Agregátor RSS

Policie zatkla cizince, do bankomatu montovali ?te?ku karet

Security News - 20 min 38 sek zpět
Policisté v Praze zadrželi dva cizince t?sn? po tom, co do bankomatu nainstalovali skimmovací za?ízení s cílem dostat se k pen?z?m klient?. U zadržených muž? pak policisté zajistili i celou ?adu nástroj? k páchání této trestné ?innosti a vysíla?ky, informoval ve st?edu policejní mluv?í Jan Dan?k.
Kategorie: Aktuality

Jak tvo?it a pamatovat si hesla (2019)

Security News - 20 min 38 sek zpět
Užite?ný p?ísp?vek "14 Ways to Create a Secure Password in 2019" na stále pot?ebné téma jak vytvá?et a pamatovat si hesla od Jacka Forstera.
Kategorie: Aktuality

P?ehled kvalitních bezplatných bezpe?nostních program?

Security News - 20 min 38 sek zpět
25+ Free Security Tools That You Need to Start

P?ehled bezplatných silných antivirových a dalších bezpe?nostních program?, které vám mohou pomoci udržet vaše citlivé informace v bezpe?í.
Kategorie: Aktuality

How to encrypt email (Gmail, Outlook iOS, OSX, Android, Webmail)

Security News - 20 min 38 sek zpět
Email was one of the earliest forms of communication on the internet, and if you’re reading this you almost undoubtedly have at least one email address. Critics today decry the eventual fall of email, but for now it’s still one of the most universal means of communicating with other people that we have. One of the biggest problems with this cornerstone of electronic communication is that it isn’t very private. By default, most email providers do not provide the means to encrypt messages or attachments. This leaves email users susceptible to hackers, snoops, and thieves.

So you want to start encrypting your email? Well, let’s start by saying that setting up email encryption yourself is not the most convenient process. You don’t need a degree in cryptography or anything, but it will take a dash of tech savvy. We’ll walk you through the process later on in this article.

Alternatively, you can use an off-the-shelf encrypted email client. Tutanota is one such secure email service, with apps for mobile and a web mail client. It even encrypts your attachments and contact lists. Tutanota is open-source, so it can be audited by third parties to ensure it’s safe. All encryption takes place in the background. While we can vouch for Tutanota, it’s worth mentioning that there are a lot of email apps out there that claim to offer end-to-end encryption, but many contain security vulnerabilities and other shortcomings. Do your research before choosing an off-the-shelf secure email app.

If you’d prefer to configure your own email encryption, keep reading.
Kategorie: Aktuality

Crypto 2018 - August 19-23, 2018

Security News - 20 min 38 sek zpět
See Affiliated Events too.
Kategorie: Aktuality

Google: Security Keys Neutralized Employee Phishing

Security News - 20 min 38 sek zpět
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.

Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device).
Kategorie: Aktuality

Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt

Security News - 20 min 38 sek zpět
The US Department of Justice (DOJ) this week released the first report from its Cyber Digital Task Force – which was set up in February to advise the government on strengthening its online defenses.
The report [PDF], compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It also lays out what the government needs to do to thwart looming threats to its computer networks.

Let´s (not) Encrypt

If you´ve been following the news for the last few years it will come as no surprise that the Justice Department is not a fan of the common man having access to encryption.
The report bemoans the current state of encryption and its ability to keep the government from gathering and analyzing traffic for criminal investigations. The word ´encryption´ comes up 17 times in the report, not once in a favorable light.
In the past several years, the Department has seen the proliferation of default encryption where the only person who can access the unencrypted information is the end user, the report reads.
The advent of such widespread and increasingly sophisticated encryption technologies that prevent lawful access poses a significant impediment to the investigation of most types of criminal activity.
Kategorie: Aktuality

Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity

Security News - 20 min 38 sek zpět
The demand for quantum computing services will be driven by some process hungry research and development projects as well as by the emergence of several applications including advanced artificial intelligence algorithms, next-generation encryption, traffic routing and scheduling, protein synthesis, and/or the design of advanced chemicals and materials. These applications require a new processing paradigm that classical computers, bound by Moore’s law, cannot cope with. However, one should not expect quantum computers to displace their classical counterparts anytime soon.
Kategorie: Aktuality

Cracking the Crypto War

Security News - 20 min 38 sek zpět
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: It satisfies both law enforcement and privacy purists. (?)
Kategorie: Aktuality

Zimmerman and friends: ´Are you listening? PGP is not broken´

Security News - 20 min 38 sek zpět
EFAIL furore not over yet, even though it´s easy to fix.

