Hacking for insider information?
https://www.databreaches.net/news-corp-says-it-was-hacked-believed-to-be-linked-to-china/
News Corp says it was hacked; believed to be linked to China
Eric Tucker and Frank Bajak report:
News Corp, publisher of The Wall Street Journal, said Friday that it had been hacked and had data stolen from journalists and other employees, and a cybersecurity firm investigating the intrusion said Chinese intelligence-gathering was believed behind the operation.
The news company, whose publications and businesses include the New York Post and WSJ parent Dow Jones, said it discovered the breach on Jan. 20
Read more at TechXPlore
Because individual computers are easier?
https://www.databreaches.net/a-look-at-the-new-sugar-ransomware-demanding-low-ransoms/
A look at the new Sugar ransomware demanding low ransoms
Lawrence Abrams reports:
A new Sugar Ransomware operation actively targets individual computers, rather than corporate networks, with low ransom demands.
First discovered by the Walmart Security Team, ‘Sugar’ is a new Ransomware-as-a-Service (RaaS) operation that launched in November 2021 but has slowly been picking up speed.
The name of the ransomware is based on the operation’s affiliate site discovered by Walmart at ‘sugarpanel[.]space’.
Read more at BleepingComputer.
Another voice?
New DOD Chief Digital Artificial Intelligence Office Launches
The Defense Department must become a digital and artificial intelligence-enabled enterprise capable of operating at the speed and scale necessary to preserve its military advantage, according to a memorandum issued by Deputy Secretary of Defense Kathleen H. Hicks.
The memorandum, published on defense.gov, outlines how the chief digital and artificial intelligence officer, or CDAO, is charged with making sure DOD supports such an enterprise. John Sherman, DOD chief information officer, will serve as the acting chief digital and artificial intelligence officer until the position is filled permanently.
Summary.
Jump in Facial and Voice Recognition Raises Privacy, Cybersecurity, Civil Liberty Concerns
Joseph J. Lazzarotti, Jason C. Gavejian, and Jody Kahn Mason of JacksonLewis write:
Facial recognition, voiceprint, and other biometric-related technology are booming, and they continue to infiltrate different facets of everyday life. The technology brings countless potential benefits, as well as significant data privacy and cybersecurity risks.
Whether it is facial recognition technology being used with COVID-19 screening tools and in law enforcement, continued use of fingerprint-based time management systems, or the use of various biometric identifiers such as voiceprint for physical security and access management, applications in the public and private sectors involving biometric identifiers and information continue to grow … so do concerns about the privacy and security of that information and civil liberties. Over the past few years, significant compliance and litigation risks have emerged that factor heavily into the deployment of biometric technologies, particularly facial recognition. This is particularly the case in Illinois under the Biometric Information Privacy Act (BIPA).
Read our Special Report which discusses these concerns and the growing legislating activity. You can also access our Biometric Law Map.
Coming soon to the US?
https://www.cnbc.com/2022/02/04/britain-beefs-up-online-safety-bill-with-new-criminal-offences.html
Britain takes aim at online fraud, revenge porn with beefed-up rules for Big Tech
The U.K. government has updated proposals to regulate online platforms with new criminal offences to tackle fraud and revenge porn.
Britain’s landmark Online Safety Bill seeks to combat the spread of harmful and illegal content on social media sites including Facebook, Instagram, YouTube, Twitter and TikTok.
Late last year, lawmakers wrapped up an inquiry into how online platforms deal with such material, concluding the government should add more offences to the scope of the law, such as self harm, racial abuse and scam advertising.
The government said Friday that the bill will now include extra-priority provisions outlawing content that features revenge porn, drug and weapons dealing, suicide promotion and people smuggling, among other offences.
It will also target individuals who send online abuse and threats, with criminal sentences ranging up to five years.
