Blog

Archive for the ‘privacy’ category: Page 10

Nov 28, 2020

Privacy campaigner flags concerns about Microsoft’s creepy Productivity Score

Posted by in category: privacy

It seems not everyone is happy about Microsoft’s productivity measuring tool. 😃


Watching, always watching.

Oct 16, 2020

A virtual reality game that integrates tactile experiences using biometric feedback

Posted by in categories: entertainment, privacy, robotics/AI, virtual reality, wearables

Over the past few decades, technological advances have enabled the development of increasingly sophisticated, immersive and realistic video games. One of the most noteworthy among these advances is virtual reality (VR), which allows users to experience games or other simulated environments as if they were actually navigating them, via the use of electronic wearable devices.

Most existing VR systems primarily focus on the sense of vision, using headsets that allow users to see what is happening in a or in another simulated environment right before their eyes, rather than on a screen placed in front of them. While this can lead to highly engaging visual experiences, these experiences are not always matched by other types of sensory inputs.

Researchers at Nagoya University’s School of Informatics in Japan have recently created a new VR game that integrates immersive audiovisual experiences with . This game, presented in a paper published in the Journal of Robotics, Networking and Artificial Life, uses a player’s biometric data to create a spherical object in the VR space that beats in alignment with his/her heart. The player can thus perceive the beating of his/her heart via this object visually, auditorily and tactually.

Sep 24, 2020

Ripjar, founded by GCHQ alums, raises $36.8M for AI that detects financial crime

Posted by in categories: business, cybercrime/malcode, finance, government, privacy, robotics/AI

Financial crime as a wider category of cybercrime continues to be one of the most potent of online threats, covering nefarious activities as diverse as fraud, money laundering and funding terrorism. Today, one of the startups that has been building data intelligence solutions to help combat that is announcing a fundraise to continue fueling its growth.

Ripjar, a U.K. company founded by five data scientists who previously worked together in British intelligence at the Government Communications Headquarters (GCHQ, the U.K.’s equivalent of the NSA), has raised $36.8 million (£28 million) in a Series B, money that it plans to use to continue expanding the scope of its AI platform — which it calls Labyrinth — and scaling the business.

Labyrinth, as Ripjar describes it, works with both structured and unstructured data, using natural language processing and an API-based platform that lets organizations incorporate any data source they would like to analyse and monitor for activity. It automatically and in real time checks these against other data sources like sanctions lists, politically exposed persons (PEPs) lists and transaction alerts.

Aug 23, 2020

What does your voice say about you?

Posted by in category: privacy

Your accent can nod to where you come from; the pace of your speech can reveal your emotional state; your voiceprint can be used to identify you.

Linguists, companies and governments are now parsing our voices for these details, using them as biometric tools to uncover more and more information about us.

While a lot of this information is used to make our lives easier, it has also been used to controversial and worrying effect.

Aug 16, 2020

The NSA and FBI Expose Fancy Bear’s Sneaky Hacking Tool

Posted by in categories: cybercrime/malcode, privacy

To revist this article, visit My Profile, then View saved stories.

Aug 14, 2020

Tor and anonymous browsing – just how safe is it?

Posted by in category: privacy

An article published on the open-to-allcomers blogging site Medium earlier this week has made for some scary headlines.

Written as an independent research piece by an author going only by nusenu, the story is headlined:

Aug 13, 2020

FBI and NSA expose new Linux malware Drovorub, used by Russian state hackers

Posted by in categories: cybercrime/malcode, military, privacy

The FBI and NSA issue joint security alert containing technical details about new Linux malware developed by Russia’s military hackers.

Aug 12, 2020

Deepfakes declared top AI threat, biometrics and content attribution scheme proposed to detect them

Posted by in categories: privacy, robotics/AI

Biometrics may be the best way to protect society against the threat of deepfakes, but new solutions are being proposed by the Content Authority Initiative and the AI Foundation.

Deepfakes are the most serious criminal threat posed by artificial intelligence, according to a new report funded by the Dawes Centre for Future Crime at the University College London (UCL), among a list of the top 20 worries for criminal facilitation in the next 15 years.

The study is published in the journal Crime Science, and ranks the 20 AI-enabled crimes based on the harm they could cause.

Aug 12, 2020

Artificial Intelligence And Data Privacy – Turning A Risk Into A Benefit

Posted by in categories: information science, privacy, robotics/AI

On the higher end, they work to ensure that development is open in order to work on multiple cloud infrastructures, providing companies the ability to know that portability exists.

That openness is also why deep learning is not yet part of a solution. There is still not the transparency needed into the DL layers in order to have the trust necessary for privacy concerns. Rather, these systems aim to help manage information privacy for machine learning applications.

Artificial intelligence applications are not open, and can put privacy at risk. The addition of good tools to address privacy for data being used by AI systems is an important early step in adding trust into the AI equation.

Aug 8, 2020

30-year-old file format behind MacOS hack

Posted by in categories: cybercrime/malcode, privacy

A security expert revealed this week that an exploit commonly used against Windows users who own Microsoft Office can sneak into MacOS systems as well.

A former NSA security specialist who addressed the Black Hat security conference this week summarized his research into the new use for a very old exploit.

Patrick Wardle explained that the exploit capitalizes on the use of macros in Microsoft Office. Hackers have long used the approach to trick users into granting permission to activate the macros, which in turn surreptitiously launch .

Page 10 of 31First7891011121314Last