Browsed by
Category: Articles

Applications

Applications

Fifteen years ago, the user made an average of 1 mobile operation per day, but already in 2018, there were 70 times a day. It is estimated that by 2023, 100 million new applications will be created in the EMEA region. The pace of change is so fast that companies performing digital transformation are reaching the state of so-called digital deadlock. Unfortunately, there are problems, obstacles whose changes begin to slow down or even stop. Excess information makes it increasingly difficult to deal with them. What do you think about it ?

Modern technology

Modern technology

Modern technology is changing rapidly. All boundaries between organizations are blurred. Our technological dynamic immediately attracts organized crime groups that, through their anonymity on the network, regularly attack organizations and clients, especially those most vulnerable to attacks. Approaches to asset protection used for years and their improvement have unfortunately ceased to be effective. Losses in organizations heavily dependent on technology are significant, which means that they will not have a chance to learn from their own mistakes and cease to exist as a result of a cyber-attack.
Cyber ​​resistance foundations:
1) Be aware that cybercriminals will attack any organization.
2) It is important to react quickly to the attack so that the organization can face the attack.
3) It is important to continually educate and exercise to be ready to face the imminent attack.
4) Drawing information and knowledge from the experience of other organizations.
5) Using artificial intelligence, we will gain a better position in the fight against cyber threats.

A bracelet

A bracelet

Each of the devices with a voice assistant has a built-in listening system; they are everywhere – in space or at home. Everything is done to make our lives more comfortable, not to write queries, but to give the command in a voice. Initial excitation related to smart devices weakens and, on the contrary, becomes annoying when we are aware that we are overheard, recorded, or our confidential data is saved. That is why, in the era of intelligent devices, it is essential to protect users against potential threats. A device that looks like a bracelet was created, with 24 small speakers emitting an ultrasonic signal in the 24-26 kHz band. The signal is strong enough to disturb the microphones in the device. However, it can be irritable to our pets. The prototype is quite large, but it will be minimized in the future to make it look more delicate.

SlothBot in Atlanta Botanical Garden

SlothBot in Atlanta Botanical Garden

SlothBot can be seen in the Atlanta Botanical Garden. A slow but efficient robot monitors animals, plants, and the environment. Solar panels powered the robot; it moves on a cable stretched between trees. It can monitor temperature, weather, carbon dioxide levels. Slowness shows that being free is ideal for this type of application. The robot is programmed to move only when necessary. It locates sunlight when the batteries need recharging. It was prepared to determine what is happening with pollinators or how interactions between plants and animals look like. It will also be useful for studying phenomena that are otherwise difficult to observe. It is interesting to create a robot that becomes part of the ecosystem.

Tumors

Tumors

It turns out that recently published studies show that it is impossible to completely trust the techniques of medical imaging presenting with the help of artificial intelligence. An international research team from the University of Cambridge, led by Anders Hansen, announced that deep learning tools that transmit high-quality images through quick scans could create numerous distortions of artifacts that, unfortunately, will distort diagnosis. Artificial intelligence systems are very advanced and can describe x-ray images, computer tomography, or magnetic resonance imaging. Due to these possibilities, it was decided to use AI for image reconstruction. However, a problem arose; SI systems have serious issues. Unfortunately, they may miss small structural changes such as cancerous tumors. The situation can occur even with a slight disturbance, yet the patient’s movement, and be reproduced as severe artifacts in the output image. Hansen said researchers need to test system stability. Most systems are unstable. The problem is dangerous because it is not possible to explain mathematically how such systems work. Without specific testing, catastrophically wrong results will be presented. Fortunately, such systems are not yet used in practice.

The private mode of browsers

The private mode of browsers

A collective lawsuit was filed against San Jose against Google. The authors of the trial accuse the giant of collecting information about Internet users without permission, although users use the private mode of browsers. They think Google should pay at least $ 5 billion in fines. According to the authors of the lawsuit, the problem concerns millions of people. For each violation of relevant federal and state laws, the group should pay at least USD 5,000 to the user whose rights have been violated. The lawsuit states that Google collects data using Google Analytics, Google Ad Manager, and other applications and add-ons, regardless of whether the user has clicked on Google ads. Google cannot secretly or unauthorized collect data on every American who has a computer or telephone, the writers of the lawsuit write. Security specialists pointed out that users consider private mode completely protected from tracking. However, companies such as Google are still able to collect user data and, when combined with data from free surf mode, refine information about Internet users.

Living organisms

Living organisms

The team of MIT, Harvard, and the Dana-Farber Cancer Institute have developed an additive manufacturing method in which prints contain chemicals that affect living organisms. Researchers used various chemicals in the 3D printing process. Thanks to this, they were able to cause specific reactions in microorganisms with which they coated printed objects. In response to the preparations contained in the printout, the microorganisms changed color or emitted light. Printed objects can control the behavior of organisms. Scientists called them hybrid living materials. The purpose of further work is to prepare a tool enabling the production of objects as well as devices with living elements, whose actions will be predictable.

Bluetooth devices

Bluetooth devices

In many Bluetooth devices, gaps have been identified, including fitness bracelets or smart home devices. The errors found can be used to cause a failure or to give the attacker the right to read and write data. Singapore researchers have informed device manufacturers so many of them have prepared or are preparing patches. The main challenge will be to make sure that people who should manually update their software do so. The comforting situation is that an attack on these holes cannot be made via the Internet. The attacker must be near the attacked device. However, the biggest problem is medical devices. Attacks can be made on pacemakers, glucose monitors, and drug delivery devices. Meanwhile, the holes allow them to fail, force restart, and block them or take control over them. The latter method of attack poses the greatest

Phishing attacks

Phishing attacks

A massive number of cybersecurity companies are reporting an increasing number of attacks, especially phishing attacks. Criminals in China, Russia, and North Korea were the most active. Hackers send information about the coronavirus, hoping that the victims will click on the link provided where their computers will be attacked. The main targets of the attacks are in the US, Europe, and Iran. Experts say criminals have funded the entire campaign and run it through social networks and email. They try to attack not only individual users’ computers but also machines belonging to companies. Attempts to encourage companies to transfer money to fight the epidemic or convince them to change banks have noticed. Criminals are trying to steal e-mail login details, social networking sites, or take control of users’ computers. False virus and epidemic messages are sent, as well as information about refunds of overpaid tax and various extraordinary actions taken in connection with a pandemic.

Work remotely

Work remotely

Nowadays, I recommend using tools whose security is a basic, embedded solution and does not require complicated configurations. Functionality and convenience are not the only criteria for choosing a solution for cooperation. In each of them must be accompanied by functions that ensure security. Always remember to turn off all tools and functions associated with them. Turn off the microphone, camera, screen sharing or file sharing. Working at home, we feel more comfortable than in the office, so it’s worth covering the camera in your computer. Remember that some video conferencing applications automatically turn on video as soon as you join the conversation or when you allow hosts to enable video features for participants. If you intend to share the screen during a conference call, turn off desktop notifications and make sure that wallpaper and other windows are suitable to present to participants in a virtual meeting. Consider how access to virtual meetings is ensured – it’s best if your remote work tools are integrated with security solutions. Require meeting host permission to add guests and share recordings – although teleconferencing has long been a standard in many organizations, now there are more than ever.