Agregátor RSS

Policie zatkla cizince, do bankomatu montovali ?te?ku karet

Security News - 17 min 12 sek zpět
Policisté v Praze zadrželi dva cizince t?sn? po tom, co do bankomatu nainstalovali skimmovací za?ízení s cílem dostat se k pen?z?m klient?. U zadržených muž? pak policisté zajistili i celou ?adu nástroj? k páchání této trestné ?innosti a vysíla?ky, informoval ve st?edu policejní mluv?í Jan Dan?k.
Kategorie: Aktuality

Jak tvo?it a pamatovat si hesla (2019)

Security News - 17 min 12 sek zpět
Užite?ný p?ísp?vek "14 Ways to Create a Secure Password in 2019" na stále pot?ebné téma jak vytvá?et a pamatovat si hesla od Jacka Forstera.
Kategorie: Aktuality

P?ehled kvalitních bezplatných bezpe?nostních program?

Security News - 17 min 12 sek zpět
25+ Free Security Tools That You Need to Start

P?ehled bezplatných silných antivirových a dalších bezpe?nostních program?, které vám mohou pomoci udržet vaše citlivé informace v bezpe?í.
Kategorie: Aktuality

How to encrypt email (Gmail, Outlook iOS, OSX, Android, Webmail)

Security News - 17 min 12 sek zpět
Email was one of the earliest forms of communication on the internet, and if you’re reading this you almost undoubtedly have at least one email address. Critics today decry the eventual fall of email, but for now it’s still one of the most universal means of communicating with other people that we have. One of the biggest problems with this cornerstone of electronic communication is that it isn’t very private. By default, most email providers do not provide the means to encrypt messages or attachments. This leaves email users susceptible to hackers, snoops, and thieves.

So you want to start encrypting your email? Well, let’s start by saying that setting up email encryption yourself is not the most convenient process. You don’t need a degree in cryptography or anything, but it will take a dash of tech savvy. We’ll walk you through the process later on in this article.

Alternatively, you can use an off-the-shelf encrypted email client. Tutanota is one such secure email service, with apps for mobile and a web mail client. It even encrypts your attachments and contact lists. Tutanota is open-source, so it can be audited by third parties to ensure it’s safe. All encryption takes place in the background. While we can vouch for Tutanota, it’s worth mentioning that there are a lot of email apps out there that claim to offer end-to-end encryption, but many contain security vulnerabilities and other shortcomings. Do your research before choosing an off-the-shelf secure email app.

If you’d prefer to configure your own email encryption, keep reading.
Kategorie: Aktuality

Crypto 2018 - August 19-23, 2018

Security News - 17 min 12 sek zpět
See Affiliated Events too.
Kategorie: Aktuality

Google: Security Keys Neutralized Employee Phishing

Security News - 17 min 12 sek zpět
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.

Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device).
Kategorie: Aktuality

Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt

Security News - 17 min 12 sek zpět
The US Department of Justice (DOJ) this week released the first report from its Cyber Digital Task Force – which was set up in February to advise the government on strengthening its online defenses.
The report [PDF], compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It also lays out what the government needs to do to thwart looming threats to its computer networks.

Let´s (not) Encrypt

If you´ve been following the news for the last few years it will come as no surprise that the Justice Department is not a fan of the common man having access to encryption.
The report bemoans the current state of encryption and its ability to keep the government from gathering and analyzing traffic for criminal investigations. The word ´encryption´ comes up 17 times in the report, not once in a favorable light.
In the past several years, the Department has seen the proliferation of default encryption where the only person who can access the unencrypted information is the end user, the report reads.
The advent of such widespread and increasingly sophisticated encryption technologies that prevent lawful access poses a significant impediment to the investigation of most types of criminal activity.
Kategorie: Aktuality

Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity

Security News - 17 min 12 sek zpět
The demand for quantum computing services will be driven by some process hungry research and development projects as well as by the emergence of several applications including advanced artificial intelligence algorithms, next-generation encryption, traffic routing and scheduling, protein synthesis, and/or the design of advanced chemicals and materials. These applications require a new processing paradigm that classical computers, bound by Moore’s law, cannot cope with. However, one should not expect quantum computers to displace their classical counterparts anytime soon.
Kategorie: Aktuality

Cracking the Crypto War

Security News - 17 min 12 sek zpět
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: It satisfies both law enforcement and privacy purists. (?)
Kategorie: Aktuality

Zimmerman and friends: ´Are you listening? PGP is not broken´

Security News - 17 min 12 sek zpět
EFAIL furore not over yet, even though it´s easy to fix.

