Menu

Blog

Archive for the ‘security’ category: Page 90

Dec 10, 2019

Google built its own tiny HDMI 2.1 box to jump-start “the next generation of Android TV”

Posted by in categories: computing, mobile phones, security

Today, Google is announcing that Android 10 is arriving on Android TV, and it’s about as bland of an update as they come. Primarily, it’s just the performance and security benefits of Android 10, without a single new user-facing feature. But at the bottom of Google’s blog post, the company hints at why: Google’s busy prepping for the “next-generation of Android TV,” starting with the miniature box above.

Google says this new ADT-3 dongle is a full-fledged Android TV platform, with a quad-core ARM Cortex A53 CPU, 2GB of DDR3 memory, and the ability to output 4K HDR content at 60 frames per second over its HDMI 2.1 port.

Dec 9, 2019

Blockchain is not a magic bullet for security. Can we trust it?

Posted by in categories: biotech/medical, bitcoin, security

Up to 10% of global GDP could be stored on blockchains by 2025, according to the World Economic Forum. From product identifiers, medical records to land registries, academic degrees and insurance contracts, blockchain and distributed ledger technologies (DLTs) are already functioning in many sectors.

What blockchain promises is no less than the technological backbone of the 21st century’s renaissance of the social commons, giving back power to the people. In this century more than ever, power comes from data. Blockchain promises to give control of data back to the people. But this requires one element: trust in the technology, trust that it does what it’s supposed to do.

The paradox here is that blockchain removes the need to trust the intermediary – i.e., notaries, insurers and bankers – by requiring us to trust the technology. But how likely are we to trust the technology if it is breached repeatedly?

Dec 7, 2019

Edward Snowden on the Dangers of Mass Surveillance and Artificial General Intelligence

Posted by in categories: business, education, robotics/AI, security, surveillance

AI is Pandora’s box, s’ true…

On the one hand we can’t close it and on the other hand our current direction is not good. And this is gonna get worse as AI starts taking its own ‘creative’ decisions… the human overlords will claim it has nothing to do with them if and when things go wrong.

The solution for commercialization is actually quite simple.

Continue reading “Edward Snowden on the Dangers of Mass Surveillance and Artificial General Intelligence” »

Dec 6, 2019

Harvard, MIT, Duke, US Army Team Up on Terahertz Technology

Posted by in categories: biotech/medical, security

Researchers have created a new terahertz radiation emitter with coveted frequency adjustment capability. The compact source could enable the development of futuristic communications, security, biomedical, and astronomical imaging systems.

Harvard University Massachusetts Institute of Technology (MIT) Duke University U.S. Army #lasers #photonics

Dec 5, 2019

Singapore’s human-centric artificial intelligence strategy | The Straits Times

Posted by in categories: education, finance, habitats, robotics/AI, security

The national artificial intelligence strategy, which was unveiled in November, will focus on five key sectors — transport and logistics, smart cities and estates, safety and security, healthcare, and education.

Read the full story: https://www.straitstimes.com/singapore/tapping-ai-to-deliver…ect-issues

Continue reading “Singapore’s human-centric artificial intelligence strategy | The Straits Times” »

Nov 26, 2019

Almost 60% Of Malicious Ads Come from Three Ad Providers

Posted by in category: security

In Confiant’s “Demand Quality Report for Q3 2019”, the ad fraud and security company analyzed 120 billion ad impressions between January 1st and September 20th that flowed through their systems in order to provide a breakdown of different malicious ad campaigns.

While Confiant’s report also discussed low quality ads and banner ads that appear in video slots, we will focus on the detected malicious ads and the campaigns that utilize them.

A malicious ad is defined by Confiant as one that performs unwanted behavior such as a forced redirect to scams, cryptojacking, or ads that infect a visitor’s device.

Nov 25, 2019

Team saw how an attacker could hijack Android camera for spyfest

Posted by in categories: mobile phones, security

Android camera security threat, disclosed and since addressed, had spy vulnerabilities. These were fixed by Google and Samsung with a patch rolled out for Pixel and Samsung devices The recent headlines surrounding the flaw on Android devices teased a discomforting thought in the latest of numerous discomforting thoughts about security risks in the Android ecosystem.

Imagine your app is recording video and taking photos without your permission.

In short, attackers could hijack your phone camera. Dan Goodin in Ars Technica: This was all about “an app needed no permissions at all to cause the camera to shoot pictures and record video and audio.”

Nov 25, 2019

Mystery blurs dump of over 1 billion people’s personal data

Posted by in category: security

Two security sleuths last month discovered an enormous amount of data that was left exposed on a server. Data found on the server belonged to around 1.2 billion people.

Kartikay Mehrotra wrote about it on Friday for Bloomberg, in a story, along with one from Wired, that was frequently quoted over the weekend. The data was left unprotected on a Google Cloud server.

The FBI were contacted and the server was shut down. Not trivial. Wired referred to the situation as a “jumbo” data leak. Wired said the information was sitting exposed and easily accessible on an unsecured server.

Nov 23, 2019

Google Cloud server left a billion people’s data unsecured

Posted by in category: security

Night Lion Security’s Vinny Troia has discovered an unsecured database containing the personal information of 1.2bn users.

Nov 21, 2019

What Is End-to-End Encryption? Another Bull’s-Eye on Big Tech

Posted by in categories: encryption, law enforcement, security, terrorism

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

Page 90 of 147First8788899091929394Last