Menu

Blog

Archive for the ‘security’ category: Page 121

Jul 24, 2016

DARPA’s Cyber Grand Challenge Aims To Beat Viruses for Good

Posted by in categories: computing, robotics/AI, security

Get ready, set, GO!!!


The culmination of the Cyber Grand Challenge, the world’s first tournament of automated computer security systems hosted by DARPA, will take place next month in Las Vegas, Nevada.

Read more

Jul 24, 2016

An AI Watched 600 Hours of TV and Started to Accurately Predict What Happens Next

Posted by in categories: computing, information science, robotics/AI, security

MIT researchers have created an algorithm that hopes to understand human visual social cues and predict what would happen next. Giving AI the ability to understand and predict human social interaction could one day pave the way to efficient home assistant systems as well as intelligent security cameras that can call an ambulance or the police ahead of time.

MIT’s Computer Science and Artificial Intelligence Laboratory created an algorithm that utilizes deep learning, which enables artificial intelligence (AI) to use patterns of human interaction to predict what will happen next. Researchers fed the program with videos featuring human social interactions and tested it to see if it “learned” well enough to be able to predict them.

Continue reading “An AI Watched 600 Hours of TV and Started to Accurately Predict What Happens Next” »

Jul 21, 2016

MP scamsters find a way to clone thumbprint, beat biometric test

Posted by in categories: privacy, security

Why biometrics will need and form of id to properly perform security checks.


Impersonators in many cases apparently had used synthetic bandages bearing thumb impressions of actual candidates. “Traditionally, fingerprints were used as evidence in court cases and even in high-tech security systems. But revelations by those arrested for impersonation in Bihar are proving to the world of forensic sciences that creating forged, latent fingerprints is relatively easy,” claims Dr Anand Rai, whistle-blower in the MPPEB scam. In the past, Rai had requested STF officials to look into interrogation reports of 140 impersonators arrested by the Bihar police during a constable recruitment exam.

Source: http://timesofindia.indiatimes.com/city/bhopal/MP-scamsters-…311540.cms

Continue reading “MP scamsters find a way to clone thumbprint, beat biometric test” »

Jul 21, 2016

NYC’s next subway cars have WiFi and USB ports built-in

Posted by in categories: internet, security

The New York City subway system is gearing up for a major overhaul meant to bring a “modernized look and feel” to lighting, wayfinding and subway cars by the year 2020. At a press conference on Monday, Governor Andrew Cuomo announced the Metropolitan Transportation Authority’s $27 billion, five-year plan to add 1,025 new subway cars, more informative digital screens, better security features and — most importantly for anyone who needs to get some work done underground – WiFi and USB charging ports in the cars and stations.

“People want to work, and they want their device to work 24 hours a day,” Governor Cuomo during the event at the New York Transit Museum in Brooklyn. “They don’t want to have to look up. There has to be WiFi, and there need to be charging ports.”

In addition to free juice and an internet connection, the new subway cars will sport “full color digital customer information displays,” as well as new digital ad space. On a practical level, the cars will offer wider doors to expedite boarding times and up to 750 of new cars will feature an open-ended design that allows for more passenger space.

Continue reading “NYC’s next subway cars have WiFi and USB ports built-in” »

Jul 19, 2016

Law enforcement and the Dark Web, a never ending battle

Posted by in categories: biotech/medical, internet, law enforcement, security

Dark Net v. Law Enforcement — who is winning and who is struggling.


The Dark web is a privileged place for cyber criminals that, under specific conditions, could operate in anonymity.

The United Nation’s Office on Drugs and Crime (UNODC) has published its annual report that contains a specific mention to the illicit trade of goods and drugs in this hidden part of the web.

Continue reading “Law enforcement and the Dark Web, a never ending battle” »

Jul 19, 2016

Darknet Market Raises Its Ugly Head Again

Posted by in categories: internet, law enforcement, security

Their back.


Cyber Mafias The internet has always been the most preferred platform for carrying out illicit activities. The underground black markets are not a new phenomenon in the virtual world. However, these black markets are now becoming more sophisticated and organized. Darkness is one such underground marketplaces which are rising and becoming uglier. Though law enforcement agencies have brought down the number of such illegal platforms, the Darknet markets are up and running. Darknet markets are growing bigger than ever with over $50 million UDS transactions reportedly flowing through these marketplaces and it is a big challenge in front of security agencies and governments to finish this underground industry from its roots.

Decoding Darknet

Continue reading “Darknet Market Raises Its Ugly Head Again” »

Jul 18, 2016

IBM Unveils New Cloud Blockchain Security Service

Posted by in categories: biotech/medical, bitcoin, security

I like this article because I have for years looked at options to address the counterfeiting issues which is a extremely costly criminal industry around diamonds and artwork. As we have seen with synthetic diamonds in their use in QC and medical technology there is a lot that technology can do in addressing the counterfeiting issues as well as registration & certification space. Also, could registered & embedded serialized stones be another form of id for the consumer who wears their accessory with the stone? I believe it can be.


IBM launches a new high security blockchain service that uses hardware to protect valuable data, with provenance startup Everledger as its first customer.

Read more

Jul 18, 2016

Researcher builds technology to control drone swarms with his mind

Posted by in categories: computing, drones, neuroscience, robotics/AI, security

About 5 years ago a friend of mine at Microsoft (Mitch S.) had a vision of making a new security model around drone swarms and a form of BMI technology. Glad to see the vision come true.


Scientists have discovered how to control multiple robotic drones using the human brain, an advance that can help develop swarms of search and rescue drones that are controlled just by thought.

Continue reading “Researcher builds technology to control drone swarms with his mind” »

Jul 18, 2016

Can we find a quantum-resistant algorithm before it’s too late?

Posted by in categories: computing, information science, internet, quantum physics, security

The warning from QuintessenceLabs’ CTO John Leisoboer is stark. “When sufficiently powerful quantum computers become generally available,” he says, “it’s guaranteed to break all existing cryptographic systems that we know of.”

In other words, he adds, “Everything that we’re doing today will be broken.”

It’s a sentiment echoed by Google’s Chrome security software engineer Matt Braithwaite who wrote in a blog post earlier this month that “a hypothetical, future quantum computer would be able to retrospectively decrypt any internet communication that was recorded today”.

Continue reading “Can we find a quantum-resistant algorithm before it’s too late?” »

Jul 11, 2016

Manoj Saxena talks Artificial Intelligence with Gigaom

Posted by in categories: finance, health, robotics/AI, security

Nice chime on QC.


Manoj Saxena is the executive chairman of CognitiveScale and a founding managing director of The Entrepreneurs’ Fund IV (TEF), a $100m seed fund focused exclusively on the cognitive computing space.

Saxena is also the chairman of Federal Reserve Bank of Dallas, San Antonio branch and Chairman, SparkCognition an Austin based cognitive security and safety analytics company.

Continue reading “Manoj Saxena talks Artificial Intelligence with Gigaom” »