Page 3,242«..1020..3,2413,2423,2433,244..3,2503,260..»

AI is not yet perfect, but it’s on the rise and getting better with computer vision – TechRepublic

It can beat anyone at chess but can't recognize fountains. One professor talks about the promise of AI and computer vision.

TechRepublic's Karen Roby spoke with David Crandall, assistant professor of computer science at Indiana University about artificial intelligence (AI), computer vision, and the effects of the pandemic on higher education. The following is an edited transcript of their conversation.

David Crandall: I'm a computer scientist, and I work on the algorithms, the technologies underneath AI. And I work, specifically, in machine learning and computer vision. Computer vision is the area that tries to get cameras that are able to see the world in the way that people do, and that, then, could power a lot of different AI technologies, from robotics to autonomous vehicles, to many other things.

SEE: Natural language processing: A cheat sheet (TechRepublic)

Karen Roby: Where are we right now, with AI? Are we where you thought that we would be, at this point? Are we moving past it? A lot of companies, we're learning now, are having to put AI projects on fast-forward, because of the pandemic, and really accelerate their use of it. Are you seeing that?

David Crandall: I think it's a really exciting time, in general, for the field, but I'd also say it's kind of a confusing time. Because, even in my lab, we often encounter problems that we think are going to be very hard, and then it turns out that they're very easy for AI. And then, on the other hand, we also encounter problems that we think are going to be easy, no problem, and then they turn out to be extremely difficult to solve.

I think that's kind of an interesting place where we're in, right now, with AI. We have programs that can play chess better than any human who can ever live, but we have robots that still make simple decisions. Like, a year or two ago, there was a case of a security robot in a mall that didn't see a fountain in front of it, and just ran right into it and drowned itself. So, it's just sort of, super confusing, how we can have machines that are so powerful, on one hand, and so, kind of, confusing, on the other hand.

SEE: TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download (TechRepublic Premium)

I think, in terms of the pandemic, specifically, I think that there's still a lot of interest in AI, as there was before, but the fact that we're doing most meetings online, now, and so much of our life has become virtual, I think, has just increased interest in AI, and in technology, in general.

Karen Roby: We hear a lot about the ethical use of AI. What does that mean to you? And where are we, when it comes to ethics and AI, and how people perceive this technology?

David Crandall: I've been working in AI for, maybe, 20 years, now, again, as a computer scientist. To me, speaking personally, it's a little surprising that, suddenly, we're having to deal with the ethical issues in AI. Because for some reason, for most of those 20 years, none of the technology, at least that I was involved in, really seemed to be working well enough to really impact actual people's lives. And I think, in the last few years, we've made substantial progress in AI. And that means, now, people are wanting to use it in regular products, in day-to-day life, and that means we really need to confront some of these issues. And so, it's kind of, there's good news, and there's also, sort of, things that we need to work on.

In terms of the research community that I'm involved in, I think the good news is that now ethics and AI are really at the forefront of people's minds. When you submit a paper to many conferences, these days, the top conferences in AI, they're now asking researchers to explicitly state what are sort of the potential ethical implications of a paper or work that you're doing. And your paper very well may be rejected if you can't make that argument.

SEE: AI and machine learning are making insurance more predictable (TechRepublic)

There's a lot of issues that I think computer scientists, and us, as a community, need to think about, in terms of AI. And I think they range from lots of things, from, say, how we deal with the fact that AI is not perfect, so it's going to make errors. Those errors are going to impact people's lives, or they could impact people's lives, if we're not careful. AI is not very good at explaining its reasoning, so even when it makes an error, it's sort of hard to figure out why it made that error.

There's concerns about bias. There's recent work, for example, showing that face recognition tends to work much better in white, middle-aged men, than it does in Black, older women, for example. That's a significant concern. And, just like any new technology, that ties into the concerns about how AI might increase inequality, how it might affect some types of jobs, how it might affect employment, or unemployment, in the future.

I think it also raises questions about how AI will influence ourselves. How are we going to let AI influence ourselves? Not in the sense that robots might gain sentience, and turn into killer agents, or something like that, but just, what does it look like in a world where, maybe, people are relying on AI to interact with one another, as we do by communicating on Facebook, right now, and other technologies like that?

Karen Roby: Expand a little bit on computer vision and what excites you about this.

David Crandall: I think the most exciting and interesting thing about computer vision is, it is vision, being able to see, seems like such a simple thing, to us, right? From a very early age, we're able to recognize faces, recognize the objects that we see around us. We can give names to objects, right? It's one of the very first things that we learn to do in the first few months and years of life. And yet, it has defied computer scientists, now, confounded computer scientists, now, for close to 60 years in how to be able to replicate that ability.

SEE: Hiring kit: Computer Vision Engineer (TechRepublic Premium)

As a person, I just look around and I see things, and there's no conscious effort to that. And then, I've spent 20 years, and others have spent many more decades, trying to program computers to do it. It's just such a difficult, really difficult, thing to do.

That's why it's exciting for me. I think it's a really interesting technical challenge. Also, as we confront that technical challenge, I think it also, potentially, helps us understand how people are able to solve this problem. And if we can do that, if we can understand how kids learn to see the world, maybe using computer vision as a lens, then, maybe, we can help kids who have learning deficiencies, for example, learning difficulties, figure out strategies around them, by sort of reverse-engineering what's going on, and figuring out how, maybe, to account for that.

In terms of a research problem in our community, I also like that it touches on so many different fields. Because, we have computer scientists, but it also touches on optics, and statistics, and cognitive science, and lots of different fields. So, it's a great thing for students or faculty who are sort of interested in many things, to bring them together in this relatively interdisciplinary field that's trying to solve a big challenge.

Karen Roby: 2020 has thrown a lot at us, in the education space, obviously, and in higher ed. How have things changed, besides the obvious? Do you think this pandemic, in the minds of some of your students, has really changed how they look at their future careers?

David Crandall: I think, in computer science, we're probably luckier than in other fields, like chemistry, and biology, and stuff. All of the work that we tend to do is portable on our laptops, and we can log into servers from wherever we are in the world. And the kinds of skills we're working on, like programming skills, are things that are very naturally adapted to the online world. So, in that way, we're lucky.

SEE: Artificial intelligence can take banks to the next level (TechRepublic)

As an educator, I feel like, and I've heard this from other colleagues, also, it's really been a mixed bag. Some things that we expected we would not enjoy about online teaching have actually been great. For example, I routinely, these days, get 20, 30 students coming to my online office hours. Whereas, there's no way I could have crammed 20 or 30 students into my office hours in the real world.

So, that's an example of, actually, where the technology is increasing the amount of engagement that we have, one-on-one. But, I think there's, in terms of computer scientists, I think the pandemic has, in some ways, been good for technology. And there still seems to be a pretty good job market in computer science, for example.

But, like everybody else, I worry about the long-term impact on students' health, and our own mental health, by just not having those social connections that I think are really important. The more that I work in AI, the more impressed I am with people because people have been able to do all of these things for thousands of years, and being able to interact with other people as social creatures is super important, that I don't think we should try to replace with AI anytime soon.

Learn the latest news and best practices about data science, big data analytics, and artificial intelligence. Delivered Mondays

Image: iStock/PhonlamaiPhoto

See the rest here:

AI is not yet perfect, but it's on the rise and getting better with computer vision - TechRepublic

Read More..

Former FX tech person points out the racist trajectory of skin and hair CGI – Boing Boing

Theodore Kim is a Yale computer science professor who's worked for years on techniques for rendering computer-generated humans; he used to be a senior research scientist at Pixar.

In Scientific American, he wrote a fascinating piece detailing the racial dynamics of CGI. While computer graphics has become enormously better in recent decades at reproducing the complex optical physics of skin, they've focused most of their efforts on mastering aspects of white skin, like "translucency".

This has knock-on effects for stardom, as Kim notes:

However, translucency is only the dominating visual feature inyoung, whiteskin. Entwining the two phenomena is akin to calling pink Band-Aids "flesh-colored." Surveying the technical literature on digital humans is a stomach-churningtour of whiteness. Journal articles on "skin rendering" often feature a single image of a computer-generated white person as empirical proof that the algorithm can depict "humans."

This technical obsession with youthful whiteness is a direct reflection of Hollywood appetites. As in real life, the roles for computer-generated humans all go to young, white thespians. Consider: a youthful Arnold Schwarzenegger inTerminator Salvation(2009), a young Jeff Bridges inTron: Legacy(2010), a de-aged Orlando Bloom inThe Hobbit: The Desolation of Smaug(2013), Arnold again inTerminator Genisys(2015), a youthful Sean Young inBlade Runner:2049(2017), and a 1980s-era Carrie Fisher in bothRogue One: A Star Wars Story(2017) andStar Wars: The Rise of Skywalker(2019).

The same thing goes for hair:

The technological white supremacy extends tohuman hair, where the term "hair" has become shorthand for the visual features that dominate white people's hair. The standard model for rendering hair, the "Marschner" model, was custom-designed to capture the subtle glints that appear when light interacts with the micro-structures in flat, straight hair. No equivalent micro-structural model has ever been developed for kinky, Afro-textured hair. In practice, the straight-hair model just gets applied as a good-enough hand-me-down.

Similarly, algorithms for simulating themotionof hair assume that it is composed of straight or wavy fibers locally sliding over each other. This assumption does not hold for kinky hair, where each follicle is in persistent collision with a global range of follicles all over the scalp. Over the last two decades, I have never seen an algorithm developed to handle this case.

This is, alas, an old story in visual media. In the early years of camera film and TV cameras, the technological focus was as with today's CGI on capturing white folks. So the innovators were terrible at capturing black and brown faces: Back in the 1960s, Kodak got complaints from African-American mothers who pointed out that class photos of their children looked noticeably less detailed than their white peers because "the film wasn't calibrated to deal with that kind of range of exposure,"as a photographer later discovered.

Kodak was aware of the problem but didn't do anything about it until, as the Concordia University scholar Lorna Roth has written, Kodak got complaints from manufacturers of chocolate and wooden furniture, who complained Kodak film wasn't showing off the details of their products for advertising. So, chocolate bars and coffee tables: That, finally, got Kodak to produce film that was slightly better at capturing darker tones.

You can't make this stuff up. On top of camera and film technology, there's lighting: Lighting standards for film and TV have been fine-tuned for white skin, such that today's techs can be utterly hapless at lighting everyone else, as Harvard professor Sarah Lewis wrote about here.

Anyway, Kim's point in Scientific American here is a really good one. The question of who gets to be in front of the camera has a lot of layers but one of them is the subterranean choices, made years or decades earlier, by the makers of imaging tools.

Link:

Former FX tech person points out the racist trajectory of skin and hair CGI - Boing Boing

Read More..

Russia got access to the files of its enemies in the FireEye hack – Business Insider – Business Insider

The recent hack of the high-profile internet-security firm FireEye included the theft of powerful hacking tools and has required a concentrated effort by European government services to mitigate damage, according to security officials in Brussels and the Baltics who specialize in counterintelligence operations.

First announced in a blog post by FireEye CEO Kevin Mandia, the hack was described as very sophisticated and was quickly blamed on Russia by US officials briefing journalists in the US.

Two European intelligence officials one who specializes in countering Russian intelligence operations in the Baltics, the other a military-intelligence officer assigned to NATO headquarters told Insider the US had determined Russia was behind the hack and had briefed US allies in Europe before Tuesday's announcement. Neither source would confirm when the first briefing took place because such information could be of value to the hackers, but both said the operation was impressive.

"Frustratingly well done," the official in Brussels said. "Targeted the very tools used to protect sites from their attacks. And stealing them from a firm considered among the very best at stopping attacks just adds to it."

Mandia's blog post described some of the tools apparently captured by Russian government hackers as designed for testing website security by impersonating attacks.

"Useful stuff to the GRU and FSB or just about anyone really," the official at NATO said.

Both officials said fast action on the part of the US and FireEye had helped mitigate at least some of the negative effects of the leak.

"The response has included patches, updates, and notes it was fast, honest, and clear, as far as these things tend to go," the Baltic official said. "I believe the immediate threat of someone using these tools on highly controlled websites has been mostly mitigated."

The longer-term dangers, the officials said, are concerns that even after the most secure government and technology sites are protected by patches, the stolen tools will pose threats to less secure sites and organizations for much longer.

"Over time these tools can get into the hands of less professional hackers who will direct them at much less secure sites," the NATO official said. "And this will be a drain on resources, but it does seem like all the software solutions to try and prevent this should help. It remains to be seen how this threat will evolve."

In many ways, the Baltic official said, the biggest win for the Russian hackers would be having had access to the files of their enemies, which would provide a benefit long after the stolen software tools were patched into irrelevance.

"The real loss here other than brutal embarrassment is the value the Russian hackers gained by seeing inside the best tools used to counter them," the official said. "Software can be patched, but knowledge cannot."

Read the original here:
Russia got access to the files of its enemies in the FireEye hack - Business Insider - Business Insider

Read More..

You only have this weekend to get 70% off the world’s best antivirus software – Techradar

Not only does Bitdefender hold the top spot in our countdown of the best antivirus software in the world, but right now it has the best value antivirus deals, too.

Bitdefender has slashed a mighty 70% off all three of its cybersecurity packages. That means you can get a whole year's worth of cover from as little as $18/12.

Get 70% off Bitdefender for Cyber Monday: in the US | in the UK

And at these prices, you could go all out and get Bitdefender's all-singing all-dancing Total Security. That gives coverage of up to five devices, so you can protect your iOS or Android mobiles along with your Windows and Mac computers. It also adds in handy extra features like device optimization and a basic VPN.

You know it's a great discount, you know that it's market-leading antivirus - but you should also know that this internet security deal isn't going to last forever. You have until December 14 to grab it.

