That's the payments volume running over Visa's global network, a network whose vast global expanse is a tempting playground for cyberthieves. Visa's cybersecurity team, as Chief Information Security Officer Sunil Seshadri told Karen Webster, also logs as many as 8 billion security events every day -- that's billion with a "b." Not all events are intrusions or even attempts, but also include routine security logs and regular everyday network activity. These logs provide deep insight into what is happening in Visa's infrastructure and network on a real-time basis. But finding the signal in this noisy data is a challenge.
Any business in its right mind should be painfully aware of how much money they could bleed via skillful Business Email Compromise (BEC) scams, where fraudsters convincingly forge emails, invoices, contracts and letters to socially engineer the people who hold the purse strings. And any human in their right mind should be at least a little freaked out by how easy it now is to churn out convincing deepfake videos – including, say, of you, cast in an adult movie, or of your CEO saying things that… well, they would simply never say. Well, welcome to a hybrid version of those hoodwinks: deepfake audio, which was recently used in what's considered to be the first known case of an AI-generated voice of a CEO to bilk a UK-based energy firm out of €220,000 (USD $243,000). The Wall Street Journal reports that some time in March, the British CEO thought he had gotten a call from the CEO of his business's parent company, which is based in Germany. Whoever placed the call sounded legitimate.
Emerging tech such as IoT and AI is the second lowest priority for businesses next year for the third year running, second only to print services. That is outlook from a survey conducted by business tech provider Softcat, which asked its 1,600 customers across 18 different industries about their intentions for tech spending in 2020. Among those industries, real estate, private health and social work, and energy and utilities ranked big data, IoT and AI seventh and eighth priority respectively – the highest ranking by those questioned. The survey also reports that 56 percent of industries rank end user computing and mobility, the technology which allows for remote working, as their second biggest technology priority. The construction, education and healthcare industries ranked this as their number one priority, ahead of cyber security investment.
David Feinberg, Google's Vice President of Healthcare, recently described "a search bar on top of ... [ ] your [electronic health records] that needs no training," on stage at a conference in Las Vegas. Google is testing a service that would use its search and artificial intelligence technology to analyze patient records for Ascension, the largest nonprofit health system in the U.S., according to documents about the efforts reviewed by Forbes. Called "'Nightingale," the Google-Ascension project indicates that Google's push into health analysis is farther along than previously believed, even as the company has faced a growing backlash over health-related privacy concerns. Ascension said in a statement that all its work with Google complies with privacy law and is "underpinned by a robust data security and protection effort, which Google echoed in its own blog post later Monday, including that "patient data cannot and will not be combined with any Google consumer data. " The Wall Street Journal first published details of the Ascension partnership earlier on Monday.
The child labor activist, who works for Indian NGO Bachpan Bachao Andolan, had launched a pilot program 15 months prior to match a police database containing photos of all of India's missing children with another one comprising shots of all the minors living in the country's child care institutions. He had just found out the results. "We were able to match 10,561 missing children with those living in institutions," he told CNN. "They are currently in the process of being reunited with their families." Most of them were victims of trafficking, forced to work in the fields, in garment factories or in brothels, according to Ribhu. This momentous undertaking was made possible by facial recognition technology provided by New Delhi's police.
Continuing on the trail of smart security systems exhibiting security issues, now joins Amazon's smart doorbells. Researchers found a serious vulnerability in the Ring Video Doorbell. Researchers from Bitdefender have discovered a serious security vulnerability in Amazon's Ring Video Doorbell. As elaborated in a white paper, the researchers found that the Ring Video Doorbell actually exposed the homes' security to attacks over WiFi. Exploiting the flaw required an attacker to be in close proximity to the target home.
Shankar Radhakrishnan, Founder of Skedler, recently sat down with Bharat Kandanoor to discuss the use of Artificial Intelligence (AI) in cybersecurity. Bharat, who is the Technology Head for cybersecurity and cloud at Blue Ally, a managed service provider, was able to shed light on the intricacies of AI's usage in cybersecurity processes. Let's dive deep into understanding whether AI is an overhyped cybersecurity solution, how it is being used to tackle network security problems, and how AI may be able to create a better cybersecurity future for the end user. Is this level of AI adoption a response to measurable cyber threats that AI can help to remediate or is it merely an overhyped reach by firms around the world? Bharat Kandanoor tells us in our exclusive one-on-one video podcast that "Artificial Intelligence is being used as an overhyped terminology in general."
The revamped, customizable Start menu on Windows 10. The end is near for Windows 7 users: After 10 years, Microsoft will stop supporting the OS on Jan. 14, 2020, which means it's time to upgrade to Windows 10 to keep your PC running smoothly and securely. Some users have been hesitant to make the switch, as the rollout of Windows 10 saw several issues, including a series of bugs that led Microsoft to pull its October 2018 Update days after its release. In April, however, Microsoft laid out several changes to its update approach starting with the May 2019 release, including slower rollouts with additional testing, more options for pausing updates and more disclosure of known issues. Many of the issues are due to the fact that updates are happening more frequently, said Gartner Research analyst Steve Kleynhans.
Bipartisanship in modern politics can seem kind of like an unbelievable, mythical creature. But in recent months, as Congress considered regulation of one of the most controversial topics it faces -- how, when, or if to use facial recognition -- we've gotten glimpses of a political unicorn. In two House Oversight and Reform committee hearings last summer, some of the most prominent Republicans and Democrats in the United States Congress joined together in calls for legislative reform. Proponents of regulation ranged from Rep. Alexandria Ocasio-Cortez (D-NY) to Rep. Jim Jordan (R-OH), a frequent Trump supporter on cable news. On Friday, Jordan was also appointed to the House Intelligence Committee to confront witnesses in public presidential impeachment hearings that begin this week.
Now, however, with artificial intelligence (AI) – essentially advanced analytical models – coming onto the market, cybersecurity actually has the edge. At present, vendors are doing far more than hackers with AI. Not that we can expect it to stay that way forever, but right now the good guys have the upper hand – and that gives the industry some time to prepare itself for the eventual rise of AI-enabled cybercriminals. The value of AI in this model is that it lets companies take large volumes of information and find clusters of similarity. This is always the focus of cybersecurity to a degree, but organisations are often unequipped to do so in sufficient depth because of time and resourcing constraints.