Menu

Blog

Archive for the ‘security’ category: Page 123

Feb 19, 2016

Don’t Miss Out on This Cyber Security Stock

Posted by in categories: cybercrime/malcode, security

Unless you haven’t been in touch with the real world lately; it truly would be hard not to recognize that real investment opportunities exist in cyber security technology space.


Don’t Miss Out on This Cyber Security Stock, Stocks: CYBR, FEYE, PANW, CSCO, release date: Feb 19, 2016.

Read more

Feb 18, 2016

Can Wearable Technology Threaten the Cyber Security of Your Business?

Posted by in categories: business, cybercrime/malcode, security, wearables

Better ditch the watch and shirt.

Wearables invite Cyber Security Risks in the office.


Smart wearable technology has a future-is-now feel to it. Unfortunately, it also has a your-data-is-vulnerable feel as well. Here’s how smart wearables are putting your company’s cyber security at risk.

Read more

Feb 18, 2016

Man vs machine: Bio-chip implants will make us stronger but an open target for hackers

Posted by in categories: biotech/medical, cybercrime/malcode, privacy, security

Absolutely; it will and that is the real danger in technology. This is why security roles will be increasingly in demand over the next 7 to 10 years.


Kaspersky director Marco Preuss looks at the future of biometric technology and bio-cybersecurity.

Read more

Feb 18, 2016

Infrared could cast a light on better computer vision

Posted by in categories: computing, drones, security, virtual reality

InVisage has just announced their release of a new Infrared scanner for eye scan security recognition device. Since InVisage also developed and release a new film leveraging Q-Dot technology; the scanner is also leveraging this technology for more accurate readings and imaging.


InVisage’s new image sensor for infrared cameras could help drones avoid trees and could aid virtual reality headsets in seeing where you’re pointing.

Read more

Feb 17, 2016

Mazar BOT Can Erase Android Phones

Posted by in categories: cybercrime/malcode, internet, mobile phones, robotics/AI, security

Lookout for MAZAR Bot — Androids should be scared.


One interesting feature of Mazar is that it can not be installed on smartphones running Android with “Russian” selected as the operating system’s language.

The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.

Continue reading “Mazar BOT Can Erase Android Phones” »

Feb 17, 2016

Apple CEO Tim Cook’s Dangerous Game

Posted by in categories: business, computing, mobile phones, robotics/AI, security, transportation

Government and tech + telecom & ISPs need to come to an agreement in how to ensure innocent people’s privacy are respected. When a person murders, stalk, threaten, kidnap, and/ or assault a person then we have a responsibility first to protect the innocent public. And, with the resistance being displayed by Apple, are we running the risk of further alienating the consumers and business customers more when it comes to releasing AI like robots, self driving cars, etc. onto the public where criminals can buy AI technology and use it to hurt others?

We really need to be addressing these issues soon.


Tim Cook is playing a dangerous game of brinkmanship with the U.S. government. In the process, he may set in motion political and judicial processes that will endanger the security of all our mobile devices.

Continue reading “Apple CEO Tim Cook’s Dangerous Game” »

Feb 17, 2016

Researchers are Using Fairy Tales to Prevent a ‘Psychotic’ Robot Uprising

Posted by in categories: business, cybercrime/malcode, ethics, robotics/AI, security

The bottom line is robots are machines; and like any other machine, a robot system can be (with the right expertise) reprogram. And, a connected robot to the net, etc. poses a risk as long as hackers poses a risk in the current Cyber environment. Again, I encourage government, tech companies, and businesses work collectively together in addressing the immediate challenge around Cyber Security.

And, there will need to be some way to also track robots & deactivate them remotely especially when the public are allowed to buy them (including criminals).


“We believe story comprehension in robots can eliminate psychotic-appearing behavior and reinforce choices that won’t harm humans and still achieve the intended goal”.

Continue reading “Researchers are Using Fairy Tales to Prevent a ‘Psychotic’ Robot Uprising” »

Feb 16, 2016

EU managers need to up cyber security collaboration, study finds

Posted by in categories: business, cybercrime/malcode, security

The lack of collaboration on cyber security between the senior levels of business is leaving UK firms exposed to fines and reputational damage, a study has revealed.

One in 10 C-level respondents to a survey by Palo Alto Networks said they “kind of” understand what defines an online security risk, but admitted they “still have to use Google to help explain it”.

This finding suggests that the lack of consensus on where the responsibility for cyber security lies could stem from some lack of cyber security understanding at the leadership level.

Read more

Feb 16, 2016

Online security? Just let me Google that, say puzzled bosses

Posted by in categories: business, cybercrime/malcode, economics, robotics/AI, security

Although this article highlights the lack of awareness by some CEOs and board members on all things around Cyber Security; I do see a larger gap and risk. I do believe if a fully funded and dedicated joint task force effort among Silicon Valley, US Government, and Wall Street are not in place tackling this jointly to help the country and economy to diffuse this situation within the next 14 to 18 months that AI could fail in its delivery due to public’s concerns around trust and security.

Therefore, tech spent millions if not billions on new AI technology that businesses and consumers see no value in due to risks.


Some board executives still need help from a search engine to explain cyber security issues, warns report.

Read more

Feb 16, 2016

Car cyber hijacking on the rise

Posted by in categories: cybercrime/malcode, security, sustainability, transportation

Cyber Carjacking the new way to steal someone’s auto.


Cyber security was one of the topics on the agenda at the recent CyberTech conference held in Tel Aviv.

Last year, hackers in the US managed to remotely access a Jeep Cherokee SUV through its on-board computer, taking control of its steering, transmission and brakes.

Continue reading “Car cyber hijacking on the rise” »