Suicide Detection & Prevention in Schools

Suicide Detection & Prevention in Schools

Suicide Statistics Thousands of teens commit suicide each year in the United States. Suicide is the SECOND leading cause of death for college-age and youth, ages 12-18. (CDC, 2016).   It results in approximately 4,600 lives lost each year. The top three methods used in suicides of young people include firearm (45%), suffocation (40%), and…

Read more
ARTIFICIAL INTELLIGENCE IS RUSHING INTO PATIENT CARE—AND COULD RAISE RISKS

Artificial Intelligence Is Rushing Into Patient Care—And Could Raise Risks

AI systems are not as rigorously tested as other medical devices, and have already made serious mistakes Few tech startups publish their research in peer-reviewed journals, which allow other scientists to scrutinize their work, according to a January article in the European Journal of Clinical Investigation. Such “stealth research”—described only in press releases or promotional events—often overstates…

Read more
European Union Consumer Groups Demand Action Against Google's Unlawful Geo-Tracking

European Union Consumer Groups Demand Action Against Google’s Unlawful Geo-Tracking

While addressing the issue, a Google representative pointed out that their geo-feature provides a plethora of opportunities for smartphone updates when it’s on, however, if paused, the developer retains its ability, depending on a particular device’s model, and app settings, to still use location data, in order to boost one’s ‘Google experience.’ A number of…

Read more

White House drafts an order putting the FCC in charge of monitoring social media

The White House is contemplating issuing an executive order that would widen its attack on the operations of social media companies.          The White House has prepared an executive order called “Protecting Americans from Online Censorship” that would give the Federal Communications Commission oversight of how Facebook, Twitter and other tech companies monitor and manage their…

Read more

3 ways Digitization will Help End Crime – Digital Identities & Signatures prevent Forgery and Corruption

Government-issued digital identities and signatures for citizens, businesses and government agencies is an emerging digital trend. Digitally leading countries demonstrate that, for instance, hacker attacks on financial institutions are lower in numbers compared to countries without a central digital identity. Whereas traditional paper documents only require simple Photoshop skills to forge, it is impossible to…

Read more
facial recognition software

California bans law enforcement from using facial recognition software for the next 3 years

California lawmakers today passed a bill placing a three-year state-wide moratorium on the use of facial recognition technology by law enforcement agencies. AB 1215, The Body Camera Accountability Act, was introduced earlier this year by assembly member Phil Tang, a Democrat. Both San Francisco and Oakland previously passed similar bills preventing the use of facial…

Read more

Key Components in a Security Operations Center

Cyber-Attacks have grown significantly in complexity, rendering the majority of ‘Off the Shelf’ detection solutions ineffective. In addition, due to advanced subterfuge techniques, malware often goes unnoticed by system administrators despite being clearly visible to experienced investigators. We have to rely on the human factor, i.e. the analysts, to outsmart the sophisticated attackers. An effective…

Read more

3 Ways Digitization will Help End Crime – Digital Currencies mean no illegal money transfers

In countries that have efficiently digitized a major part of their financial infrastructure (e.g. many Nordic ones), very few people carry cash. It is safe to assume that a significant part of the cash in use comes either from criminal activities or the black labor market. The emergence of blockchain and cryptocurrencies shows that digital…

Read more

How Multi-Factor Authentication can Combat Phishing, Cyber Attacks

  What is multi-Factor authentication? This is considered to be an essential security tool presently required by most industries nowadays to be utilized in the fight against advanced cyber-attacks and phishing. Typical scenarios for multi-factor authentication include ATM fund withdrawals and online shopping. With Two-Factor Authentication there are two passwords required to process an ATM…

Read more
AMAZON FACIAL RECOGNITION SOFTWARE

AMAZON FACIAL RECOGNITION SOFTWARE USED BY LAW ENFORCEMENT HAS RACIAL BIAS, PER REPORT

Facial technology software from Amazon used by some law enforcement agencies has shown inaccuracies, particularly when it comes to women of color. Sometimes the technology mistakes dark-skinned women as men. The system worked fine when recognizing men. It’s identifying women that became a glaring problem for the software. An MIT report says Amazon’s Recognition misidentified…

Read more

Cryptojacking: How Hackers are Mining Cryptocurrencies without Your Knowledge

What is Crypto-jacking? There are two types of Cryptojacking: File-based Cryptojacking File-based Crypto-jacking requires a corporate network in conjunction with a malware based infiltration.   Many of these attacks are self-propagating, spreading through the network, and creating enormous cleanup costs. They may also drop additional malware in the internal system as they propagate. Browser-based Cryptojacking…

Read more

FBI Was Preparing To Hire Social Media Monitors Weeks Before El Paso, Dayton Attacks – a little to late.

Several weeks before the shootings that took 29 innocent lives the FBI had posted on the bureau’s website a request for private sector monitors to assist federal agents in tracking social media posts to prevent future attacks, according to the post. It wasn’t soon enough. On Saturday August 3rd, 2019 in the span of 13…

Read more

Security Operations Centers based on Industry Specifications

Security Operations Center should be different based on Supported Industry Specifications Not all Business Sectors or industries require the same Security Operations Center roadmap. In this article we take a look at how Security Operations Centers differ within the Education, Public Safety, and Public Events business sectors. Educational Security Operations Centers Today’s Education Security Operations…

Read more

Phishing Facts: The simple Truth

Facts about Phishing The term Phishing is referred to as social engineering which utilizes the digital world for malicious purposes. Information systems are paramount to the success of all businesses. Phishing has created a means in which these Information Systems are vulnerable to cyber-attacks. Some facts about Phishing: Over the last three years, Phishing attacks…

Read more

Former Canucks Prospect Deletes Social Media After Vancouver Fans Cyber Bully Him

Apparently, Vancouver Canucks fans are prolific in cyber bullying.  Jonathan Dahlen was recently moved by the Canucks in exchange for Linus Karlsson at the ​Trade Deadline. Following the deal, reports emerged that his agent had requested a move from Vancouver, which instilled quite a bit of hate from Canucks fans. He was being ripped to shreds on…

Read more

Latest T-Mobile breach shows indifference to Data Breaches

T-mobile experienced a data breach recently; however, it was underreported because only 2.31 million customers were affected. Apparently, data breaches have to be in the hundreds of millions to make the headlines. This neglected reporting is unfortunate because any amount of stolen customer information is a serious matter. Hopefully, T-mobile’s security team can investigate the…

Read more

Cloud SLA Metrics

DISA seeks metrics for cloud SLAshttps://t.co/BqMrlagmF1 An interagency working group is putting together a catalog of service level agreement metrics that all federal agencies could use for commercial cloud contracts. — FCW (@FCWnow) August 14, 2018

Read more

Banks in Singapore Asked to Strengthen Data Verification After SingHealth Data Breach

The Monetary Authority of Singapore (MAS) has issued instructions to leading financial institutions and banks in the country to tighten the overall customer verification process after a security breach that occurred at SingHealth which compromised the personal data of approximately 1.5 million people. The MAS claimed that it has sent out a notice to all…

Read more

Businesses Need to Upscale Their Security as IoT Attacks Increase by 600% in one Year

Cryptocurrency mining, ransomware, and the Internet of Things (IoT) attacks dominated the security landscape during the end of 2017. The IoT attacks increased by as much as 600 percent during the period of 2016 and 2017 as recently reported. Similarly, the detection of cryptocurrency miners also increased by a whopping 8500 percent in the fourth…

Read more

How are IoT Cyber Attacks Getting Worse?

The rapid growth of the Internet of Things (IoT) and its deployment are raising several high-end expectations around the world.  Along with this IoT rapid growth across the globe, there is a growing concern about the overall security of IoT devices and applications.   Even after major security concerns and breaches, leading corporations and individuals are…

Read more

Top 5 Most Dangerous IoT Attacks

The specific security requirements of a typical IoT (Internet of Things) system tend to be complex. They surpass the conventional security prerequisites of integrity, confidentiality, and availability. In addition to these factors, the security requirements of the revolutionary IoT system also need to address authorization, authentication, data freshness, and non-repudiation along with forward as well…

Read more

Attacks Reveal the Risks of IoT Security

One of the biggest challenges in the current ecosystem of technological advancements is the overall IoT security necessary to protect IoT devices and applications. As society becomes increasingly interconnected and tethered to an increasing number of cloud hosted smart objects, the vulnerabilities and potential flaws heighten the need for vigilance regarding increased security and vulnerability…

Read more