Menu

Blog

Archive for the ‘security’ category: Page 59

Jun 1, 2021

Siva Balu — VP / Chief Information Officer — YMCA of the U.S.A. — People, Potential, & Purpose

Posted by in categories: biotech/medical, business, food, information science, life extension, robotics/AI, security

With 2700 locations across 10000 U.S. communities, YMCA is becoming a major hub for healthy living — From vaccinations and diabetes prevention programs, to healthy aging and wellness — Siva Balu, VP/Chief Information Officer — The Y of the U.S.A.


Mr. Siva Balu is Vice President and Chief Information Officer of YMCA of the U.S. (Y-USA), where he is working to rethink and reorganize the work of the organization’s information technology strategy to meet the changing needs of Y-USA and Ys throughout the country.

Continue reading “Siva Balu — VP / Chief Information Officer — YMCA of the U.S.A. — People, Potential, & Purpose” »

May 27, 2021

Scientists recognize intruders in noise

Posted by in categories: biological, economics, mathematics, security

## MATHEMATICS • MAY 24, 2021

# *Noise is commonly discarded, but identifying patterns in noise can be very useful.*

*Generalize the Hearst exponent by adding more coefficients in order to get a more complete description of the changing data. This makes it possible to find patterns in the data that are usually considered noise and were previously impossible to analyze.*

Continue reading “Scientists recognize intruders in noise” »

May 26, 2021

Nora Super — Milken Institute — Center for the Future of Aging — Alliance to Improve Dementia Care

Posted by in categories: education, finance, life extension, neuroscience, policy, security

Senior director, milken institute center for the future of aging, milken institute; executive director, alliance to improve dementia care.


Nora Super is the Senior Director of the Milken Institute Center for the Future of Aging (CFA) (https://milkeninstitute.org/centers/center-for-the-future-of-aging) and the Executive Director of the Milken Institute Alliance to Improve Dementia Care (https://milkeninstitute.org/centers/center-for-the-future-of…tia-care).

Continue reading “Nora Super — Milken Institute — Center for the Future of Aging — Alliance to Improve Dementia Care” »

May 25, 2021

Rich people are spending millions on underground bunkers equipped with robot security and movie theaters after a year of man-made and natural threats

Posted by in categories: robotics/AI, security

Interest in such plush panic rooms is skyrocketing, he said. His firm started offering high-end shelters and the like a decade ago — of the 232 it’s built so far, 200 were commissioned in the last five years.


One $14 million panic-room project built in the San Jose Valley includes a bowling alley and indoor pool.

May 22, 2021

Misconfiguration of third party mobile apps exposes the data of 100 million users

Posted by in category: security

Despite the obvious benefits of contemporary cloud-based, mobile application development solutions—such as cloud storage, notification management, real-time databases, and analytics—many developers of these solutions fail to properly take into account the potential security risks involved when these apps are misconfigured.

Most recently, Check Point Research has discovered misconfigurations and implementation issues that have exposed the data of 100 million mobile application users. This kind of exposure places both the users as well as the at risk of reputation threats and security damage. In this instance, the developers left open notification managers, storage locations and real-time databases to access by attackers, thus leaving 100 million users vulnerable.

In terms of real-time databases, can help mobile app users sync their data to the cloud in real time. However, when developers do not correctly implement this service with authentication, any user can theoretically access that database, including all mobile customer data. In fact, researchers expressed surprise at facing no obstacles to accessing these open databases for certain apps on Google Play. Some of the aspects obtainable in this case were device locations, email addresses, passwords, private chats and user identifiers, among other attack vectors. Such vulnerabilities leave all of these users at risk for fraud and identity theft.

May 21, 2021

China showcases artificial intelligence advances

Posted by in categories: robotics/AI, security

Thank you to China for trying to surpass the USA in Ai, otherwise they’d never open the wallet to fund this AI research. AGI 2025!!


China is showcasing its advances in the field of artificial intelligence — at an annual tech-themed forum.
It is being held in the port city of Tianjin.
Super computers, rockets and robots are among the innovations on display.
The event comes just months after the United States National Security Commission said that China is on track to overtake the US as the world’s AI superpower.
Al Jazeera’s Katrina Yu reports.

Continue reading “China showcases artificial intelligence advances” »

May 17, 2021

New NTAS Bulletin Warns of ‘Broader’ Terror Targets as COVID Restrictions Ease

Posted by in categories: security, terrorism

Warning that the homeland is facing threats that have evolved significantly and become increasingly complex and volatile in 2021, the Department of Homeland Security issued a new National Terrorism Advisory System (NTAS) Bulletin.

May 14, 2021

Magnetoelectric Chips to Power a New Generation of More Efficient Computing Devices

Posted by in categories: biotech/medical, computing, security

Harnessing the Hum of Fluorescent Lights for More Efficient Computing

The property that makes fluorescent lights buzz could power a new generation of more efficient computing devices that store data with magnetic fields, rather than electricity.

A team led by University of Michigan researchers has developed a material that’s at least twice as “magnetostrictive” and far less costly than other materials in its class. In addition to computing, it could also lead to better magnetic sensors for medical and security devices.

May 14, 2021

Dr. Natasha Bajema — Dir., Converging Risks Lab, Council on Strategic Risks — WMD Threat Reduction

Posted by in categories: biological, chemistry, cyborgs, policy, security, terrorism, transhumanism

Nuclear Nonproliferation, Cooperative Threat Reduction and WMD Terrorism — Dr. Natasha Bajema, Director, Converging Risks Lab, The Council on Strategic Risks.


Dr. Natasha Bajema, is a subject matter expert in nuclear nonproliferation, cooperative threat reduction and WMD terrorism, and currently serves as Director of the Converging Risks Lab, at The Council on Strategic Risks, a nonprofit, non-partisan security policy institute devoted to anticipating, analyzing and addressing core systemic risks to security in the 21st century, with special examination of the ways in which these risks intersect and exacerbate one another.

Continue reading “Dr. Natasha Bajema — Dir., Converging Risks Lab, Council on Strategic Risks — WMD Threat Reduction” »

May 13, 2021

A security researcher found Wi-Fi vulnerabilities that have existed since the beginning

Posted by in categories: internet, security

They’ve been dubbed “FragAttacks”.


The researcher, Mathy Vanhoef, calls the collection of vulnerabilities “FragAttacks,” with the name being a mashup of “fragmentation” and “aggregation.” He also says the vulnerabilities could be exploited by hackers, allowing them to intercept sensitive data, or show users fake websites, even if they’re using Wi-Fi networks secured with WPA2 or even WPA3. They could also theoretically exploit other devices on your home network.

Continue reading “A security researcher found Wi-Fi vulnerabilities that have existed since the beginning” »

Page 59 of 134First5657585960616263Last