Blog

Archive for the ‘security’ category: Page 29

Aug 4, 2023

Kenya suspends Sam Altman’s eyeball-scanning crypto project

Posted by in categories: cryptocurrencies, government, security

Kenya has ordered Worldcoin to stop collecting data in the country due to privacy and security concerns.

Kenya is pumping the brakes on Worldcoin — the eyeball-scanning crypto project launched by OpenAI founder Sam Altman. The Kenyan government has ordered Worldcoin to stop collecting data in the country while it reviews the project for potential privacy and security risks, as reported earlier by Reuters.

Worldcoin is a project that uses your iris to create a unique digital identity, which you can then link to digital currencies managed through the company’s World App. The project launched last week and has had people lining up to get their eyeballs scanned by the shiny, silver orbs Worldcoin… More.

Continue reading “Kenya suspends Sam Altman’s eyeball-scanning crypto project” »

Jul 31, 2023

Hackers Abusing Windows Search Feature to Install Remote Access Trojans

Posted by in category: security

A legitimate Windows search feature is being exploited by unknown malicious actors to download arbitrary payloads from remote servers and compromise targeted systems with remote access trojans such as AsyncRAT and Remcos RAT.

The novel attack technique, per Trellix, takes advantage of the “search-ms:” URI protocol handler, which offers the ability for applications and HTML links to launch custom local searches on a device, and the “search:” application protocol, a mechanism for calling the desktop search application on Windows.

“Attackers are directing users to websites that exploit the ‘search-ms’ functionality using JavaScript hosted on the page,” security researchers Mathanraj Thangaraju and Sijo Jacob said in a Thursday write-up. “This technique has even been extended to HTML attachments, expanding the attack surface.”

Jul 31, 2023

SMART ePANTS Program Pursuing Advanced Smart Textiles for Intelligence Community, DoD, DHS

Posted by in categories: security, wearables

Not surprisingly, the Intelligence Community (IC), Department of Defense (DoD), and first responders at the Department of Homeland Security (DHS) and other agencies are also interested in wearable electronics. With its Smart Electrically Powered and Networked Textile Systems (SMART ePANTS) program, the Intelligence Advanced Research Projects Activity (IARPA) is delivering the largest single investment ever made1 to make Advanced Smart Textiles2 (AST) a reality.

According to SMART ePANTS Program Manager, Dr. Dawson Cagle, developing clothing with sensor systems that can record audio, video, and geolocation data would significantly improve the capabilities of IC, DoD, DHS staff, and others working in dangerous or high-stress environments, such as crime scenes and arms control inspections. Dr. Cagle also asserted that ASTs could collect information one doesn’t notice, which would increase job effectiveness.

Jul 26, 2023

Hypermodal AI Converges Predictive, Causal And Generative AI

Posted by in categories: business, robotics/AI, security

In software application development environments, the consensus is gravitating towards the use of AI as a helping and testing mechanism, rather than it being wholly offered the chance to create software code in and of itself. The concept here is that if so-called citizen developer business laypeople start creating code with software robots, they will never be able to wield the customization power (and ability to cover security risks) that hard-core software developers have.

As we now grow with AI and start to become more assured in terms of where its impact should be felt, we may now logically look to the whole spectrum of automation that it offers. This involves the concept of so-called hypermodal AI i.e. intelligence capable of working in different ‘modes’, some of which will predict, some of which will help determine and some of which will generate.

Today describing itself as unified observability and security platform company (IT vendors are fond of changing their opening ‘elevator sell’ line every few years), Dynatrace has now expanded its Davis AI engine to create hypermodal AI that converges fact-based predictive AI, with causal AI insights with new generative AI capabilities.

Jul 25, 2023

Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs

Posted by in categories: mobile phones, security

Apple has rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and Safari to address several security vulnerabilities, including one actively exploited zero-day bug in the wild.

Tracked as CVE-2023–38606, the shortcoming resides in the kernel and permits a malicious app to modify sensitive kernel state potentially. The company said it was addressed with improved state management.

“Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1,” the tech giant noted in its advisory.

Jul 25, 2023

Critical Zero-Days in Atera Windows Installers Expose Users to Privilege Escalation Attacks

Posted by in category: security

Zero-day vulnerabilities in Windows Installers for the Atera remote monitoring and management software could act as a springboard to launch privilege escalation attacks.

The flaws, discovered by Mandiant on February 28, 2023, have been assigned the identifiers CVE-2023–26077 and CVE-2023–26078, with the issues remediated in versions 1.8.3.7 and 1.8.4.9 released by Atera on April 17, 2023, and June 26, 2023, respectively.

