If hackers can hide tumors in scans, what else can they hide?

Researchers demonstrate a novel attack on medical devices by using deep learning.

Source: If hackers can hide tumors in scans, what else can they hide?

Advertisements

Schiff and Nunes: Mueller ‘Must Brief’ Intel Committee—And Turn Over All His Materials

But the more revealed, reveals more unknowns that Mueller could or did not figure out.

The intel committee’s top Republican and top Democrat have been openly fighting for more than a year. But there’s one thing they agree on: They need to hear from Robert Mueller.

Source: Schiff and Nunes: Mueller ‘Must Brief’ Intel Committee—And Turn Over All His Materials

Barr’s Redaction Process, cont’d

I like the redaction-like 6-PgDn blank space at the bottom of the article. This page intentionally left blank …

Attorney General William Barr testified at length last week, in the House and the Senate, about his ongoing process of redacting the Mueller Report in anticipation of sharing it with Congress and the public this Thursday.  There was nothing especially new or groundbreaking in those parts of his testimony.  Barr did, however, say one thing […]

Source: Barr’s Redaction Process, cont’d

WikiLeaks and the Lost Promise of the Internet

Julian Assange’s story is also the story of how the utopian possibilities of the internet turned into something much bleaker and more frightening.

Source: WikiLeaks and the Lost Promise of the Internet

One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority

In a major ethical leap for the tech world, Chinese start-ups have built algorithms that the government uses to track members of a largely Muslim minority group.

Source: One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority

Julian Assange Got What He Deserved

Don’t continue to fall for his phony pleas for sympathy, his megalomania, and his promiscuity with the facts.

Source: Julian Assange Got What He Deserved

Huawei and Managing 5G Risk

It’s worth inserting some technical realities into the debate over whether the United States and its allies should or shouldn’t allow acquisition of Huawei 5G technology for use in communications …

Source: Huawei and Managing 5G Risk

Hackers for Hire

Bottom Line Up Front The investigation into the hacking of Amazon founder Jeff Bezos’ phone demonstrates how private firms have developed sophisticated electronic espionage capabilities. From social engineering to cyberespionage, private firms and individuals are increasingly hired by governments to blackmail critics and rivals. This trend will likely intensify—barriers to entry are low, while … Continue reading “Hackers for Hire”

Source: Hackers for Hire