Security & Privacy

Programs Controlling ICS Robotics Are 'Wide Open' to Vulnerabilities


Most manufacturers have connected their operational technology – including industrial control systems and robotic equipment –to the internet, yet the lack of basic security protocols leave these companies open to cyberattacks. Dewan Chowdhury, founder of MalCrawler, said that many robotics that work as part of industrial systems on manufacturing floors are still leveraging outdated and unsupported operating systems – such as Windows XP. Chowdhury presented his research at a SAS session titled "Hack Your Robot". "Even before the robotics, the issue is that the programs that control the robotics are completely wide open to vulnerabilities," said Chowdhury. For manufacturing companies, cybersecurity threats are beginning to make headlines.

Accelerate Your Personal Data Discovery and Protection Journey


Organizations around the world -- and not just those in the EU but also those consuming goods and services from Europe -- need to prepare now for the EU GDPR. If you're providing electronic goods or services to anyone who's in Europe, be they a citizen, a temporary resident, or even if they're passing through a European airport for half an hour, potentially, GDPR may apply, and you need to comply with that. It may also apply to anyone in the world, anywhere, if you are profiling or doing analytics on them. You have limited time and increasing pressure to get ready by 25 May 2018. GDPR practical data actions and accelerators from IBM can help your organization on its journey to compliance.

MapR Data Fabric for Kubernetes


MapR Data Fabric for Kubernetes provides persistent storage for containers and enables the deployment of stateful containers. It addresses the limitations of container use by providing easy and full data access from within and across clouds and on-premises deployments. Now stateful applications can easily be deployed in containers for production use cases, machine learning pipelines, and multi-tenant use cases. As organizations adopt containers at a larger scale, and as they move containers as a deployment model to production, other aspects such as storage, monitoring, and performance becomes essential as well. MapR Data Fabric for Kubernetes provides several features that will assist organizations in their journey with containers.

Global Bigdata Conference


Security professionals in the enterprise are facing an uphill battle to maintain control of corporate networks. Data breaches and cyberattacks are rampant, sensitive information belonging to both companies and individuals is spilling unchecked into the underbelly of the Internet, and with the emergence of state-sponsored threat actors, it is becoming more and more difficult for organizations to keep up. It is estimated the cyberattacks and online threats will cost businesses up to $6 trillion annually by 2021, up from $3 trillion in 2015. Once cyberattackers compromise an enterprise network or cloud service, information can be stolen, surveillance may be conducted, or in some cases, ransomware attacks can lock down an entire operation and hold a business to ransom. However, new technologies are entering the cybersecurity space which may help reduce the financial cost and burden on cybersecurity professionals pressed for time and often operating with limited staff and budgets.

9 IoT Security Trends to Watch for in 2018 Lanner


In this article, we've put together our collection of the top 9 IoT security trends to watch out for in 2018, so let's jump straight in. With the recent news of the Meltdown and Spectre vulnerabilities being discovered to affect nearly every computer on the planet, it can be expected that much more focus and research will be put into discovering other potentially catastrophic flaws in microprocessors and other technologies that modern computing relies so heavily upon. What is also likely, unfortunately, is that any new vulnerabilities found will probably be just as bad, if not worse than either Meltdown or Spectre. With the expansion of the Internet of Things will inevitably come an enormous increase in the number of connected devices, with current forecasting putting estimates into the tens of billions by 2020. This means that the number of vulnerable devices will also no doubt increase, meaning hackers have a much wider selection of "things" to target as well as attack vectors enabling them to exploit the vulnerabilities within a system or network.

Unisys pockets AU$90m in border biometrics and Defence IT support


American IT services provider Unisys has picked up a pair of Australian government contracts. The first is to design and implement the Enterprise Biometric Identification Services (EBIS) system that will be used by the Department of Home Affairs to conduct biometric matching on people entering Australia. "The new EBIS system will be used by the department to match face images and fingerprints of people wishing to travel to Australia, including visa and citizenship applicants, against biometric watch lists to identify people of security, law enforcement, or immigration interest, while simultaneously facilitating the processing of legitimate travellers," Unisys said in a statement. The company said the system will be designed for the next decade. For its part, Assistant Minister for Home Affairs Alex Hawke said the system would "vastly improve" Australia's biometric storage and processing capabilities, and consolidate the biometrics collected through visa and detention programs with data collected at SmartGates.

Power grid cybersecurity tool uses machine learning and sensors to detect threats


In today's always connected world, losing power is more than just an annoyance. "The truth is, we rely on electricity much more than we realize," writes Sherry Hewins in her column What Could Happen in a Long-Term Power Outage? "Even if you live'off the grid' as I did for years, you are still living in a world and a society that is deeply dependent upon electricity." It is the "deep dependency" that has power companies moving toward what is called the Smart Grid, a more efficient and reliable power-distribution infrastructure. One reason these capabilities are possible is the use of two-way communications between power-distribution centers and smart equipment (smart meters and smart appliances) downstream. Enhanced communications help more than just the people who make sure electricity keeps flowing.

Securing the Insecure: Security Challenges Posed by the Internet of Things


Many organizations are experimenting with IoT deployments, ranging from automation systems and sensor networks to critical connected healthcare solutions, connected vehicles, and industrial robotics. Such deployment scenarios can automate device management, improve efficiencies and reduce operational costs, while improving the customer experience. Opportunities exist in every business sector, and early adopters are racing to secure a first-move advantage. However, IoT brings several security challenges with far-reaching consequences. These challenges differ from those present in more conventional technology infrastructures.

Artificial Intelligence In Cybersecurity: A Paradigm Shift -


The threat landscape has moved far beyond programmers trying to show off their exploitative coding skills to their peers. Modern cybercriminals choose efficacy over spectacle and employ a variety of attack methodologies to breach network security. They leverage the most cutting-edge tech to launch swifter, more powerful, and highly sophisticated attacks. With advanced technologies such as machine learning and artificial intelligence now being integrated into cyber attack methodologies, security experts believe that 2018 could be the year that witnesses the first wave of attacks with true AI capabilities. This spells trouble for global businesses already struggling to deal with high attack volumes and multidimensional attack vectors.

Baidu's Deep Voice can clone speech with less than four seconds of training Computing


With only a few seconds of audio, the'Deep Voice' software developed by China's Baidu is able to clone a human voice - raising fears about the security of biometrics. Baidu has been working on Deep Voice for over a year, and had already managed to reproduce speaker identities with about half an hour of training data. With new developments, it has lowered that time to 3.7 seconds. A believable, if low-quality, false voice can now be produced from a only single sentence of speech. Of course, more training leads to higher-quality results, especially if there is more than one sample to learn from.