Facebook’s Use of Facial-Recognition Tool Draws Privacy Concerns

From: Bloomberg Business


Facebook Inc. says this enhances the user experience. But privacy advocates say the company’s technology — which regulators in Europe and Canada have ordered shut off — should only be used with explicit permission.

As commercial use of facial recognition technology grows to replace password log-ins, find people in photos and someday even customize displays for shoppers as they browse in stores, it’s raised privacy questions. That’s one reason the U.S. government is participating in a working group to develop rules for companies using facial recognition — even if those are voluntary.


Feds fretting over remote hack of Jeep Cherokee

From: AutoBlog

NHTSA Official: Breach Is “First Example Of What’s To Come”

Pete Bigelow

A cyber-security gap that allowed for the remote hacking of a Jeep Cherokee has federal officials concerned. An associate administrator with the National Highway Traffic Safety Administration said Thursday that news of the breach conducted by researchers Chris Valasek and Charlie Miller had “floated around the entire federal government.”


Hackers Remotely Kill a Jeep on the Highway—With Me in It

From: Wired

I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold.

Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume. I spun the control knob left and hit the power button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the glass.


Cray Comes Back to TACC

From: HPC

Tiffany Trader


The original Lonestar was a 50-gigaflops Cray T3E with 88 processsors. With Lonestar 5, TACC is installing a Cray XC40 machine with more than 30,000 Intel Xeon processing cores delivering 1.25 petaflops of computing power. Specs include 1,252 nodes of dual-socket 12-core Intel Xeon E5-2600 v3 processors, two large shared memory nodes with 1 TB each, eight large shared memory nodes with 500 GB each and a 1.2 PB DDN storage system, running on Cray Aries interconnect. The system will replace the Dell PowerEdge-based Lonestar 4 in serving Texas researchers with a wide variety of application needs.


Drug Pumps Could Be Hacked to Kill Patients

Medical From: tom’s guide


BROOKLYN, NEW YORK — Medical infusion pumps, which intravenously deliver drugs to millions of hospital patients in the United States every year, often have basic security flaws that could let hackers deliver fatal overdoses and which manufacturers may be unwilling to address, a security researcher said at the Summercon 2015 hacker conference here yesterday (July 18).

Billy Rios, a former U.S. Marine and Google and Microsoft security engineer who now runs his own firm in the Bay Area, singled out infusion pumps made by Lake Forest, Illinois-based Hospira as an example, although he implied other brands probably had similar issues. He added that Hospira’s pump-management software had a secret administrative account with a built-in, hard-coded password of “12345678”.


United Airlines has given millions of miles to hackers

From: The Hill

By Cory Bennett

United Airlines has given out millions of frequent fliers miles to hackers who hand discovered security flaws in the company’s system, Reuters reported.

The program, first announced in May, was launched amid growing fears that airlines, planes and the whole air traffic control system are sitting ducks for cyberattackers. So-called “bug-bounty” programs are common at major tech companies like Google, but United was the first airline to try such an approach to shoring up security.

Read Complete Article


China to Codify Internet Control Measures

From: The Diplomat

Beijing hopes to make cyberspace “safe and harmonious” territory.

By Jennifer Zhang

China has been eager to claim its “Internet sovereignty” since the 18th party congress, with Internet control naturally topping the central leadership’s agenda. The recently released cyber security law draft, while aiming to codify the previously scattered Internet regulation policies and solidify Cyberspace Administration’s status as the leading Internet governing body, has demonstrated the country’s determination to take a more effective and concentrated approach to make cyberspace “safe and harmonious” territory.


Hacked in the USA: China’s ‘hidden’ infiltration op

From: Bloomberg News via Detroit News

Chris Strohm, Michael Riley and Jordan Robertson

The vast cyber-attack in Washington began with, of all things, travel reservations.

More than two years ago, troves of personal data were stolen from U.S. travel companies. Hackers subsequently made off with health records at big insurance companies and infiltrated federal computers where they stole personnel records on 21.5 million people — in what apparently is the largest such theft of U.S. government records in history.

Read Complete Article


Terrorist Threats and Encryption Issues

From: C-SPAN

FBI Director James Comey testified at a Senate Intelligence Committee hearing on terrorist threats as well as the effect of commercial encryption on the FBI’s investigative tools.


FBI director: OPM breach is ‘enormous,’ affects more than federal workers

From: WTOP

WASHINGTON — FBI director James Comey says more information should be released soon on the recent hack attack on the Office of Personnel Management, which he calls an “enormous breach.”

Comey says adversaries may have accessed decades of personal and sensitive information on federal employees, as well as anyone noted in their background checks, such as spouses, siblings, children and references.

Read Complete Article

Older posts «