Monday, January 30, 2017

Automated fingerprint challenge; protect your data, AI and biometrics

How to protect your data, your vehicles, and your people against automotive cyber threats?

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 30, 2017
Featured Image

Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition

The idea behind the competition, called the "Nail to Nail (N2N) Fingerprint Challenge" – which offers $325,000 worth of prizes – is to develop a system that allows for more distinguishing data to be collected from fingerprint biometrics but also eliminates the time and cost associated with using human operators, IARPA said. N2N fingerprints capture the entire fingerprint from the edge of one finger nail bed to the other. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to protect your data, your vehicles, and your people against automotive cyber threats?
AI-based typing biometrics might be authentication's next big thing
Hackers could use hidden mal-audio to attack Google Now
Cisco starts patching critical flaw in WebEx browser extension
Five arrested for hacking into ATMs and stealing $3.2 million
Compliance focus, too much security expertise hurts awareness programs
Trump, May agree to take on ISIS in cyberspace
(From our archives) Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
(From our archives) Will containers kill the virtual machine?

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image
INSIDER

How to protect your data, your vehicles, and your people against automotive cyber threats?

CSO explores the vulnerabilities and risks of automotive cyber-attacks and methods for securing your data, human resources, and the connected vehicle environment. Read More

Thumbnail Image

AI-based typing biometrics might be authentication's next big thing

Thanks to advances in artificial intelligence identifying people based on how they type can now be done with a very high level of accuracy, making it a viable replacement for other forms of authentication on the Web. Read More

Thumbnail Image

Hackers could use hidden mal-audio to attack Google Now

Scientists say pseudo artificial intelligence, machine learning interfaces like Amazon's Alexa and Google Now, can be easily hacked through bogus voice commands. Read More

Cisco starts patching critical flaw in WebEx browser extension

Cisco Systems has patched a critical vulnerability in its WebEx collaboration and conferencing extension for Google Chrome and is working on similar patches for the Internet Explorer and Firefox versions. Read More

Thumbnail Image

Five arrested for hacking into ATMs and stealing $3.2 million

Law enforcement authorities from Europe and Asia have dismantled a cybercriminal group that specialized in hacking into automated teller machine (ATMs). Read More

Thumbnail Image

Compliance focus, too much security expertise hurts awareness programs

Security awareness teams aren't getting the support they need to be successful, according to the SANS Institute. But some unexpected factors can cause programs to fail as well, including a focus on compliance -- and too much security expertise on the team. Read More

Thumbnail Image

Trump, May agree to take on ISIS in cyberspace

The U.K. and U.S. are planning to work more closely to combat the spread of extreme Islamist ideology in cyberspace, British Prime Minister Theresa May said on Friday. Read More

(From our archives) Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial

Read More

Thumbnail Image

(From our archives) Will containers kill the virtual machine?

Container technology is sweeping across the cloud and virtualization industry. What does it mean for existing technology like cloud and virtual machines? Read More

Video/Webcast: Neustar Inc

2016: A Security Minefield - Will You Be Ready for 2017?

Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 painful ways people hurt themselves with computers/video games

10 amazing Raspberry Pi clusters Read More

Most-Read Stories

1. Game over for Solaris and SPARC?
2. Raspberry Pi roundup: Here comes Google (kinda, probably), Competitor corner and the sounds of Pilience
3. Has Cisco broken out of the network hardware box
4. As Baby Boomers retire, the shortage of mainframe professionals grows more acute
5. LinkedIn pumps water down to its server racks, uses an interesting spine and leaf network fabric
6. My worst tech purchase ever
7. 19 free cloud storage options
8. 7 free tools every network needs
9. Apple iOS 10.3 beta 1 packs a wallop; iOS 11 rumors heat up
10. Guy who swore off smartphones tries to use a smartphone
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive