Remove Authentication Remove IT Remove Mining Remove Retail
article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

The partners aim to combine fingerprint and facial data to more effectively authenticate employees in workplace settings. It’s now commonplace for high-resolution video cams to feed endless streams of image data into increasingly intelligent data mining software.

Privacy 157
article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

This screen faces out into the retail store with people constantly wandering past it only a couple of meters away, well within the distance required to observe the contents off it. She was pretty shocked when I showed her this as it was precisely the same verbal password as she used to authenticate to her bank.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against machine learning — an overview

Elie

Here is a re-recording of this talk: You can also get the. slides here. Disclaimer: This post is intended as an overview for everyone interested in the subject of harnessing AI for anti-abuse defense, and it is a potential blueprint for those who are making the jump. Below are three key design strategies to help with that. Limit information leakage.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

Here is a re-recording of this talk: You can also get the. slides here. Disclaimer: This post is intended as an overview for everyone interested in the subject of harnessing AI for anti-abuse defense, and it is a potential blueprint for those who are making the jump. Below are three key design strategies to help with that. Limit information leakage.

Mining 91
article thumbnail

The Life Cycle of a Breached Database

Krebs on Security

Our continued reliance on passwords for authentication has contributed to one toxic data spill or hack after another. There, denizens with computer rigs that are built primarily for mining virtual currencies can set to work using those systems to crack passwords. TARGETED PHISHING. customers this month.

Passwords 356
article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

The 57 percent rate statistic is the highest of all verticals we measured in this year’s report (others include the healthcare industry, the retail industry, and the financial services industry) or any region surveyed. Originally Featured in Global Military Communications Magazine’s June/July Issue. But, that’s not the whole story.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

When I was working for a retail company I thought it was fantastic. TuneIn Podcasts. TheHackerMind.com. Vamosi: True story. Back in the early two thousands, I remember a friend telling me that she and her husband where getting an ultrasound. There it was on this black and white monitor, the first grainy images of their baby. Then nothing.

IT 52