However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.

Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
Kategorie: Aktuality

Personal encryption usage is increasing

Security News - 17 min 12 sek zpět
According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased due to recent geopolitical changes.
Kategorie: Aktuality

Wah, encryption makes policing hard, cries UK´s National Crime Agency

Security News - 17 min 12 sek zpět
Encryption is making it more difficult for law enforcement agencies to detect dangerous offenders, according the the National Crime Agency's (NCA) yearly assessment of serious organised crime in Britain.

Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessment of Serious and Organised Crime 2018
Kategorie: Aktuality

New law would stop Feds from demanding encryption backdoor

Security News - 17 min 12 sek zpět
US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the American government from forcing tech product makers to undermine the security of their wares.
Kategorie: Aktuality

Technology Over the Long Run: Zoom Out to See How Dramatically the World Can Change Within a Lifetime

Singularity HUB - 1 min 25 sek zpět

Technology can change the world in ways that are unimaginable, until they happen. Switching on an electric light would have been unimaginable for our medieval ancestors. In their childhood, our grandparents would have struggled to imagine a world connected by smartphones and the internet.

Similarly, it is hard for us to imagine the arrival of all those technologies that will fundamentally change the world we are used to.

We can remind ourselves that our own future might look very different from the world today by looking back at how rapidly technology has changed our world in the past. That’s what this article is about.

One insight I take away from this long-term perspective is how unusual our time is. Technological change was extremely slow in the past—the technologies that our ancestors got used to in their childhood were still central to their lives in their old age. In stark contrast to those days, we live in a time of extraordinarily fast technological change. For recent generations, it was common for technologies that were unimaginable in their youth to become common later in life.

The Long-Run Perspective on Technological Change

The big visualization offers a long-term perspective on the history of technology.

The timeline begins at the center of the spiral. The first use of stone tools, 3.4 million years ago, marks the beginning of this history of technology. Each turn of the spiral then represents 200,000 years of history. It took 2.4 million years—12 turns of the spiral—for our ancestors to control fire and use it for cooking.

To be able to visualize the inventions in the more recent past—the last 12,000 years—I had to unroll the spiral. I needed more space to be able to show when agriculture, writing, and the wheel were invented. During this period, technological change was faster, but it was still relatively slow: several thousand years passed between each of these three inventions.

From 1800 onwards, I stretched out the timeline even further to show the many major inventions that rapidly followed one after the other.

The long-term perspective that this chart provides makes it clear just how unusually fast technological change is in our time.

You can use this visualization to see how technology developed in particular domains. Follow, for example, the history of communication: from writing, to paper, to the printing press, to the telegraph, the telephone, the radio, all the way to the internet and smartphones.

Or follow the rapid development of human flight. In 1903, the Wright brothers took the first flight in human history (they were in the air for less than a minute), and just 66 years later, we landed on the moon. Many people saw both within their lifetimes: the first plane and the moon landing.

This large visualization also highlights the wide range of technology’s impact on our lives. It includes extraordinarily beneficial innovations, such as the vaccine that allowed humanity to eradicate smallpox, and it includes terrible innovations, like the nuclear bombs that endanger the lives of all of us.

What will the next decades bring?

The red timeline reaches up to the present and then continues in green into the future. Many children born today, even without any further increases in life expectancy, will live well into the 22nd century.

New vaccines, progress in clean, low-carbon energy, better cancer treatments—a range of future innovations could very much improve our living conditions and the environment around us. But, as I argue in a series of articles, there is one technology that could even more profoundly change our world: artificial intelligence.

