set in motion political and judicial processes that will endanger the security of all our mobile devices.

First, let me say that I agree with the spirit of Mr. Cook’s open letter rebuffing a court order that Apple Inc. create a new version of the iPhone’s operating system to allow the Federal Bureau of Investigation to access the…

To Read the Full Story, Subscribe or Sign In.

Read more

The bottom line is robots are machines; and like any other machine, a robot system can be (with the right expertise) reprogram. And, a connected robot to the net, etc. poses a risk as long as hackers poses a risk in the current Cyber environment. Again, I encourage government, tech companies, and businesses work collectively together in addressing the immediate challenge around Cyber Security.

And, there will need to be some way to also track robots & deactivate them remotely especially when the public are allowed to buy them (including criminals).


“We believe story comprehension in robots can eliminate psychotic-appearing behavior and reinforce choices that won’t harm humans and still achieve the intended goal”.

There’s no manual for being a good human, but greeting strangers as you walk by in the morning, saying thank you and opening doors for people are probably among the top things we know we should do, even if we sometimes forget.

The Quixote technique is best for robots that have a limited objective but need to interact with humans to achieve it, and it is a primitive first step toward general moral reasoning in AI, Riedl says.

Read more