Bitdefender Total Security - 70% offUS deal: $89.99 $27 | UK deal: 69.99 21Takes Bitdefender's virus protecting prowess and makes it available for Mac, Android & iOS. Covers five devices with the one sub to cover home computing and mobile - so this is definitely the best value for your money.View Deal

Bitdefender Antivirus Plus - 70% offUS deal: $59.99 $18 | UK deal: 39.99 12Not only does Bitdefender's base-package have plenty of features, it's also straightforward to use and has very accurate malware blocking. With multi-layered protection, Bitdefender Antivirus Plus 2020 is super, affordable protection for your PC.View Deal

Bitdefender Internet Security - 70% offUS deal: $79.99 $24 | UK deal: 49.99 15For just a few dollars or pounds more, Bitdefender's Internet Security adds features like parental control and privacy firewalls. It can protect up to three PCs, making it great value for families or multiple account users.View Deal

There's a multitude of reasons why we rank Bitdefender as the world's best antivirus, all of paramount importance to the user.

The provider really does have all the bases covered when it comes to creating top-notch online security software. Naturally, it has powerful anti-malware and spam detection tools, but it's also incredibly easy to set up and use while having minimal impact on the performance of your devices.

Below we have listed our top five reasons for why we consider this antivirus software to be the best:

The best prices on today's top antivirus software

Avira | Antivirus & Security

See more here:
You only have this weekend to get 70% off the world's best antivirus software - Techradar

Read More..

Kazakhstan ramps up control of the internet ahead of elections – Coda Story

Kazakh authorities have launched a new online security initiative, which many fear is an attempt to ramp up control over the internet ahead of next months parliamentary elections.

On Monday the Ministry of Digital Development, Innovation and Aerospace Industry announced a drive to combat cyber attacks within the country, titled Cyber Security Nur Sultan-2020. According to official statistics, attempted online breaches have almost tripled over the past year, owing to the shift to remote work caused by the coronavirus pandemic.

During the period of cyber training, various problems may arise with access to some foreign internet resources, which can be eliminated by installing a security certificate, read a statement by the ministry.

Most major websites use security certificates to prove their authenticity and create secure connections to a server when accessed through a browser. These certificates are generally approved by trusted authorities and protect users against what are known as man-in-the-middle cyber attacks.

In Kazakhstans case, the certificate authority becomes the state itself, meaning that the government controls what stands between an internet user and the services they can access. After installation, the certificate is also capable of redirecting users to other websites or reading information exchanged between them and the sites they are visiting.

Why it matters: The human rights risk here is that you are allowing the government in this case, to be candid, an authoritarian repressive government, eager to stifle dissent to have access to the things you do on websites, which you often use to relay sensitive information, said Noah Buyon, a Freedom House research associate specializing in digital rights in Eurasia.

Subscribe to Oligarchy

Sign up for our newsletter on money and power during the pandemic

Arshyn Taizhanov, a web developer and co-founder of the group Internet Freedom Kazakhstan, added that many in the country oppose the certificate. Some also believe that it has been introduced before parliamentary elections, scheduled for January 10, to increase control over internet usage and place pressure on opposition activists.

Buyon said that he considered the move to be a power play designed to send the message that the government has the capability to interfere with peoples right to access independent information.

The bigger picture: Its not the first time Kazakh authorities have tried something like this. The ministry launched a similar security certificate last summer, but major tech companies that produce browsers, including Google, Apple and Mozilla, blocked it. Shortly after, the certificate was retracted.

Kazakhstan scores 32 out of 100 and is classified as not free in Freedom Houses 2020 Freedom on the Net report. Buyon says the situation has worsened since large-scale anti-government protests last summer, which were met with internet shutdowns and the prosecution of activists under extremism charges.

The rollout of the national security certificate is part of this counter reaction, Buyon said. I think its going to be critical to look out for the reaction of tech companies here, because they really were the heroes of last summers saga. And they do have a power, in this sort of narrow line of attack that the government is launching, to make a positive difference.

Continue reading here:
Kazakhstan ramps up control of the internet ahead of elections - Coda Story

Read More..

Ransomware attacks on the rise during pandemic – WRBL

by: Elise Preston, CBS News

(CBS News) Cases of cyber ransomware are on the rise during the pandemic. Criminals are targeting hospitals and schools, with vulnerable remote learning environments. Federal officials expect that will continue through the 2021 academic year.

Teachers in Huntsville, Alabama are printing their lessons on paper after cyber criminals hit the district with a ransomware attack locking down the computer network. Its terrible to see a district with some motivated employees moving forward to then have one more obstacle like this, says William Tunnell with the Alabama Education Association.

Officials are not revealing how much ransom the hackers demand, but Huntsville is far from alone. School computer systems in Baltimore County and Hartford, Connecticut were also hit this year.

Cyber security expert Scott Schober says municipalities, businesses, and even hospitals are ransomware targets. Criminals often send a fake email to employees with a link. Clicking on it downloads malware and allows the hacker into the network. And now the cybercriminal works laterally through the computer networks to then find the target machine or machines and then encrypt the data and send them the ransom note, says Schober.

Some ransom notes demand money to restore access to the computer network. Internet security company SonicWall says cases surged 40 percent this year. The average payment also climbed from a few thousand dollars in 2018 to more than 230-thousand dollars. Schober says, Usually its done with digital currency, crypto currency, bitcoin is the preferred choice so the criminals can remain anonymous.

Security experts say its vital for hospitals and every business to have a strong network backup system to thwart ransomware attacks. In October, the Departments of Justice and Homeland Security warned of coordinated cyber-attacks on the healthcare industry.

Continue reading here:
Ransomware attacks on the rise during pandemic - WRBL

Read More..

Cyberconflict: How it can reach beyond government systems, and how to protect your business – TechRepublic

Cyberconflict is an unfortunate growing trend impacting businesses and governments. Learn the risks and possible solutions from an industry expert.

Image: iStock/Infadel

Recently, I found out the hard way that cyberattacks aren't relegated merely to high-profile businesses nor engaged in by shadowy foreign agents. They can happen right here in your town.

SEE:Zero trust security: A cheat sheet (free PDF)(TechRepublic)

That's what happened to my teenagers' school system at a town in Massachusetts when someone engaged in a distributed denial of service (DDoS) attack against the Wi-Fi network. It was so crippling and pervasive that the school system had to bring in cybersecurity experts to resolve the problem.

The consensus seemed to be that the attacker had an agenda to thwart the virtual learning the students were engaged in and apparently force all the kids back to school full time for whatever reason.

This criminal activity did not succeed, fortunately, and was brought to a halt without identifying the perpetrator(s), but it got me thinking about the concept of weaponizing cybersecurity in this manner to generate conflict.

I spoke with Michael Schenck, director of Security Services at Kaytuso, a cybersecurity service provider about the concept, and he told me about the term "cyberconflict."

Scott Matteson: What is cyberconflict?

Michael Schenck: [Cyberconflict is] cyberattacks that have a background in international relations or bring about consequences that can escalate to a political and diplomatic level.

Cyberattacks on trust are more worrying than those intended to produce physical effects. Attackers find it easier, and perhaps more effective, to weaken the bonds of military alliance rather than go after fighter jets, or corrupt financial data rather than destroy banks' computers.

Cyberattacks on trust and integrity have a much lower threshold, are harder to detect and deter, and can cascade through interconnected systems.

SEE: Social engineering: A cheat sheet for business professionals (free PDF) (TechRepublic)

Scott Matteson: When does cyberconflict escalate?

Michael Schenck:Cyberconflict is more likely to arise for political, social, and economic reasons, rather than to physically destroy infrastructure. It's more of a risk during significant political moments, such as voting times/elections.

Impulsive action, confused decision-making, or any crossed signals can trigger unanticipated and unwanted cyberattack escalations.

For example, cyberconflict escalated when the US killed Iran's Qassem Soleimani in early January. The week following Soleimani's death, there were around35 organizations attacked by cyber offensives "specifically traced" to Iran's state-sponsored hacking groups. Around 17% of those targets were in the US.

Scott Matteson: How does it affect consumers and businesses?

Michael Schenck:Cyberconflict creates greater risk for corporate information and financial information to be stolen, as well as theft of money and disruption of trading stocks. The biggest things companies worry about is the damage to their reputation if this happens and the loss of trust their customers would have with them.

There are a lot oflegal consequences businesses can face from this, too (such as fines and regulatory sanctions).

When Iran/US tensions were high, there were genuine concerns that a state-sponsored attack might be mounted against critical infrastructure (energy, transportation, finance) but also that a raft of commercial organizations in the US would see concerted attacks on data and systems, to steal or destroy.

With the elevation of these tensions, businesses and consumers need to prepare for cyber disruptions, suspicious emails, and network delays. This can come in any form of a digital attempt to access private information (from individuals, companies, and government agencies).

In January 2020, Texas Gov. Greg Abbott said state agencies had seen10,000 attempted attacks from Iran per minute in the span of 48 hours.

Scott Matteson: What should companies be doing differently to protect against cyberconflict?

Michael Schenck:If your company doesn't already have a CISO, hire a firm that offers virtual CISO (vCISO) services. This is a high-level consultant that can speak to stakeholders about the real risk to your business. They also can advise on where you currently stand on cybersecurity and where you should be. Beyond that, I can't speak to what companies should be doing differently, as some already may be following a standard of best practices provided by NIST, ISO, GIAC, or the Center for Internet Security.