One reason why artificial intelligence is such an important innovation is that intelligence is the main driver of innovation itself. This fast-paced technological change could speed up even more if it’s not only driven by humanity’s intelligence, but artificial intelligence too. If this happens, the change that is currently stretched out over the course of decades might happen within very brief time spans of just a year. Possibly even faster.

I think AI technology could have a fundamentally transformative impact on our world. In many ways it is already changing our world, as I documented in this companion article. As this technology is becoming more capable in the years and decades to come, it can give immense power to those who control it (and it poses the risk that it could escape our control entirely).

Such systems might seem hard to imagine today, but AI technology is advancing very fast. Many AI experts believe that there is a very real chance that human-level artificial intelligence will be developed within the next decades, as I documented in this article.

Technology Will Continue to Change the World—We Should All Make Sure That It Changes It for the Better

What is familiar to us today—photography, the radio, antibiotics, the internet, or the International Space Station circling our planet—was unimaginable to our ancestors just a few generations ago. If your great-great-great grandparents could spend a week with you they would be blown away by your everyday life.

What I take away from this history is that I will likely see technologies in my lifetime that appear unimaginable to me today.

In addition to this trend towards increasingly rapid innovation, there is a second long-run trend. Technology has become increasingly powerful. While our ancestors wielded stone tools, we are building globe-spanning AI systems and technologies that can edit our genes.

Because of the immense power that technology gives those who control it, there is little that is as important as the question of which technologies get developed during our lifetimes. Therefore I think it is a mistake to leave the question about the future of technology to the technologists. Which technologies are controlled by whom is one of the most important political questions of our time, because of the enormous power that these technologies convey to those who control them.

We all should strive to gain the knowledge we need to contribute to an intelligent debate about the world we want to live in. To a large part this means gaining the knowledge, and wisdom, on the question of which technologies we want.

Acknowledgements: I would like to thank my colleagues Hannah Ritchie, Bastian Herre, Natasha Ahuja, Edouard Mathieu, Daniel Bachler, Charlie Giattino, and Pablo Rosado for their helpful comments to drafts of this essay and the visualization. Thanks also to Lizka Vaintrob and Ben Clifford for a conversation that initiated this visualization.

This article was originally published on Our World in Data and has been republished here under a Creative Commons license. Read the original article.

Image Credit: Pat Kay / Unsplash

Kategorie: Transhumanismus

Android 14 nedovolí instalaci starých aplikací. Bude to jeden ze způsobů, jak se lépe bránit proti malwaru

Zive.cz - bezpečnost - 2 hodiny 2 min zpět
** Google v Androidu 14 změní zavedené pořádky ** Sideloading velmi starých aplikací vám systém zablokuje ** U dříve stažených starších aplikací z Google Play omezeni nebudete
Kategorie: Hacking & Security

Android 14 nedovolí instalaci starých aplikací. Bude to jeden ze způsobů, jak se lépe bránit proti malwaru

Živě.cz - 2 hodiny 2 min zpět
Google v Androidu 14 změní zavedené pořádky • Sideloading velmi starých aplikací vám systém zablokuje • U dříve stažených starších aplikací z Google Play omezeni nebudete
Kategorie: IT News

Jak levně a rychle zvrátit klimatickou změnu. „Stačí do oceánů nasypat železný prach,“ říká podnikatel. Vědci před postupem varují

Živě.cz - 3 hodiny 2 min zpět
Americký obchodník a podnikatel Russ George již více než patnáct let budí pozornost kontroverzním plánem na zastavení klimatických změn. Chce „hnojit“ oceány železným prachem, což by mělo přispět k podpoře růstu fytoplanktonu. To by následně vedlo ke snížení hladiny oxidu uhličitého v zemské ...
Kategorie: IT News

@insideBIGDATApodcast: ChatGPT – The Human AI Partnership – insideBIGDATA

Home AI - 4 hodiny 42 min zpět

We bring you compelling topics including: big data, data science, machine learning, AI, and deep learning. Enjoy!


Link to Full Article: Read Here

Kategorie: Transhumanismus
Syndikovat obsah