No matter who is behind this attack, or what their purpose may be,
you have to consider this a cyber war proof of concept.
Huge
aluminium plants hit by cyber-attack
One of the world's biggest aluminium producers has
switched to manual
operations at its smelting facilities following a
cyber-attack.
Hydro, which employs more than 35,000 people in 40
countries, says the attack began on Monday night and is
ongoing.
A spokesman told the BBC that he could not yet
confirm what type of cyber-attack the Norwegian firm was facing, or
who was behind it.
The company's website is currently down and it is
posting
updates to Facebook.
"IT systems in most business areas are
impacted," the firm said.
Hydro told the BBC that
digital systems at its smelting plants were programmed to ensure
machinery worked efficiently.
However, these
systems had had to be turned off.
… Smelting
operations in Norway, Qatar and Brazil had been affected,
according to the Reuters news agency. Additionally, Hydro had shut
down some of its smaller metal extrusion plants.
Will the police track down those who watched this
live? Did they have knowledge that it was coming?
Update on
New Zealand
- The video was viewed fewer than 200 times during the live broadcast. No users reported the video during the live broadcast. Including the views during the live broadcast, the video was viewed about 4000 times in total before being removed from Facebook.
- The first user report on the original video came in 29 minutes after the video started, and 12 minutes after the live broadcast ended.
- Before we were alerted to the video, a user on 8chan posted a link to a copy of the video on a file-sharing site.
Because they work!
Phishing
Attacks: Now More Common Than Malware
As custodians of the world’s most commonly used
computer operating systems and cloud-based office tools, Microsoft’s
security team is uniquely positioned to analyze trends in cyber
security threats. The company’s regular Security Intelligence
Reports, published at least annually since 2006, serve as an
excellent indicator of these trends. The most recent report
indicates that phishing attacks are now by far the most frequent
threat to the cyber landscape, increasing a massive 250% since the
publication of the previous report.
Microsoft’s numbers are based on an internal
scan of Office 365 email addresses, with over 470 billion messages
analyzed. The company reports that not only are phishing attacks
much more frequent, but they have also significantly increased in
sophistication in a short amount of time.
What happens when the system tries to kill you?
Death By
1,000 Clicks: Where Electronic Health Records Went Wrong
The U.S. government
claimed that turning American medical charts into electronic records
would make health care better, safer, and cheaper. Ten years and $36
billion later, the system is an unholy mess. Inside a digital
revolution that took a bad turn.
… Her doctor had considered the possibility of
an aneurysm and, to rule it out, had ordered a head scan through the
clinic’s software system, the government alleged in court filings.
The test, in theory, would have caught the bleeding in Monachelli’s
brain. But the order never made it to the lab; it had never been
transmitted.
… It didn’t take long for Foster to assemble
a
dossier of troubling reports — Better Business Bureau
complaints, issues flagged on an eCW user board, and legal cases
filed around the country — suggesting the company’s technology
didn’t work quite the way it said it did.
We’ll have it all worked out in 20 or thirty
years.
Products
Liability and the Evolving Internet of Things
… Traditional products liability principles
apply reasonably well to IoT devices when the device itself
malfunctions.
… Liability is more difficult to judge in the
IoT realm, where devices are increasingly integrated into networks.
In the past, manufacturers have been held liable where defects in
their products caused a series of failures in other, integrated
products only when the manufacturer “substantially participated”
in the integration of its products into the overall design of the
network.
… Privacy threats and liability for security
breaches fit less neatly in the traditional products liability
framework, which may require an evolution of products liability law.
The lack of clear, universal industry standards for IoT security
makes proof of the existence of a design defect difficult.
Who knew that New York Law Schools had a class in
Chutzpah. Not silly, non-lawyer me.
New York City’s newest luxury neighborhood,
Hudson Yards, officially opened on Friday and visitors are already
scrambling to photograph
or mock its gilded pinecone landmark structure dubbed the Vessel.
But, as Gothamist
points out, Hudson Yards seemingly claims rights to all such photos
of the $200-million giant honeycomb floating above
an active train yard, so long as they’re taken in and around
the Vessel.
… Mickey Osterreicher, general counsel for the
National Press Photographers Association told Gothamist that these
terms and conditions don’t mean that Hudson Yards owns visitors’
content, but the organization is allowed “broad license” to use
the content how it would like without visitors’ consent. And it
means visitors can’t use their Vessel content commercially,
according to Osterreicher’s reading.
James Grimmelmann, a law professor at Cornell Law
School and Cornel Tech, blasted the “content” clause on Twitter.
It's even broader than
phototographs taken inside the Vessel. It also covers photographs
"depicting or relating to the Vessel" even if not taken
from inside. So if you "agree" to the license, it even
applies to your later photographs of the Vessel taken from across the
river.
So: Go to the Vessel.
Take a photo or a video. Put it online with a Creative Commons
Attribution license. You're not making a commercial use, and anyone
else who does never agreed to the Vessel's terms.
No doubt President Trump would love to copy this law.
https://www.rferl.org/a/russia-putin-signs-fake-news-legislation/29828242.html
Russia's
Putin Signs Into Law Bills Banning 'Fake News,' Insults
President Vladimir Putin has signed legislation
enabling Russian authorities to block websites and hand out
punishment for "fake news" and material deemed insulting to
the state or the public.
For the toolkit.
FT.com free
data visualization tool
Center for Data Innovation: “The Financial
Times has released a free data visualization tool called
FastCharts to help people make professional charts with their data in
less than a minute. Users can paste in their data in CSV or TSV
format and the tool will automatically create an area, bar, column,
or line chart with labels and a title. Once the tool creates a
chart, users can customize their chart through actions such as
highlighting specific data on the chart or changing the scale.”
A tool for checking student papers?
This Site
Detects Whether Text Was Written by a Bot
Futurism – Reassuringly,
Futurism articles registered as being written by humans. “Last
month, developers from OpenAI announced that they had built a text
generating algorithm called GPT-2 that they
said was too dangerous to release into the world, since it could
be used to pollute the web with endless bot-written material. But
now, a team of scientists from the MIT-IBM Watson AI Lab and Harvard
University built an
algorithm called GLTR that determines how likely it is that any
particular passage of text was written by a tool like GPT-2 — an
intriguing escalation in the battle against spam.
When OpenAI unveiled GPT-2, they showed how it
could be used to write fictitious-yet-convincing news articles by
sharing one that the algorithm had written about scientists who
discovered unicorns. GLTR uses the exact same models to read the
final output and predict whether it was written by a human or GPT-2.
Just like GPT-2 writes sentences by predicting which words ought to
follow each other, GLTR determines whether a sentence uses the word
that the fake news-writing bot would have selected… The IBM, MIT,
and Harvard scientists behind the project built
a website that lets people test
GLTR for themselves. The tool highlights words in
different colors based on how likely they are to have been written by
an algorithm like GPT-2 — green means the sentence matches GPT-2,
and shades of yellow, red, and especially purple indicate that a
human probably wrote them…”
1 comment:
The data that you provided in the blog is informative and effective.
Selenium Training in Chennai | Certification | Online Courses
selenium training in chennai
selenium training in chennai
selenium online training in chennai
selenium training in bangalore
selenium training in hyderabad
selenium training in coimbatore
selenium online training
Post a Comment