security

artificial intelligenceHow You Walk and Hold Your Device Could Replace Passwords

The Defense Information Systems Agency (DISA) is looking at 46 ways to identify a person for mobile devices that do not involve passwords. They are looking at how you walk, swipe and hold your device among other methods to not …

darpaDARPA Wants to Include Scalable Defense Mechanisms into Chip Designs

Cybersecurity threats have moved from high in the software stack to towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex …

artificial intelligenceTencent Keen Security Lab Tricks Tesla Autopilot into Oncoming Traffic

Tesla Autopilot recognizes lanes and assists control by identifying road traffic markings. Tencent Keen Labs proved that by placing interference stickers on the road, the Autopilot system will capture this information and make an abnormal judgment, which causes the vehicle …

camerasTesla Adds Sentry and Dog Modes

Tesla has activated a Sentry mode for its cars. Sentry Mode puts the Tesla vehicle into a “Standby” state. The car’s external cameras to detect potential threats. If a minimal threat is detected, such as someone leaning on a car, …

cameraComputers Can Read Minds But Digital Big Brother Has Better Technology

People freak out when they discover that computers and MRI can already read our minds. Columbia University researchers just announced the ability of computers and MRI to read brain signals and convert them into clear spoken words.

camerasTesla Cars With Autopilot 2+ Hardware Will Watch Over the Car in Sentry Mode

Elon Musk tweeted that Tesla is working on Sentry Mode for 360° dashcam surveillance. The car cameras will record activity like someone hitting a Tesla car parked in a parking lot. More software and storage will be used to activate …

darpaDARPA Creating Physically Provable Assurances Around Data Security and Privacy

DARPA is seeking to create new software and hardware architectures that provide physically provable assurances around data security and privacy. Keeping a system completely disconnected from all means of information transfer is an unrealistic security tactic. Modern computing systems must …

big dataThe Next Big Data Debacle Could Involve Amazon and China

Data is now essentially the lifeblood of today’s modern industries. Not only does it provide insights for effective decision-making but it can also be used to predict and influence consumer and user behavior. Companies like Amazon and Netflix, for instance, …

googleGoogle+ had security bug, did not report it and will shutdown consumer version

Google is shutting down Google+ the consumer version of Google+ in ten months. Google+ is better suited as an enterprise product where co-workers can engage in internal discussions on a secure corporate social network. A security bug allowed third-party developers …

securityApple and DHS deny China chip hacking of servers

Apple and DHS (Department of Homeland Security) have denied the Bloomberg report of China chip hacking the security of servers. Here is the DHS statement: The Department of Homeland Security is aware of the media reports of a technology supply …