Browsed by
Author: Greg Swiecicki

Tumors

Tumors

It turns out that recently published studies show that it is impossible to completely trust the techniques of medical imaging presenting with the help of artificial intelligence. An international research team from the University of Cambridge, led by Anders Hansen, announced that deep learning tools that transmit high-quality images through quick scans could create numerous distortions of artifacts that, unfortunately, will distort diagnosis. Artificial intelligence systems are very advanced and can describe x-ray images, computer tomography, or magnetic resonance imaging. Due to these possibilities, it was decided to use AI for image reconstruction. However, a problem arose; SI systems have serious issues. Unfortunately, they may miss small structural changes such as cancerous tumors. The situation can occur even with a slight disturbance, yet the patient’s movement, and be reproduced as severe artifacts in the output image. Hansen said researchers need to test system stability. Most systems are unstable. The problem is dangerous because it is not possible to explain mathematically how such systems work. Without specific testing, catastrophically wrong results will be presented. Fortunately, such systems are not yet used in practice.

The Telehealth Attack Surface

The Telehealth Attack Surface

In the current situation, telehealth and telemedicine have faced numerous cyber threats. The existing regulations do not provide for full managementof services and will not offer a complete list of threats. During the pandemic, many platforms have bypassed current rules, which increases the risk.

https://www.itproportal.com/news/intels-new-mobile-cpus-will-be-the-first-to-utilise-its-new-anti-malware-tech/

If you’re despairing at staff sharing admin passwords, look on the bright side. That’s CIA-grade security

If you’re despairing at staff sharing admin passwords, look on the bright side. That’s CIA-grade security

CIA’s Center for Cyber ​​Intelligence (CCI) missed a case in securing its materials. Instead of taking radical steps to obtain it, it focused more on developing zero-day exploits and other offensive uses. The supervisor led the super agency to inadvertently transferred its hacking tools to WikiLeaks.

https://www.theregister.com/2020/06/16/cia_report_vault_7_leak/

How To Avoid Ransomware?

How To Avoid Ransomware?

When backing up your files, back up your personal files where they cannot be saved or deleted. For example, put them on a removable hard drive or send them to a remote backup service, such as CrashPlan, to restore previous versions of files. Do not store backups on an internal hard drive or network share that you have write access to. The ransomware can encrypt files on a connected backup disk or network share if you have full write access.

https://lnkd.in/dPzCW4Y

https://www.youtube.com/watch?v=wDJdb7hL8Sg&t=4s
The private mode of browsers

The private mode of browsers

A collective lawsuit was filed against San Jose against Google. The authors of the trial accuse the giant of collecting information about Internet users without permission, although users use the private mode of browsers. They think Google should pay at least $ 5 billion in fines. According to the authors of the lawsuit, the problem concerns millions of people. For each violation of relevant federal and state laws, the group should pay at least USD 5,000 to the user whose rights have been violated. The lawsuit states that Google collects data using Google Analytics, Google Ad Manager, and other applications and add-ons, regardless of whether the user has clicked on Google ads. Google cannot secretly or unauthorized collect data on every American who has a computer or telephone, the writers of the lawsuit write. Security specialists pointed out that users consider private mode completely protected from tracking. However, companies such as Google are still able to collect user data and, when combined with data from free surf mode, refine information about Internet users.

New Ripple20 Flaws Put Billions of Internet-Connected Devices at Risk of Hacking

New Ripple20 Flaws Put Billions of Internet-Connected Devices at Risk of Hacking

The CISA ICS-CERT, Internal Security Department, will issue a critical warning about security, specifically about newly identified vulnerabilities. It turns out that the recently detected vulnerabilities have a colossal impact on billions of devices connected to the Internet. Five hundred suppliers around the world manufactured the machines.

https://thehackernews.com/2020/06/new-critical-flaws-put-billions-of.html