Agregátor RSS

Policie zatkla cizince, do bankomatu montovali ?te?ku karet

Security News - 17 min 39 sek zpět
Policisté v Praze zadrželi dva cizince t?sn? po tom, co do bankomatu nainstalovali skimmovací za?ízení s cílem dostat se k pen?z?m klient?. U zadržených muž? pak policisté zajistili i celou ?adu nástroj? k páchání této trestné ?innosti a vysíla?ky, informoval ve st?edu policejní mluv?í Jan Dan?k.
Kategorie: Aktuality

Jak tvo?it a pamatovat si hesla (2019)

Security News - 17 min 39 sek zpět
Užite?ný p?ísp?vek "14 Ways to Create a Secure Password in 2019" na stále pot?ebné téma jak vytvá?et a pamatovat si hesla od Jacka Forstera.
Kategorie: Aktuality

P?ehled kvalitních bezplatných bezpe?nostních program?

Security News - 17 min 39 sek zpět
25+ Free Security Tools That You Need to Start

P?ehled bezplatných silných antivirových a dalších bezpe?nostních program?, které vám mohou pomoci udržet vaše citlivé informace v bezpe?í.
Kategorie: Aktuality

How to encrypt email (Gmail, Outlook iOS, OSX, Android, Webmail)

Security News - 17 min 39 sek zpět
Email was one of the earliest forms of communication on the internet, and if you’re reading this you almost undoubtedly have at least one email address. Critics today decry the eventual fall of email, but for now it’s still one of the most universal means of communicating with other people that we have. One of the biggest problems with this cornerstone of electronic communication is that it isn’t very private. By default, most email providers do not provide the means to encrypt messages or attachments. This leaves email users susceptible to hackers, snoops, and thieves.

So you want to start encrypting your email? Well, let’s start by saying that setting up email encryption yourself is not the most convenient process. You don’t need a degree in cryptography or anything, but it will take a dash of tech savvy. We’ll walk you through the process later on in this article.

Alternatively, you can use an off-the-shelf encrypted email client. Tutanota is one such secure email service, with apps for mobile and a web mail client. It even encrypts your attachments and contact lists. Tutanota is open-source, so it can be audited by third parties to ensure it’s safe. All encryption takes place in the background. While we can vouch for Tutanota, it’s worth mentioning that there are a lot of email apps out there that claim to offer end-to-end encryption, but many contain security vulnerabilities and other shortcomings. Do your research before choosing an off-the-shelf secure email app.

If you’d prefer to configure your own email encryption, keep reading.
Kategorie: Aktuality

Crypto 2018 - August 19-23, 2018

Security News - 17 min 39 sek zpět
See Affiliated Events too.
Kategorie: Aktuality

Google: Security Keys Neutralized Employee Phishing

Security News - 17 min 39 sek zpět
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.

Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device).
Kategorie: Aktuality

Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt

Security News - 17 min 39 sek zpět
The US Department of Justice (DOJ) this week released the first report from its Cyber Digital Task Force – which was set up in February to advise the government on strengthening its online defenses.
The report [PDF], compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It also lays out what the government needs to do to thwart looming threats to its computer networks.

Let´s (not) Encrypt

If you´ve been following the news for the last few years it will come as no surprise that the Justice Department is not a fan of the common man having access to encryption.
The report bemoans the current state of encryption and its ability to keep the government from gathering and analyzing traffic for criminal investigations. The word ´encryption´ comes up 17 times in the report, not once in a favorable light.
In the past several years, the Department has seen the proliferation of default encryption where the only person who can access the unencrypted information is the end user, the report reads.
The advent of such widespread and increasingly sophisticated encryption technologies that prevent lawful access poses a significant impediment to the investigation of most types of criminal activity.
Kategorie: Aktuality

Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity

Security News - 17 min 39 sek zpět
The demand for quantum computing services will be driven by some process hungry research and development projects as well as by the emergence of several applications including advanced artificial intelligence algorithms, next-generation encryption, traffic routing and scheduling, protein synthesis, and/or the design of advanced chemicals and materials. These applications require a new processing paradigm that classical computers, bound by Moore’s law, cannot cope with. However, one should not expect quantum computers to displace their classical counterparts anytime soon.
Kategorie: Aktuality

Cracking the Crypto War

Security News - 17 min 39 sek zpět
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: It satisfies both law enforcement and privacy purists. (?)
Kategorie: Aktuality

Zimmerman and friends: ´Are you listening? PGP is not broken´

Security News - 17 min 39 sek zpět
EFAIL furore not over yet, even though it´s easy to fix.

However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.

Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
Kategorie: Aktuality

Personal encryption usage is increasing

Security News - 17 min 39 sek zpět
According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased due to recent geopolitical changes.
Kategorie: Aktuality

Wah, encryption makes policing hard, cries UK´s National Crime Agency

Security News - 17 min 39 sek zpět
Encryption is making it more difficult for law enforcement agencies to detect dangerous offenders, according the the National Crime Agency's (NCA) yearly assessment of serious organised crime in Britain.

Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessment of Serious and Organised Crime 2018
Kategorie: Aktuality

New law would stop Feds from demanding encryption backdoor

Security News - 17 min 39 sek zpět
US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the American government from forcing tech product makers to undermine the security of their wares.
Kategorie: Aktuality

NIST starts down road toward IoT encryption

Security News - 17 min 39 sek zpět
The National Institute of Standards and Technology wants comments on the best way to design criteria to evaluate new encryption standards for small computing devices.

NIST will eventually ask researchers and cryptographers for algorithms that could be used to encrypt data on small, "constrained devices," such as sensors, RFID tags, industrial controllers and smart cards that are being incorporated into automobiles, internet-of-things devices, the smart grid and distributed control systems.

But first the agency needs to establish the requirements and evaluation criteria that will guide the review of the algorithms.
Kategorie: Aktuality

Minetest 5.3.0

AbcLinuxu [zprávičky] - 42 min 59 sek zpět
Multiplatformní open source počítačová hra Minetest byla vydána ve verzi 5.3.0. Jedná se o hru inspirovanou Minecraftem.
Kategorie: GNU/Linux & BSD

Apple bude podporovat Thundebolt i u Maců s vlastními čipy Arm

Živě.cz - 52 min 45 sek zpět
Rozhraní Thunderbolt bylo vyvinuté díky spolupráci Intelu a Applu a první generace byla představená už v roce 2011. Nyní už se na trh chystá dokonce Thunderbolt 4, který bude podporovat i USB4 a další novinky. Maximální rychlost ale zůstane stejná jako u Thunderboltu 3 – 40 Gb/s. Vzhledem k ...
Kategorie: IT News

A new way to train AI systems could keep them safer from hackers

Home AI - 1 hodina 34 min zpět

The context: One of the greatest unsolved flaws of deep learning is its … be presented next week at the International Conference on Machine Learning.


Link to Full Article: Read Here

Kategorie: Transhumanismus

The 2020 Awards – Three Weeks Left to Nominate – Ends 31st July

Home AI - 1 hodina 42 min zpět

Nominations close on 31st July, so just over three weeks left to submit your nominations for an AI Award

This year, we have over 60 Awards, across 7 categories. See our Awards Category page for a full list.

To nominate an AI Company, Product or Individual please fill in this online AI Awards Nomination form.

To learn more about the schedule for the awards, check out our Programme.

Please read our Guidelines and our competition Rules are available for your reference.

Its still not too late to be one of our Awards sponsors, contact us for more information.


Link to Full Article: Read Here

Kategorie: Transhumanismus

Why We Need Mass Automation to Pandemic-Proof the Supply Chain

Singularity HUB - 1 hodina 47 min zpět

The scale of goods moving around the planet at any moment is staggering. Raw materials are dug up in one country, spun into parts and pieces in another, and assembled into products in a third. Crossing oceans and continents, they find their way to a local store or direct to your door.