(Related) They keep trying.
https://www.schneier.com/blog/archives/2022/02/the-earn-it-act-is-back.html
The EARN IT Act Is Back
Senators have reintroduced the EARN IT Act, requiring social media companies (among others) to administer a massive surveillance operation on their users:
A group of lawmakers led by Sen. Richard Blumenthal (D-CT) and Sen. Lindsey Graham (R-SC) have re-introduced the EARN IT Act, an incredibly unpopular bill from 2020 that was dropped in the face of overwhelming opposition. Let’s be clear: the new EARN IT Act would pave the way for a massive new surveillance system, run by private companies, that would roll back some of the most important privacy and security features in technology used by people around the globe. It’s a framework for private actors to scan every message sent online and report violations to law enforcement. And it might not stop there. The EARN IT Act could ensure that anything hosted online — backups, websites, cloud photos, and more — is scanned.
Slashdot thread.
Perspective. Am I missing out? Just because I own it, doesn’t make it valuable.
The Internet Is Just Investment Banking Now
The internet has always financialized our lives. Web3 just makes that explicit.
Twitter has begun allowing its users to showcase NFTs, or non-fungible tokens, as profile pictures on their accounts. It’s the latest public victory for this form of … and, you know, there’s the problem. What the hell is an NFT anyway?
There are answers. Twitter calls NFTs “unique digital items, such as artwork, with proof of ownership that’s stored on a blockchain.” In marketing for the new feature, the company offered an even briefer take: “digital items that you own.” That promise, mated to a flood of interest and wealth in the cryptocurrency markets used to exchange them, has created an NFT gold rush over the past year. Last March, the artist known as Beeple sold an NFT at auction for $69.5 million. The digital sculptor Refik Anadol, one of the artists The Alantic commissioned to imagine a COVID-19 memorial in 2020, has brought in millions selling editions of his studio’s work in NFT form. Jonathan Mann, who started writing a song every day when he couldn’t find a job after the 2008 financial collapse, began selling those songs as NFTs, converting a fun internet hobby into a viable living.
For the faculty.
https://www.makeuseof.com/best-platforms-to-start-online-tutoring-career/
The 8 Best Platforms to Start a Successful Online Tutoring Career
Are you looking to start your own online tutoring career? Here are some of the best platforms that'll help you to get started.
Thinking about computers…
https://spectrum.ieee.org/on-beyond-moores-law-4-new-laws-of-computing
Moore’s Not Enough: 4 New Laws of Computing
Moore’s and Metcalfe’s conjectures are taught in classrooms every day—these four deserve consideration, too
I teach technology and information-systems courses at Northeastern University, in Boston. The two most popular laws that we teach there—and, one presumes, in most other academic departments that offer these subjects—are Moore’s Law and Metcalfe’s Law. Moore’s Law, as everyone by now knows, predicts that the number of transistors on a chip will double every two years. One of the practical values of Intel cofounder Gordon Moore’s legendary law is that it enables managers and professionals to determine how long they should keep their computers. It also helps software developers to anticipate, broadly speaking, how much bigger their software releases should be.
Metcalfe’s Law is similar to Moore’s Law in that it also enables one to predict the direction of growth for a phenomenon. Based on the observations and analysis of Robert Metcalfe, co-inventor of the Ethernet and pioneering innovator in the early days of the Internet, he postulated that the value of a network would grow proportionately to the number of its users squared.
Law 1. Yule’s Law of Complementarity
If two attributes or products are complements, the value/demand of one of the complements will be inversely related to the price of the other complement.
Law 2. Hoff’s Law of Scalability
The potential for scalability of a technology product is inversely proportional to its degree of customization and directly proportional to its degree of standardization.
Law 3. Evans’s Law of Modularity
The inflexibilities, incompatibilities, and rigidities of complex and/or monolithically structured technologies could be simplified by the modularization of the technology structures (and processes).
Law 4. The Law of Digitiplication
The law of digitiplication stipulates that whenever a resource or process is digitalized, its potential value grows in a multiplicative manner.
For my hackers.
https://www.darkreading.com/careers-and-people/want-to-be-an-ethical-hacker-here-s-where-to-begin
Want to Be an Ethical Hacker? Here's Where to Begin
By utilizing these resources, beginner hackers can find their specific passions within the cybersecurity space and eventually make their own mark in the ethical hacking profession.
(Related) Just like real hacking!
https://www.makeuseof.com/ethical-hacking-steps/
What Are the 5 Steps of Ethical Hacking?
Ethical hacking is not a contradiction; some people use their evil-genius skills to help improve security, and here’s how they do it.
No comments:
Post a Comment