However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.

Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
Kategorie: Aktuality

Personal encryption usage is increasing

Security News - 20 min 38 sek zpět
According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased due to recent geopolitical changes.
Kategorie: Aktuality

Wah, encryption makes policing hard, cries UK´s National Crime Agency

Security News - 20 min 38 sek zpět
Encryption is making it more difficult for law enforcement agencies to detect dangerous offenders, according the the National Crime Agency's (NCA) yearly assessment of serious organised crime in Britain.

Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessment of Serious and Organised Crime 2018
Kategorie: Aktuality

New law would stop Feds from demanding encryption backdoor

Security News - 20 min 38 sek zpět
US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the American government from forcing tech product makers to undermine the security of their wares.
Kategorie: Aktuality

How The U.S. Department Of Labor Is Leveraging Its Data Rich Environment – Forbes

Home AI - 1 hodina 12 min zpět

Data is the foundation for AI and machine learning, so we are investing … by equipping investigator and policy teams with improved intelligence, …

Link to Full Article: Read Here

Kategorie: Transhumanismus

This Week’s Awesome Tech Stories From Around the Web (Through August 13)

Singularity HUB - 1 hodina 20 min zpět

Self-Taught AI Shows Similarities to How the Brain Works
Anil Ananthaswamy | Quanta
“i‘I think there’s no doubt that 90% of what the brain does is self-supervised learning,’ said [the Quebec Artificial Intelligence Institute’s] Blake Richards. Biological brains are thought to be continually predicting, say, an object’s future location as it moves, or the next word in a sentence, just as a self-supervised learning algorithm attempts to predict the gap in an image or a segment of text. And brains learn from their mistakes on their own, too—only a small part of our brain’s feedback comes from an external source saying, essentially, ‘wrong answer’i.”


A Bioengineered Cornea Can Restore Sight to Blind People
Rhiannon Williams | MIT Technology Review
“Surgeons in Iran and India conducted a pilot trial of 20 people who were either blind or close to losing their sight from advanced keratoconus. This disease thins the cornea, the outermost transparent layer of the eye, and prevents the eye from focusing properly. The implant restored the cornea’s thickness and curvature. All 14 of the participants who had been blind before the operation had their vision restored, with three of them achieving perfect 20/20 vision.”


Swarms of Mini Robots Could Dig the Tunnels of the Future
Chris Baraniuk | Wired
“The firm proposes a future in which much smaller, roughly 3-meter-long robots shaped like half-cylinders zoom about underground via predrilled pipes. …Once inside them, the bots would use a robotic arm topped with a milling head to penetrate into the surrounding earth and carve out small voids that would then get filled with concrete or some other strong material. ‘We’re talking about thousands of them,’ says [hyperTunnel’s Patrick Lane-Nott]. ‘Much like an ant colony or a termite colony works in swarms.’i”


Sound Waves Let Researchers Build Stuff With the Force
Andrew Liszewski | Gizmodo
“What does the future of construction look like? Autonomous machines buzzing around a building site? Giant 3D printers extruding walls and floors? Looking forward even farther, researchers at the Public University of Navarre in Spain have been experimenting with using sound waves to make building materials simply float into position without any physical interaction required.”


3D-Stacked CMOS Takes Moore’s Law to New Heights
Marko Radosavljevic and Jack Kavalieros | IEEE Spectrum
“We’ve created experimental devices that stack atop each other, delivering logic that is 30 to 50 percent smaller. Crucially, the top and bottom devices are of the two complementary types, NMOS and PMOS, that are the foundation of all the logic circuits of the last several decades. We believe this 3D-stacked complementary metal-oxide semiconductor (CMOS), or CFET (complementary field-effect transistor), will be the key to extending Moore’s Law into the next decade.”


Ethereum Just Pulled Off Its Final Test Run Ahead of One of the Most Important Events in Crypto
MacKenzie Sigalos | CNBC
“Ethereum has been working to shift to a new model for securing the network called proof of stake. Rather than relying on energy-intensive mining, the new method requires users to leverage their existing cache of ether as a means to verify transactions and mint tokens. It uses far less power and is expected to translate into faster transactions. The final test took place Wednesday at around 9:45 pm ET.”