Magically, a roll of toilet paper, power tool, or tube of toothpaste is there just when you need it.

Even more staggering is that this whole system, the global supply chain, works so well that it’s effectively invisible most of the time. Until now, that is. The pandemic has thrown a floodlight on the inner workings of this modern wonder—and it’s exposed massive vulnerabilities.

The e-commerce supply chain is an instructive example. As the world went into lockdown, and everything non-essential went online, demand for digital fulfillment skyrocketed.

Even under “normal” conditions, most e-commerce warehouses were struggling to meet demand. But Covid-19 has further strained the ability to cope with shifting supply, an unprecedented tidal wave of orders, and labor shortages. Local stores are running out of key products. Online grocers and e-commerce platforms are suspending some home deliveries, restricting online purchases of certain items, and limiting new customers. The whole system is being severely tested.

Why? Despite an abundance of 21st century technology, we’re stuck in the 20th century.

Today’s supply chain consists of fleets of ships, trucks, warehouses, and importantly, people scattered around the world. While there are some notable instances of advanced automation, the overwhelming majority of work is still manual, resembling a sort of human-powered bucket brigade, with people wandering around warehouses or standing alongside conveyor belts. Each package of diapers or bottle of detergent ordered by an online customer might be touched dozens of times by warehouse workers before finding its way into a box delivered to a home.

The pandemic has proven the critical need for innovation due to increased demand, concerns about the health and safety of workers, and traceability and safety of products and services.

At the 2020 World Economic Forum, there was much discussion about the ongoing societal transformation in which humans and machines work in tandem, automating and augmenting the way we get things done. At the time, pre-pandemic, debate trended toward skepticism and fear of job losses, with some even questioning the ethics and need for these technologies.

Now, we see things differently. To make the global supply chain more resilient to shocks like Covid-19, we must look to technology.

Perfecting the Global Supply Chain: The Massive ‘Matter Router’

Technology has faced and overcome similar challenges in the past.

World War II, for example, drove innovation in techniques for rapid production of many products on a large scale, including penicillin. We went from the availability of one dose of the drug in 1941, to four million sterile packages of the drug every month four years later.

Similarly, today’s companies, big and small, are looking to automation, robotics, and AI to meet the pandemic head on. These technologies are crucial to scaling the infrastructure that will fulfill most of the world’s e-commerce and food distribution needs.

You can think of this new infrastructure as a rapidly evolving “matter router” that will employ increasingly complex robotic systems to move products more freely and efficiently.

Robots powered by specialized AI software, for example, are already learning to adapt to changes in the environment, using the most recent advances in industrial robotics and machine learning. When customers suddenly need to order dramatically new items, these robots don’t need to stop or be reprogrammed. They can perform new tasks by learning from experience using low-cost camera systems and deep learning for visual and image recognition.

These more flexible robots can work around the clock, helping make facilities less sensitive to sudden changes in workforce and customer demand and strengthening the supply chain.

Today, e-commerce is roughly 12% of retail sales in the US and is expected to rise well beyond 25% within the decade, fueled by changes in buying habits. However, analysts have begun to consider whether the current crisis might cause permanent jumps in those numbers, as it has in the past (for instance with the SARS epidemic in China in 2003). Whatever happens, the larger supply chain will benefit from greater, more flexible automation, especially during global crises.

We must create what Hamza Mudassire of the University of Cambridge calls a “resilient ecosystem that links multiple buyers with multiple vendors, across a mesh of supply chains.” This ecosystem must be backed by robust, efficient, and scalable automation that uses robotics, autonomous vehicles, and the Internet of Things to help track the flow of goods through the supply chain.

The good news? We can accomplish this with technologies we have today.

Image credit: Guillaume BolducUnsplash

Kategorie: Transhumanismus
Syndikovat obsah