ACLU Files AI FOIA Request

ACLU Files AI FOIA Request

The American Civil Liberties Union (ACLU) has filed a Freedom of Information Act (FOIA) request to find out how America’s national security and intelligence agencies are using artificial intelligence (AI). The ACLU said it made the request out of concern that AI was being used in ways that could violate Americans’ civil rights.  The request follows the March 1 release of a 16-chapter report containing recommendations on how AI, machine learning, and associated technologies should be used by the Biden…

Read More

Forensic Audit of MobiKwik Ordered

Forensic Audit of MobiKwik Ordered

A forensic audit of India’s largest independent mobile payments network has been ordered following an alleged data breach. Reports that data in the care of MobiKwik had been leaked online began circulating on social media in February. Earlier this week, a website on the Darknet appeared to show that 8.2 TB of data had been exfiltrated from the company. On March 30, the hacking group Jordandaven claimed to have stolen a MobiKwik database containing 36…

Read More

How financial cybercrime targets shifted in 2020

How financial cybercrime targets shifted in 2020

COVID lockdowns may be behind a major change toward targeting e-commerce and using new forms of attacks, Kaspersky finds. Getty Images/iStockphoto If 2020 proved anything it’s that humans are resilient, and that goes doubly for cybercriminals engaged in financial crimes. Kaspersky found that the overall volume of threats to PCs and Android devices decreased in 2020, but rather than this being a positive sign it only signaled a concentrated shift toward new targets, new methods…

Read More

4 Matchmaking Tips to Find your Perfect SOC 2 Fit

4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place on their vendors nowadays, growing organizations need SOC 2 as a part of the security program – and that involves selecting an auditor that will best fit your unique needs. This article serves as a quick and comprehensive guide on the key considerations CTOs must…

Read More

DeepDotWeb Administrator Admits Darknet Conspiracy

DeepDotWeb Administrator Admits Darknet Conspiracy

A website owner who received millions of dollars in kickbacks for connecting internet users to Darknet marketplaces has pleaded guilty in a US court to conspiracy to commit money laundering.  Thirty-seven-year-old Brazil resident Tal Prihar owned and operated DeepDotWeb along with his co-defendant and fellow Israeli national, 34-year-old Michael Phan.  Established in 2013, the site not only provided general information about the Darknet, but also featured links to specific sites where users could buy illegal firearms,…

Read More

How to use the new HTTPS-Only mode in Firefox

How to use the new HTTPS-Only mode in Firefox

Firefox’s new feature automatically redirects from HTTP to HTTPS and should be considered a must-use for the security-minded. Jack Wallen explains, and shows you how to enable it. Image: Mozilla We all use a web browser throughout the day. I probably spend at least seven hours a day within a web browser. Not only am I spending a large portion of my day using a browser, I’m also transmitting important (and sometimes sensitive) data. Because…

Read More

Digital is Foundational – Cisco Blogs

Digital is Foundational – Cisco Blogs

Before I started in my new role as leader of Central Partner Operations and Global Partner Readiness, I carefully meditated on what key factors should be part of my team’s strategy, as it is crucial to continue providing our partners and distributors with the guidance needed, so they can achieve the right level of operational maturity and operational business transformation. One concept that came to my mind immediately was that digital is foundational. Why? Well,…

Read More

Reinventing breastfeeding support through AI – Cisco Blogs

Reinventing breastfeeding support through AI – Cisco Blogs

This blog post comes from Maria Berruezo, co-founder and COO of LactApp Women’s health, a tool to provide evidence based and customized advice to breastfeeding women through Artificial Intelligence. LactApp data has already contributed to the success of several scientific studies. Hear more about how Maria’s using technology to change the world at the upcoming Women Rock-IT broadcast on April 22. Eight years ago, an unexpected and life-changing experience influenced my life and the lives…

Read More

Compiling Containers – Dockerfiles, LLVM and BuildKit – Docker Blog

Compiling Containers – Dockerfiles, LLVM and BuildKit – Docker Blog

Today we’re featuring a blog from Adam Gordon Bell at Earthly who writes about how BuildKit, a technology developed by Docker and the community, works and how to write a simple frontend. Earthly uses BuildKit in their product. Introduction How are containers made? Usually, from a series of statements like `RUN`, `FROM`, and `COPY`, which are put into a Dockerfile and built.  But how are those commands turned into a container image and then a…

Read More

5G: mm-wave signals could power self-charging IoT devices

5G: mm-wave signals could power self-charging IoT devices

A 3D-printed antenna could turn high-frequency 5G signals into a wireless power source, potentially eliminating the need for batteries in low-power IoT devices, according to researchers at Georgia Tech. The antenna, which the researchers call a mm-wave harvester, is about the size of a playing card and has visible circuitry printed on it. It uses a technology called a Rotman lens as a waveguide to focus multiple beams of millimeter-wave electromagnetic radiation used in 5G…

Read More
1 3,457 3,458 3,459 3,460 3,461 3,547