Some other things I recommend that most companies we've worked with don't have is a security information and events management (SIEM) or network threat monitoring such as Cisco Talos intelligence-based network threat detection (like the Meraki advanced security license), Cisco Firepower for ASA firewalls, or Palo Alto SourceFire for next-gen firewalls. Larger companies may also be interested in solutions from FireEye.

Another big area that seems to be lacking is effective business continuity planning and response procedures. Just take a look at what's happening globally right now without a cyber event due to COVID-19. Companies need to ask themselves what would happen if key infrastructure like power or internet was disrupted? Are your vendors and service providers addressing those concerns as well? CISOs, vCISOs, and cyber teams should constantly be thinking through their plans and response procedures for cyberattacks.

SEE: Disaster recovery and business continuity plan (TechRepublic Premium)

Scott Matteson: Are there any measures that should be taken right after a political, social, or economic incident (e.g. temporarily increase logging detail)?

Michael Schenck:Vigilance should certainly be higher before planned political events (scheduled protests, elections, etc.). The best thing to do is remind everyone to exercise reasonable doubt with what they see online or receive in their email. If you have a network threat detection service, you should verify with your account representative or service provider that they are keeping up with real-time intelligence. The same goes for SIEM appliances or managed detection and response service providers.

Scott Matteson: Who are some of the key players in this space, both from a "good" and "bad" perspective?

Michael Schenck:I previously mentioned some of the key enterprise vendors with solutions that help protect against cyberconflict (Cisco, Palo Alto SourceFire, Fireye, etc.). The "good guys" are also the usual suspectsWestern intelligence and security services like the FBI. There are also big IT companies that show a focus on security including Microsoft, ESET, Cylance, Cisco, and FireEye.

As for the "bad guys," state-sponsored hackers from Russia, Iran, China, Syria, and North Korea are key players. State-sponsored hackers demonstrate the extent to which nation-states continue to leverage cyberattacks as a tool to gain intelligence or influence geopolitics. In 2019, Microsoft notified close to 10,000 people that they had been targeted by state-sponsored hackers. In many of these cases, victims were either targeted or compromised by hackers working for a foreign government.

Freelance hacktivists are also key players in this space from a "bad" perspective. Motivated by civil disobedience, hacktivists seek to spread ideologies and create total anarchy. They typically see themselves as vigilantes who use hacking to enact social justice and policy changes, but they employ the same malicious tools and tactics as typical hackers.

Scott Matteson: What are the most prevalent types of threats and activities?

SEE: Identity theft protection policy (TechRepublic Premium)

Michael Scheck: The biggest risk is people. Whether it be intentional or accidental, the insider is the biggest threat because we have to give some trust to our workforce. The threat remains similar to what we've seen over the yearsemails with malicious attachments or links. At Kaytuso, we've actually seen a significant uptick in malware being spread by email via attachment. The hackers writing these viruses are getting better at hiding from scanners. Some of these techniques include not doing anything if the malware believes it's running in a sandboxa virtual machine that executes and opens the attachments to see if it identifies anything malicious. This means that there's greater success in the distribution of malware. With the technology that's preventing and blocking malware being less than perfect, people are the biggest risk for clicking on that link or opening an attachment.

Scott Matteson: How should governments work together in order to prevent or curtail cyberconflict?

Michael Schenck:That's the tricky question, especially when talking about international politics and security. In that scope, it is always double-edged. Protection improvements can also make intelligence efforts more difficult, making it harder to protect against tomorrow's attacks. The best method here would be for more transparency from the government and revealing flaws to security vendors sooner. For example, if Microsoft had been informed about the EternalBlue vulnerability sooner, they would have been able to patch it even earlier and limit the damage from the ransomware attacks in 2017.

Scott Matteson: What are some subjective examples of cyberconflict attacks?

We've seen some examples over the years including schools and cities being locked out of their systems. There have been reports that Stuxnet and Flame malware were products of Western intelligence. Another example stems from Russia and their ongoing cyberwarfare against the US.

From a commercial business standpoint, hacktivism is a prime example of cyberconflict. I briefly mentioned hacktivism before, but it's a mix of hacking and activism, where foreign hackers are using the internet to push political agendas or social change. Economic espionage is also very real. Hackers target the theft of critical economic intelligence such as trade secrets and intellectual property in a number of areas (technology, finance, government policy).

Scott Matteson: What was the impact/result?

Michael Scheck: The result of these types of cyberconflict attacks has been increased geopolitical tensions, millions in losses, theft of sensitive intellectual property, and physical damage to industrial equipment.

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Read this article:
Cyberconflict: How it can reach beyond government systems, and how to protect your business - TechRepublic

Read More..

