Menu

Blog

Archive for the ‘security’ category: Page 132

Feb 20, 2016

United Nations CITO: Artificial intelligence will be humanity’s final innovation

Posted by in categories: computing, internet, quantum physics, robotics/AI, security

I hate to break the news to the UN’s CITO — has she ever heard of “Quantum Technology?” After AI flood into the scene; the next innovation that I and others are working on is Quantum Computing which will make AI, Internet, Cyber Security, devices, platforms, medical technology more advance with incredible performance.


The United Nations Chief Information Technology Officer spoke with TechRepublic about the future of cybersecurity, social media, and how to fix the internet and build global technology for social good.

Artificial intelligence, said United Nations chief information technology officer Atefeh Riazi, might be the last innovation humans create.

Read more

Feb 20, 2016

Volvo wants your phone to be the only car key you ever need

Posted by in categories: mobile phones, security, transportation

By next year, Volvo wants to become the first manufacturer to sell cars without keys. Instead of a physical key or even a Bluetooth key fob, Volvo customers will use a “digital key” in a smartphone app to access (and share that access) to their cars.

Drivers will be able to use the app (and a Bluetooth connection) to start their car, open the trunk, mess with the security system, or — like with a key fob — simply have the car unlock as you approach it. But the biggest implications of this change could be for ride-sharing. Customers (and manufacturers) have begun entertaining new ideas about how to use cars to get around without owning them outright, and something like a digital key makes it easier for multiple people to have control over one particular vehicle. That could mean something as simple as just sharing access with your family, but Volvo will also make it work on the cars it provides to Sunfleet, a Swedish car-sharing service.

Read more

Feb 19, 2016

Could hacking your pacemaker and holding it ransom be a 2016 cyber trend?

Posted by in categories: biotech/medical, computing, security

So, we’re now adding possible murder to the charges of hackers?.


The Hollywood Presbyterian Medical Center in Los Angeles paid a ransom of 17,000 U.S. dollars to hackers after two weeks of being shut out of their computer network. We talk to cyber security expert Jay Radcliffe about medical cyber vulnerabilities.

Read more

Feb 19, 2016

Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016

Posted by in categories: privacy, security, transportation

Northrup Grumman’s new Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases being showcase at the WEST 2016 navel conference on February 17.


Northrop Grumman Corporation (NYSE: NOC) has announced that it will be showcasing key naval capabilities at the WEST 2016 navel conference on February 17, 2016. The corporation will unveil its full-spectrum cyber solutions, biometric defense solutions, unmanned aircraft and much more at the event. WEST 2016 is co-sponsored by AFCEA and the US Naval institute in San Diego. Northrop Grumman is a platinum sponsor of the conference, which is themed “how we make the strategy work.”

The defense contractor will be showcasing its sea serving operations and capabilities that will help the US armed forces combat challenges and difficulties more efficiently. It is also expected to display how it integrates cyber-technology into all of its defense segments. The key highlight of its cyber-suite is its Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases.

Continue reading “Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016” »

Feb 19, 2016

Don’t Miss Out on This Cyber Security Stock

Posted by in categories: cybercrime/malcode, security

Unless you haven’t been in touch with the real world lately; it truly would be hard not to recognize that real investment opportunities exist in cyber security technology space.


Don’t Miss Out on This Cyber Security Stock, Stocks: CYBR, FEYE, PANW, CSCO, release date: Feb 19, 2016.

Read more

Feb 18, 2016

Can Wearable Technology Threaten the Cyber Security of Your Business?

Posted by in categories: business, cybercrime/malcode, security, wearables

Better ditch the watch and shirt.

Wearables invite Cyber Security Risks in the office.


Smart wearable technology has a future-is-now feel to it. Unfortunately, it also has a your-data-is-vulnerable feel as well. Here’s how smart wearables are putting your company’s cyber security at risk.

Read more

Feb 18, 2016

Man vs machine: Bio-chip implants will make us stronger but an open target for hackers

Posted by in categories: biotech/medical, cybercrime/malcode, privacy, security

Absolutely; it will and that is the real danger in technology. This is why security roles will be increasingly in demand over the next 7 to 10 years.


Kaspersky director Marco Preuss looks at the future of biometric technology and bio-cybersecurity.

Read more

Feb 18, 2016

Infrared could cast a light on better computer vision

Posted by in categories: computing, drones, security, virtual reality

InVisage has just announced their release of a new Infrared scanner for eye scan security recognition device. Since InVisage also developed and release a new film leveraging Q-Dot technology; the scanner is also leveraging this technology for more accurate readings and imaging.


InVisage’s new image sensor for infrared cameras could help drones avoid trees and could aid virtual reality headsets in seeing where you’re pointing.

Read more

Feb 17, 2016

Mazar BOT Can Erase Android Phones

Posted by in categories: cybercrime/malcode, internet, mobile phones, robotics/AI, security

Lookout for MAZAR Bot — Androids should be scared.


One interesting feature of Mazar is that it can not be installed on smartphones running Android with “Russian” selected as the operating system’s language.

The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.

Continue reading “Mazar BOT Can Erase Android Phones” »

Feb 17, 2016

Apple CEO Tim Cook’s Dangerous Game

Posted by in categories: business, computing, mobile phones, robotics/AI, security, transportation

Government and tech + telecom & ISPs need to come to an agreement in how to ensure innocent people’s privacy are respected. When a person murders, stalk, threaten, kidnap, and/ or assault a person then we have a responsibility first to protect the innocent public. And, with the resistance being displayed by Apple, are we running the risk of further alienating the consumers and business customers more when it comes to releasing AI like robots, self driving cars, etc. onto the public where criminals can buy AI technology and use it to hurt others?

We really need to be addressing these issues soon.


Tim Cook is playing a dangerous game of brinkmanship with the U.S. government. In the process, he may set in motion political and judicial processes that will endanger the security of all our mobile devices.

Continue reading “Apple CEO Tim Cook’s Dangerous Game” »