Remove 2017 Remove Authentication Remove Mining Remove Retail
article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

The partners aim to combine fingerprint and facial data to more effectively authenticate employees in workplace settings. It’s now commonplace for high-resolution video cams to feed endless streams of image data into increasingly intelligent data mining software. The partnering of SureID and Robbie.AI

Privacy 157
article thumbnail

Attacks against machine learning — an overview

Elie

A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine. bitcoin prices. Obviously, this.

Mining 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against machine learning — an overview

Elie

A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine. bitcoin prices. Obviously, this.

Mining 91
article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Of those organizations, 57 percent have been breached in the last year – a number that is three times the rate of just two years ago (in our 2016 report, 18 percent reported a breach within the last year, and in our 2017 report, 34 percent reported a breach within the last year).

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

When I was working for a retail company I thought it was fantastic. In 2011, researcher Ang Cui showed how updates to common laser printers were not signed or otherwise authenticated, meaning that you might think you’re doing the right thing by applying an update when in reality you might be unintentionally installing malware.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

When I was working for a retail company I thought it was fantastic. In 2011, researcher Ang Cui showed how updates to common laser printers were not signed or otherwise authenticated, meaning that you might think you’re doing the right thing by applying an update when in reality you might be unintentionally installing malware.

IT 52