Supt. Hoffman and Cox Communications announce temporary increase in internet speeds for low-income families – Arizona Education News Service

Superintendent of Public Instruction Kathy Hoffman and Cox Communications today announced a critical increase in the speed of Coxs Connect2Compete internet service.

Starting this Friday, December 11th, Cox will temporarilydouble the Connect2Compete speed to 50 mbps/download for the remainder of the 2020-2021 school year in all Cox markets, giving families and students peace of mind to complete schoolwork, communicate with teachers, and have the same opportunities to access information as their classmates.

The Connect2Compete plan is a low-cost internet plan designed to augment the educational opportunities of low-income children who do not have a reliable and affordable internet connection at home. This Cox internet package is offered to students and families receiving government assistance such as reduced or free school lunch, SNAP benefits, or public housing.

During the current COVID-19 spike, many students and teachers are returning to distance learning, once again needing to rely on their at-home internet service provider, said Superintendent Hoffman. I am thankful that Cox Communications promptly responded to my request to provide low-income students and families with higher internet speeds.

At the onset of COVID-19, Cox moved quickly to enhance their offer of Connect2Compete internet service to eliminate restrictions on enrollment and to provide two months of free service for all new families who have enrolled in the service. Currently, thousands of Arizona students are receiving Connet2Compete internet service in communities which Cox serves in the metro Phoenix area, Pinal County and Southern Arizona.

Cox remains committed to ensuring that all kids in our service areas have access to broadband connectivity so that they can do homework, communicate with their teachers and have the same opportunities to access information as their classmates, said John Wolfe, Southwest Regional General Manager, Cox Communications. We thank Superintendent Hoffman for her leadership and partnership in working with the Cox team to advocate for the unique needs of our students during the COVID-19 pandemic.

Superintendent Hoffman and Cox Communications look forward to continuing to find innovative solutions to support students throughout the COVID-19 crisis, and beyond.

Families can qualify for Connect2Compete easily from anywhere whether on their mobile device or desktop by visitingcox.com/c2c.Eligible participants signing up before December 31, 2020 will receive two months of free service and pay $9.95 monthlygoing forward.

Equity for all students to achieve their full potential. This is the guiding vision of the Arizona Department of Education the state agency tasked with overseeing Arizonas K-12 public education system. Our department, led bya publicly elected Superintendent of Public Instruction, is comprised ofmorethan 600 staff across four state offices working to serve Arizonas students,families, educators, and school communities.

Cox Communicationsis committed to creating meaningful moments of human connection through broadband applications and services. The largest private telecom company in America, we proudly serve six million homes and businesses across 18 states.In metro Phoenix, we serve approximately 2.5 million product subscribers, and in Southern Arizona, approximately 400,000 product subscribers, with residential and business digital television, 1G high speed Internet, security systems and digital telephone service over its own nationwide IP network.Were dedicated to empowering others to build a better future and celebrate diverse products, people, suppliers, communities and the characteristics that makes each one unique. The 3,100 Arizona employees of Cox are proud to havetopped numerous J.D. Power and Associates studies of customer satisfaction and for many years top Ranking Arizona-Best of Arizona Business list. Cox Communications is the largest division of Cox Enterprises, a family-owned business founded in 1898 by Governor James M. Cox.

See the original post here:
Supt. Hoffman and Cox Communications announce temporary increase in internet speeds for low-income families - Arizona Education News Service

Read More..

ThreatConnect Risk Quantifier 5.0: Continuing innovation in the field of cyber risk quantification – Help Net Security

ThreatConnect released ThreatConnect Risk Quantifier 5.0 (RQ 5.0), continuing its innovation in the emerging field of cyber risk quantification.

ThreatConnect Risk Quantifier (RQ formerly Nehemiah Risk Quantifier) enables the identification of the risks that matter most to the organization by quantifying them based on potential financial and operational impact, unifying security and the business to a common goal.

This quantification relies on generally accepted risk models such as the popular Factor Analysis of Information Risk (FAIR) model, among others. It is also established in part by, and continuously informed by, your internal environment, threat intelligence, vulnerability management, operations and response data found within ThreatConnect and other integrations.

RQ is distinctly different from other approaches offered in the market as it focuses on automation and data integration, and delivers value in days and weeks as opposed to months and years.

Companies cannot effectively prioritize vulnerabilities by leveraging risk scores alone. Effective prioritization requires an understanding of the impact an unmitigated vulnerability could have to the business.

By quantifying risk, based on possible losses from business interruption and response, vulnerability exposure can be directly linked to the business services that are affected.

With RQ 5.0, security professionals for the first time have a way to understand the potential financial risk that Common Vulnerabilities and Exposures (CVEs) introduce to an organization and prioritize those CVEs that could lead to the greatest financial loss if an attacker succeeds.

