Menu

Blog

Archive for the ‘security’ category: Page 91

Dec 5, 2019

Singapore’s human-centric artificial intelligence strategy | The Straits Times

Posted by in categories: education, finance, habitats, robotics/AI, security

The national artificial intelligence strategy, which was unveiled in November, will focus on five key sectors — transport and logistics, smart cities and estates, safety and security, healthcare, and education.

Read the full story: https://www.straitstimes.com/singapore/tapping-ai-to-deliver…ect-issues

Continue reading “Singapore’s human-centric artificial intelligence strategy | The Straits Times” »

Nov 26, 2019

Almost 60% Of Malicious Ads Come from Three Ad Providers

Posted by in category: security

In Confiant’s “Demand Quality Report for Q3 2019”, the ad fraud and security company analyzed 120 billion ad impressions between January 1st and September 20th that flowed through their systems in order to provide a breakdown of different malicious ad campaigns.

While Confiant’s report also discussed low quality ads and banner ads that appear in video slots, we will focus on the detected malicious ads and the campaigns that utilize them.

A malicious ad is defined by Confiant as one that performs unwanted behavior such as a forced redirect to scams, cryptojacking, or ads that infect a visitor’s device.

Nov 25, 2019

Team saw how an attacker could hijack Android camera for spyfest

Posted by in categories: mobile phones, security

Android camera security threat, disclosed and since addressed, had spy vulnerabilities. These were fixed by Google and Samsung with a patch rolled out for Pixel and Samsung devices The recent headlines surrounding the flaw on Android devices teased a discomforting thought in the latest of numerous discomforting thoughts about security risks in the Android ecosystem.

Imagine your app is recording video and taking photos without your permission.

In short, attackers could hijack your phone camera. Dan Goodin in Ars Technica: This was all about “an app needed no permissions at all to cause the camera to shoot pictures and record video and audio.”

Nov 25, 2019

Mystery blurs dump of over 1 billion people’s personal data

Posted by in category: security

Two security sleuths last month discovered an enormous amount of data that was left exposed on a server. Data found on the server belonged to around 1.2 billion people.

Kartikay Mehrotra wrote about it on Friday for Bloomberg, in a story, along with one from Wired, that was frequently quoted over the weekend. The data was left unprotected on a Google Cloud server.

The FBI were contacted and the server was shut down. Not trivial. Wired referred to the situation as a “jumbo” data leak. Wired said the information was sitting exposed and easily accessible on an unsecured server.

Nov 23, 2019

Google Cloud server left a billion people’s data unsecured

Posted by in category: security

Night Lion Security’s Vinny Troia has discovered an unsecured database containing the personal information of 1.2bn users.

Nov 21, 2019

What Is End-to-End Encryption? Another Bull’s-Eye on Big Tech

Posted by in categories: encryption, law enforcement, security, terrorism

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

Nov 19, 2019

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

Posted by in categories: mobile phones, security

Vulnerabilities in the Google Camera app left hackers able to take photos, and silently record audio and video, even when the phone was locked.

Nov 17, 2019

Current Time

Posted by in categories: existential risks, security

FAQ Timeline Dashboard Multimedia Exhibit A new abnormal: It is still 2 minutes to midnight 2019 Doomsday Clock Statement Science and Security Board Bulletin of the Atomic Scientists Editor, John Mecklin From the President | Full Statement | Board Biographies | About the Bulletin | Clock Timeline PDF version | Print this … Continued.

Nov 10, 2019

At age 17, he built Nigeria’s first locally-made drone and on a mission to build an aircraft

Posted by in categories: drones, security, surveillance

David Opateyibo was 17 years old when he built Nigeria’s first locally-made drone in Lagos.

Opateyibo led a team of Lagos State Polytechnic students to produce the country’s first prototype of a drone, which authorities in Lagos hope to deploy for security surveillance.

Continue reading “At age 17, he built Nigeria’s first locally-made drone and on a mission to build an aircraft” »

Nov 2, 2019

Smaller Is Better: Lightweight Face Detection For Smartphones

Posted by in categories: internet, mobile phones, robotics/AI, security, surveillance

Although mobile devices were not designed to run compute-heavy AI models, in recent years AI-powered features like face detection, eye tracking, and voice recognition have all been added to smartphones. Much of the compute for such services is done on the cloud, but ideally these applications would be light enough to run directly on devices without an Internet connection.

In this spirit of “smaller is better,” Shanghai-based developer “Linzai” (GitHub user name @Linzaer) recently shared a new lightweight model that enables real-time face detection for smartphones. The “Ultra-Light-Fast-Generic-Face-Detector-1MB” is designed for general-purpose face detection applications in low-power computing devices and is applicable to both Android and iOS phones as well as PCs (CPU and GPU). The project has garnered a whopping 3.3k Stars and over 600 forks on GitHub.

Facial recognition technology is widely applied in security monitoring, surveillance, human-computer interaction, entertainment, etc. Detecting human faces in digital images is the first step in facial recognition, and an ideal face detection model can be evaluated by how quickly and accurately it performs.

Page 91 of 148First8889909192939495Last