Hyundai Announces $400M AI, Robotics Institute Powered by Boston Dynamics
Brian Heater | Tech Crunch
“i‘Our mission is to create future generations of advanced robots and intelligent machines that are smarter, more agile, perceptive and safer than anything that exists today,’ [Marc] Raibert said in a release tied to the news. ‘The unique structure of the Institute—top talent focused on fundamental solutions with sustained funding and excellent technical support—will help us create robots that are easier to use, more productive, able to perform a wider variety of tasks, and that are safer working with people.’i”


VR Is as Good as Psychedelics at Helping People Reach Transcendence
Hana Kiros | MIT Technology Review
“On key metrics, a VR experience elicited a response indistinguishable from subjects who took medium doses of LSD or magic mushrooms. …Participants can partake in an experience called energetic coalescence: they gather in the same spot in the virtual-reality landscape to overlap their diffuse bodies, making it impossible to tell where each person begins and ends. The resulting sense of deep connectedness and ego attenuation mirrors feelings commonly brought about by a psychedelic experience.”


The iRobot Deal Would Give Amazon Maps Inside Millions of Homes
Khari Johnson | Wired
“Why is the Roomba company worth $1.7 billion to Amazon? It’s not the dust, it’s the data. …Roombas work in part by using sensors to map the homes they operate in. In a 2017 Reuters interview, iRobot CEO Colin Angle suggested the company might someday share that data with tech companies developing smart home devices and AI assistants. Combined with other recent acquisition targets, Amazon could wind up with a comprehensive look at what’s happening inside people’s homes.”


Are We Living in a Simulation?
Stephen Poole | The Guardian
“Is there any good reason to actually believe the simulation argument, though? …Chalmers observes that it is at least more plausible than earlier iterations of skepticism such as Descartes’s evil demon, simply because we now have functioning prototypes (video games, VR) of how such a simulation might work. Others have speculated that there may be clues to the fact that our universe is a simulation hidden in the very fabric of the ‘reality’ that we can investigate: perhaps the simulation cuts corners at very small scales or very high energies.”


Hospital and Drugmaker Move to Build Vast Database of New Yorkers’ DNA
Joseph Goldstein | The New York Times
“The Mount Sinai Health System began an effort this week to build a vast database of patient genetic information that can be studied by researchers—and by a large pharmaceutical company. The goal is to search for treatments for illnesses ranging from schizophrenia to kidney disease, but the effort to gather genetic information for many patients, collected during routine blood draws, could also raise privacy concerns.”

Image Credit: Jacky Watt / Unsplash

Kategorie: Transhumanismus

Jak vyzrát na inflaci? Internet zaplavují kryptoměnové podvody - bezpečnost - 1 hodina 22 min zpět
V době rostoucí inflace hledají lidé přirozeně způsoby, jak své úspory ochránit. Toho se snaží využít i vykutálení podvodníci, kteří je vybízejí k investicím do kryptoměn. Ve skutečnosti jim ale nabízejí falešné virtuální měny, které mnohdy spojují se jmény známých osobností, například amerického podnikatele a vizionáře Elona Muska.
Kategorie: Hacking & Security

Takhle kradou Čechům peníze. Přes SMS zprávy - bezpečnost - 1 hodina 36 min zpět
Škodlivé kódy se nešíří pouze přes nevyžádané e-maily a podvodné webové stránky, tuzemští uživatelé se s nimi mohou setkat klidně i v SMS zprávách. Přesně prostřednictvím nich se šíří v posledních týdnech nezvaný návštěvník MaliBot, který dokáže bankovní účty svých obětí pěkně provětrat. Před novou hrozbou varovala kyberbezpečnostní společnost Check Point, která zároveň popsala, jak útočníci pracují.
Kategorie: Hacking & Security

How Will Prediction Models Impact the Future of Vehicle Maintenance? – RTInsights

Home AI - 2 hodiny 8 min zpět

AI technology, and specifically deep learning, has matured significantly over the past few years and, together with powerful computing technology …

Link to Full Article: Read Here

Kategorie: Transhumanismus
Syndikovat obsah