RQ 5.0 takes into account existing technical scoring methods, including CVSS Scores, and uses that data as a weighting for the financial impact.

This is an important capability that businesses have been demanding and that other vendors cannot address, said ThreatConnect Vice President of Cyber Risk Strategy Gerald Caponera.

Now, through integration with your vulnerability management software, we are able to help organizations handle the flood of CVEs they get every day and prioritize them based on the quantified financial risk each introduces to the specific business ultimately bringing relevancy and focus to the security team.

RQ 5.0 also introduces support for multiple security control frameworks, including the NIST Cybersecurity Framework and the Center for Internet Security Controls. Now customers can have their prioritized recommendations based on the framework of their choice.

Businesses also need a way to identify gaps in their program and the risk those gaps represent to the organization, Caponera said. With RQ 5.0 they can show the business solid numbers that support a prioritized list of recommendations based on the framework of their choice and their organizations tolerance for financial risk by application.

Another new feature of RQ 5.0 includes a powerful what-if impact analysis tool that allows security leaders to model changes to application security control levels in a sandbox environment.

Running the models enables security leaders to communicate to the C-Suite how increasing investment in security controls can lower the annualized loss expectancy stemming from the organizations highest priority risks.

Using a risk-led approach to cybersecurity makes prioritization easy for security teams, enabling them to filter out noise and focus on what matters most. With CRQ, TIP and SOAR capabilities combined, ThreatConnect unifies the actions of the security team around the most critical risks, supports their response with streamlined and automated workflows and strengthens the entire security ecosystem through powerful technology integrations.

Read more from the original source:
ThreatConnect Risk Quantifier 5.0: Continuing innovation in the field of cyber risk quantification - Help Net Security

Read More..

These Career Paths Had the Most Freelance Listings at FlexJobs Since March – Small Business Trends

The American workforce has witnessed a surge in freelancing during the pandemic. 36% of workers are now freelancing, a 2 million increase since 2019.

Certain professions lend their hand to freelancing more than others.

FlexJobs, home of hand-screened remote work, has identified the top careers with the most freelance job listings on its database since the start of the pandemic.

Computer and IT jobs are the most in-demand skills companies require from freelancers. FlexJobs identified everything from computer repair to designing internet security jobs as having the highest listings on its database.

Computing and IT was followed by accounting and finance. Freelancers that provide processing financial data, organizing records, preparing tax returns services and more, are especially in demand in the wake of the pandemic.

Administrative assistants are also highly sought after. According to FlexJobs research, virtual admin assistants are the third most in demand category of freelance listing jobs. Admin assistants process and prepare communications, manage projects, support executives and assist clients, tasks which can all be carried out remotely.

2020 has been an uncertain time for many businesses, insecurity that looks set to continue as we head into the New Year. Taking on freelancers can be an effective solution for companies to get the help they need without taking on full-time staff.

FlexJobs research is important to small businesses, as it shows how companies are strategically turning to freelancers during economic uncertainty. It maps out the professions that are proving especially relevant in the freelancing climate to help businesses navigate these testing times. FlexJobs shows which areas of the freelance workforce is most in demand within the business community.

As Sara Sutton, Founder and CEO at FlexJobs, comments: Over the last several months, weve seen sustained growth in the number of freelance job postings in the FlexJobs database.

Freelance workers can help tremendously during times when companies operating budgets may be impacted and future revenue seems uncertain. As everyone broadens their views of the workplace, we predict that freelance job opportunities will continue to be available and grow well into 2021, Sutton added.

Other career paths that have had the most freelance listings at FlexJobs since March include project management, customer service and healthcare.

Hot of healthcare professionals heels as the most in-demand freelancing services are those with writing and editing skills. Educators and trainers who help businesses learn and master new concepts are also in hot demand on FlexJobs database. As are marketing professionals, who help businesses create and maintain successful marketing campaigns.

HR and Recruiting is the tenth top freelance career field, followed by bookkeeping and therapy. Graphic design, data entry and mortgage and real estate professionals were all identified as leading professionals that businesses are taking on as freelancers during these challenging times.

With the freelance community thriving in the US, freelancers are feeling optimistic about their employment prospects for 2021. The 2020 annual FlexJobs survey asked 1,200 freelancers how they are feeling. 58% of freelancers reported feeling optimistic about their future, compared to just 20% who are feeling pessimistic.

FlexJobs findings show that making savvy moves like taking on freelancers can be a sensible approach to nurture business continuity during challenging times.

Image: Depositphotos.com

Here is the original post:
These Career Paths Had the Most Freelance Listings at FlexJobs Since March - Small Business Trends

Read More..