Using previously studied data from NASA’s Kepler Space Telescope, a Google machine learning algorithm discovered two new planets orbiting a nearby star already known to have six planets. At a total of eight planets, that system matches our own solar system. It also begs a question: How many other planetary systems might be hiding in previously analyzed data?
For their involvement in creating and distributing the Mirai IoT-based botnet, Paras Jha, Josiah White, and Dalton Norman each admitted on Wednesday to one count of conspiracy in plea agreement in Alaska. A botnet is traditionally defined as a network of compromised computers that can be remotely controlled to mount large-scale attacks such as a distributed denial-of-service (DDoS) attack on a website. Mirai was the first botnet to compromise and remotely control internet of things (IoT) devices in a large-scale attack on internet services.
Two new surveys from Synopsys find there is general alignment among C-level IT professionals, managers, and executives in Europe and in Asia in terms of application security concerns and mitigations. Although the percentages differ by region, the order in which concerns and solutions ranked generally agreed.
Despite years of evidence from researchers that some medical devices in homes and in healthcare facilities may contain serious vulnerabilities, such has the ability to manipulate insulin pumps and pacemakers wirelessly, there has been little acknowledgement from the industry. Unlike the automotive industry, which addressed a wide variety of cybersecurity issues soon after the infamous Cherokee Jeep Hack in the summer of 2015, medical devices have remained rife with potentially life-threatening vulnerabilities. That is about to change.
Chip designers can use Synopsys technology to accelerate Cryptographic Module Validation Program (CMVP) and Federal Information Processing Standard (FIPS) 140-2 certification for applications requiring high levels of security. FIPS 140-2 validation is only required if a hardware security module is to be sold to the U.S. government and if it uses cryptography in a security system that handles sensitive but unclassified information. However, it can also be a powerful security product differentiator in the commercial market.
Zero days are simply software vulnerabilities for which there is no public patch or workaround. They have value because they can allow remote code exploitation or electronic surveillance without detection for long periods of time. On Wednesday, White House Cybersecurity Coordinator, Rob Joyce, issued updated guidance how the U.S. handles zero days.
In the movies, artificial intelligence (AI) is often represented as an android, a human-like robot. In reality, AI will be mostly in the background, anticipating our needs based on prior experience in terms of autonomous driving, healthcare, even financial services.
Automakers are still years away from the ideal of fully autonomous, self-driving vehicles, but significant progress toward that goal is evident today.
In recent financial reports, some global organizations are now reporting losses averaging $300 million USD as the result of malicious software first spread in early 2017.
Posted in Malware
In its annual emerging technology domains risk survey, the Department of Homeland Security’s Computer Emergency Readiness Team (CERT) and the Software Engineering Institute at Carnegie Mellon University identified intelligent transit systems as their top domain for future high-priority analysis. The report also identifies machine learning and smart robotics as related dependencies and areas of interest as well.