Blog

Archive for the ‘privacy’ category: Page 19

Feb 17, 2018

Japanese researchers develop ultrathin, highly elastic skin display

Posted by in categories: biotech/medical, health, mobile phones, privacy, wearables

A new ultrathin elastic display that fits snugly on the skin can show the moving waveform of an electrocardiogram recorded by a breathable, on-skin electrode sensor. Combined with a wireless communication module, this integrated biomedical sensor system, called “skin electronics,” can transmit biometric data to the cloud.

This latest research by a Japanese academic-industrial collaboration, led by Professor Takao Someya at the University of Tokyo’s Graduate School of Engineering, is slated for a news briefing and talk at the AAAS Annual Meeting in Austin, Texas on February 17th.

Thanks to advances in semiconductor technology, wearable devices can now monitor health by measuring vital signs or taking an electrocardiogram, and then transmitting the data wirelessly to a smartphone. The readings or electrocardiogram waveforms can be displayed on the screen in real time, or sent to the cloud or a memory device where the information is stored.

Continue reading “Japanese researchers develop ultrathin, highly elastic skin display” »

Jan 28, 2018

How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI

Posted by in categories: cybercrime/malcode, military, privacy, robotics/AI

A look at Lt. Gen. Paul Nakasone’s public statements about artificial intelligence, offense, and defense.

The Army general likely to be tapped to head U.S. Cyber Command and the NSA has some big plans for deploying cyber forces and using artificial intelligence in information attacks.

Lt. Gen. Paul Nakasone, who currently leads U.S. Army Cyber Command, is expected to nominated in the next few months to replace Adm. Michael Rogers, as first reported by The Cipher Brief (and confirmed by the Washington Post and a Pentagon source of our own). But caution is in order: the rumor mill says several other contenders are in the running, including Army Lt. Gen. William Mayville. Neither Cyber Command nor the Pentagon would comment about the potential nomination.

Continue reading “How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI” »

Jan 12, 2018

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

Posted by in categories: encryption, military, privacy

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Here are few of the key areas:

Continue reading “The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators” »

Dec 10, 2017

The WIRED Guide to Digital Security

Posted by in categories: cybercrime/malcode, mobile phones, privacy

IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.


In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Read more

Nov 20, 2017

Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them

Posted by in category: privacy

He said, she said.

Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them.

Moscow-based AV provider challenges claims it helped Russian spies.

Continue reading “Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them” »

Nov 12, 2017

Life without cash

Posted by in categories: innovation, privacy

As digital innovations continue to transform the way we live, a lot of things we once took for granted are falling by the wayside. Paper money and coins could soon be among them.

The use of digital payments in all forms is fast becoming commonplace. A cashless society, once considered remote if not unimaginable, is now more imminent, with staggering amounts of transactions being digitally processed daily. In Nordic countries, especially Sweden and Denmark, the majority of all transactions are now made through electronic or digital means.

Governments around the world are working to prepare their citizens to fully benefit from a digital future. India, for example, has hundreds of millions of people in the database of its Aadhaar biometric identity and payment system. But the country’s Supreme Court recently ruled that the system could compromise citizens’ fundamental right to privacy, underscoring one of the key concerns about the new digital era.

Read more

Oct 12, 2017

Israel hacked Kaspersky, then tipped the NSA that its tools had been breached

Posted by in categories: cybercrime/malcode, government, privacy

Israel notified the NSA, where alarmed officials immediately began a hunt for the breach, according to people familiar with the matter, who said an investigation by the agency revealed that the tools were in the possession of the Russian government.

Israeli spies had found the hacking material on the network of Kaspersky Lab, the global anti-virus firm under a spotlight in the United States because of suspicions that its products facilitate Russian espionage.

Last month, the Department of Homeland Security instructed federal civilian agencies to identify Kaspersky Lab software on their networks and remove it on the grounds that “the risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. national security.” The directive followed a decision by the General Services Administration to remove Kaspersky from its list of approved vendors. And lawmakers on Capitol Hill are considering a governmentwide ban.

Continue reading “Israel hacked Kaspersky, then tipped the NSA that its tools had been breached” »

Oct 7, 2017

Using Behavioral Biometrics for Wearable Glasses

Posted by in categories: privacy, security, wearables

Through behavioral biometrics, a wearable glasses continuous authentication system improves privacy protection by detecting imposters through voice & touch.

Read more

Oct 6, 2017

This Artificial Intelligence System Can ID Faces Even If They Are Disguised

Posted by in category: privacy

Head coverings and fake beards have foiled face recognition technologies, but a new system overcomes many of the challenges while raising privacy concerns.

Read more

Oct 5, 2017

Transparency and Privacy: what we need, want and do not understand

Posted by in categories: privacy, transparency

David Brin: “Our midweek posting resumes the ongoing saga of transparency and freedom, and how (surprise?) each year’s declared “secure” system gets stripped bare, in the next. Now it’s Yahoo and Equifax and Billions of records. Millions of sincere people can see an Orwellian nightmare looming. Yet, the common reflex is to call for more shadows and walls! For us to HIDE from elites! It won’t work. It cannot work. It will never work. But there is an alternative. The very same trick that got us our freedom and wealth, in the first place.”

“We will not preserve freedom by hiding. Nor will it ever be possible to conceal info from elites. Moreover, that is not how we got the freedom that we already have.”

“We will remain free by aggressively applying these tools upon all elites. It is the only way we ever got freedom and it is the only way we can retain it.”

Continue reading “Transparency and Privacy: what we need, want and do not understand” »

Page 19 of 31First1617181920212223Last