Menu

Blog

Archive for the ‘security’ category: Page 96

Jul 18, 2019

Electronic Harassment Must Stop‼️ Photo

Posted by in categories: government, security

TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.

The traditional approach for TEMPEST product approval provides for government supervision of evaluations to include testing oversight and technical reviews of both the TEMPEST test plans and test reports produced by a nation’s TEMPEST evaluation personnel.

NATO agreed on a scheme in 1981 to have vendors offer approved TEMPEST products for sale to NATO and NATO member nations.

Jul 14, 2019

Can I Check Web Sites Visited by my Kids/Staff?

Posted by in categories: computing, internet, policy, privacy, security, software, surveillance

Early this morning, I was asked this question at Quora. It’s a pretty basic request of network administrators, including parents, schools and anyone who administers a public, sensitive or legally exposed WiFi hot spot.

Is there a quick and easy way to view, log, or otherwise monitor the web sites visited by people on your home or office network?

Yes. It’s free and and it is pretty easy to do.

It gets a bit trickier, if the individual on your network is using a VPN service that they have configured on their device.[1] A VPN does not stop you from logging their browsing, but all of their activity will point to the VPN address instead of the site that they are actually visiting. In that case, there is another way to monitor their activity. See note #1, below.

Continue reading “Can I Check Web Sites Visited by my Kids/Staff?” »

Jul 13, 2019

These LED smart lights are tracking your moves

Posted by in categories: privacy, security, transportation

While more people and places are switching to energy-saving LED light bulbs, a California company has found a way to turn them into smart networks that can collect and feed data. However, the new technological opportunities are also raising privacy concerns, reports CBS News’ Bill Whitaker.

For example, should you find yourself in terminal “B” at Newark airport, look up. Those aren’t just new lights. They’re smart lights — a sophisticated array of LED fixtures with built-in sensors and cameras connected over a wireless network. They monitor security and the flow of foot traffic.

“Newark’s primarily interested in energy saving,” said Hugh Martin, president of Sensity, the Silicon Valley company that developed the smart lights at Newark and also a parking garage in San Jose.

Jul 13, 2019

New Phishing Scam Targets Amazon Users Just Before Prime Day

Posted by in category: security

Security researchers at McAfee say that hackers have released a do-it-yourself kit that allows people to easily put together phishing scams targeting Amazon users – just in time for Prime Day next week.

McAfee first noticed the so-called 16Shop phishing kit in action in November, when it was being used to create fake emails, supposedly from Apple, trying to gain access to people’s Apple accounts. The scam let hackers create a realistic-looking Apple sign-in page to steal your login credentials.

Starting in May, 16Shop expanded to target Amazon users, McAfee wrote on Friday, July 12. The new version allows would-be hackers to create their own realistic-looking Amazon login page that would give them your username and password — pretty much everything they would need to log into your account. Here’s what it looks like:

Jul 9, 2019

Scientists successfully edit a long-locked part of plant DNA, improving crop security

Posted by in categories: biotech/medical, food, genetics, security

Think of DNA and chances are the double helix structure comes to mind, but that’s only one piece of the puzzle. Another major part is mitochondrial DNA, and in plants that’s even more important – and so complex that scientists haven’t yet been able to edit the genes in there. Now a team of Japanese researchers has managed to do just that, which could help improve the genetic diversity of crops.

Jul 8, 2019

NASA’s New Space Engine Is Powered by Nuclear Fission

Posted by in categories: nuclear energy, particle physics, security, space travel

From returning to the Moon to establishing outposts on Mars, NASA has the need for more power than ever before. Could nuclear fission be the solution they’ve been searching for?

Watch more Focal Point! | https://bit.ly/2J9b9LC

Continue reading “NASA’s New Space Engine Is Powered by Nuclear Fission” »

Jul 1, 2019

Novel sensor enables remote biometric-data acquisition

Posted by in categories: privacy, security

Biometrics is defined as the measurement of life signs. One of the main aims of current security research is to acquire biometric data of sufficient detail and reliability for verification or identification of individuals.


A newly developed electric-field sensing technology with unprecedented sensitivity and noise immunity can passively acquire physiological signals in an electrically noisy environment.

Robert Prance

Jun 23, 2019

These Contacts Let You Shoot Lasers From Your Eyes

Posted by in categories: futurism, security

Scientists developed a laser-shooting membrane that could be the future of security.

Jun 20, 2019

Cisco Live 2019: Quantum Computing Presents an Exciting (and Scary) Future for IT

Posted by in categories: computing, quantum physics, security

The future is quantum, and while it’s absolutely full of possibilities, the increased power and scale of quantum computing presents some serious security concerns.

Jun 16, 2019

AI-Aided Video Surveillance Will Watch and Silently Judge Us

Posted by in categories: robotics/AI, security, surveillance

Gone are the days when a store’s security cameras only mattered to shoplifters.

Now, with the rising prevalence of surveillance systems constantly monitored by artificial intelligence, ubiquitous security systems can watch, learn about, and discriminate against shoppers more than ever before.

That’s the gist of a new ACLU report titled “The Dawn of Robot Surveillance,” about how emerging AI technology enables security companies to constantly monitor and collect data about people — opening new possibilities in which power is abused or underserved communities are overpoliced.

Page 96 of 148First93949596979899100Last