“The ability to initiate an operation from a NT AUTHORITY\SYSTEM context can present potential security risks if not properly managed,” security researcher Andrew Oliveau said. “For instance, misconfigured Custom Actions running as NT AUTHORITY\SYSTEM can be exploited by attackers to execute local privilege escalation attacks.”

Jul 24, 2023

Research to merge human brain cells with AI secures national defence funding

Posted by in categories: bioengineering, biological, neuroscience, robotics/AI, security

“The new research program, led by Associate Professor Adeel Razi, from the Turner Institute for Brain and Mental Health, in collaboration with Melbourne start-up Cortical Labs, involves growing around 800,000 brain cells living in a dish, which are then “taught” to perform goal-directed tasks. Last year the brain cells’ ability to perform a simple tennis-like computer game, Pong, received global attention for the team’s research.”


Monash University-led research into growing human brain cells onto silicon chips, with new continual learning capabilities to transform machine learning, has been awarded almost $600,000 AUD in the prestigious National Intelligence and Security Discovery Research Grants Program.

According to Associate Professor Razi, the research program’s work using lab-grown brain cells embedded onto silicon chips, “merges the fields of artificial intelligence and synthetic biology to create programmable biological computing platforms,” he said.

Continue reading “Research to merge human brain cells with AI secures national defence funding” »

Jul 23, 2023

Low-tech secret handshake box tests 99.9% effective against car theft

Posted by in categories: security, transportation

With US car thefts up 25.1% since 2019, it’s clear that high-tech key fob immobilizers aren’t cutting the mustard. But this might: UMich researchers have created a charmingly low-tech anti-theft device that turns the whole car into a security keypad.

Keyless entry and ignition are a brilliant step up in convenience from the old “stick key in hole and turn” method of starting cars, but thieves and hackers with a bit of know-how and some specialist gear are finding late-model keyless cars quick and easy to break into and steal. Between this kind of thing and Tik Tok car theft challenges, criminals are having a field day in the post-COVID era.

A team at the University of Michigan has come up with a fun solution that doesn’t use wireless signals at all. The “Battery Sleuth,” as they’ve called it, sits between the car’s battery and its electrical system, and measures fluctuations in voltage, looking for a specific set of voltage changes that act as a secret handshake of sorts between driver and car. Only when this handshake is complete will the device let the full power of the battery through to fire up the starter motor.

Jul 22, 2023

Biden Administration Secures Voluntary Commitments From AI Firms: A Step Forward Or Empty Rhetoric?

Posted by in categories: governance, government, robotics/AI, security

The Biden administration announced on Friday a voluntary agreement with seven leading AI companies, including Amazon, Google, and Microsoft. The move, ostensibly aimed at managing the risks posed by AI and protecting Americans’ rights and safety, has provoked a range of questions, the foremost being: What does the new voluntary AI agreement mean?

At first glance, the voluntary nature of these commitments looks promising. Regulation in the technology sector is always contentious, with companies wary of stifling growth and governments eager to avoid making mistakes. By sidestepping the direct imposition of command and control regulation, the administration can avoid the pitfalls of imposing… More.


That said, it’s not an entirely hollow gesture. It does emphasize important principles of safety, security, and trust in AI, and it reinforces the notion that companies should take responsibility for the potential societal impact of their technologies. Moreover, the administration’s focus on a cooperative approach, involving a broad range of stakeholders, hints at a potentially promising direction for future AI governance. However, we should also not forget the risk of government growing too cozy with industry.

Continue reading “Biden Administration Secures Voluntary Commitments From AI Firms: A Step Forward Or Empty Rhetoric?” »

Jul 22, 2023

The Legal Sector And Cloud Storage: Superior Document Management

Posted by in categories: law, security

Secondly, remember that all cloud services are not created equal. So, take time to select a vendor that aligns with your firm’s security, scalability and regulatory compliance requirements. Implement robust security measures at your end and prepare a plan for data backups and disaster recovery.

Lastly, remember that change management is essential. Keep the lines of communication open, address concerns proactively and involve your team throughout the transition process. Navigating these challenges can set you on the path to successful digital transformation.

Are you all set to bid farewell to those paper mountains and extend a warm welcome to the digital cloud? Cloud storage equips your law firm not only to brace for the future but to lead the vanguard in this digital revolution. Bear in mind, the future isn’t a distant entity floating far beyond our reach; it’s here. So, what’s your next strategic move in this exciting game of legal digital transformation?

Page 29 of 146First2627282930313233Last