Posts

Adversa AI Red Team Introduces Technology for Ethical Hacking of Facial Recognition Systems

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


The Adversa AI Red Team has performed a proof-of-concept attack on PimEyes, the most popular and advanced public picture face search engine.

FREMONT, CA: Adversa AI, a trusted AI research leader, has presented a novel attack method for AI facial recognition applications. It causes an AI-driven facial recognition algorithm to misidentify people by introducing subtle alterations in human faces. Compared to previous similar approaches, this method is portable across all AI models while also being far more precise, stealthy, and resilient.

The Adversa AI Red Team has performed a proof-of-concept attack on PimEyes, the most popular and advanced public picture face search engine. Clearview, a commercial facial recognition database sold to law enforcement and governments, is likewise similar. Unfortunately, PimEyes duped, and the CEO of Adversa was mistaken for Elon Musk in the photo.

The attack is unique because it is a black-box assault created without a thorough knowledge of the search engine’s algorithms. As a result, the vulnerability may get utilized with a variety of facial recognition engines. Because the attack allows malefactors to disguise themselves in various ways, we’ve given it the name Adversarial Octopus, a reference to the animal’s stealth, precision, and adaptability.

The existence of such flaws in AI systems, particularly facial recognition engines, could have disastrous implications and be utilized in poisoning and evasion scenarios like the ones below:

  • Hacktivists could cause havoc in AI-powered internet platforms that employ facial attributes as input for any judgments or further training. In addition, by changing their profile images, attackers can poison or bypass the algorithms of large Internet corporations.
  • In banks, trading platforms, and other services that provide verified remote help, cybercriminals can steal human identities and evade AI-driven biometric authentication or identity verification systems. In every case where classic deepfakes can be helpful, this attack can be even more subtle.
  • Dissidents use it to conceal their online activities in social media from police enforcement. The virtual world we now live in resembles a mask or a…

Source…

Ionia Public Schools introduces Words on Wheels Mobile Library

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


IONIA — What started out as a dream for Ionia Public Schools educators became a reality Thursday with the arrival of the Words on Wheels Mobile Library.  

IPS introduced its  mobile library during the First Thursday on the Bricks July 1 in downtown Ionia. 

The Ionia Area Chamber of Commerce, Ionia Downtown Development Authority and community members were present for the ribbon-cutting ceremony to officially open the mobile library. 

Ionia Public Schools introduced its Words on Wheels Mobile Library during the First Thursday on the Bricks July 1 in downtown Ionia.

The blue bus will travel to different locations in the Ionia area providing free books and activities to the community three days per week. It will be at the following locations: 

Monday: 

  • 9:15-10:30 a.m. — Trailhead Park 
  • 10:45-11:45 a.m. — Jefferson Elementary School 
  • Noon to 1 p.m. — K-2 Summer School – Ionia High School 
  • 1:30-2:45 p.m. — Hale Park 

Thursday:

  • 9:15-10:30 a.m. — 3-5 Summer School – Iona High School 
  • 10:45 a.m. to Noon — Twin Rivers Elementary School 
  • 12:20-1:20 p.m. — Downtown Lyons Library 
  • 1:45-2:45 p.m. — Harper Park 

Friday: 

  • 9:15-10:30 a.m. — Boyce Elementary School Nature Trail 
  • 10:45-11:45 a.m. — Robinson Park 
  • Noon-1 p.m. — Perry Park 
  • 1:30-2:45 p.m. — Fun Forest 

“We hope everybody comes out from babies to adults,” said Christina Frost, a fifth-grade teacher at Rather Elementary School. “We really have enjoyed meeting everybody. All of our books are brand new. You never know what you’re going to find.” 

Christina Frost, fifth grade teacher at Rather Elementary School in Ionia, speaks during the grand opening of the Ionia Public Schools Words on Wheels Mobile Library during the First Thursday on the Bricks July 1 in downtown Ionia.

Jennifer Burns, IPS associate superintendent of Instructional Services, secured the bus and drew up the plan for the mobile library. 

Extra Elementary and Secondary School Emergency Relief Fund dollars from the Coronavirus Aid, Relief and Economic Security Act was used, Frost said. 

“This was a dream of several of ours for many years,” Frost said. 

There will be various activities for the community to participate in, Frost said. IPS is giving away book bucks when people visit the bus and they can be collected and later distributed for prizes. 

Ionia Public Schools introduced its Words on Wheels Mobile Library during the First Thursday on the Bricks July 1 in downtown Ionia.

The COVID-19 pandemic has put kids back about six months in reading, Frost said, adding access to books just wasn’t there. 

“I think it’s just what we need,” Frost said. 

IPS officials worked with Matt Painter,…

Source…

HackersEra introduces ICS/OT/IIoT security consultation

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Concerns about cybersecurity have been more common in recent years. Clients’ social security numbers are stolen from corporate computer systems by hackers. Hackers steal login credentials details from social networking sites, and they also steal corporate secrets from the internet. Cybersecurity is becoming increasingly important for businesses of all sizes.

Security breaches are not just a serious threat to the sensitive information business needs. It may also damage their client’s allegiance and put them into serious legal difficulties. The hazards of cybercrime are increasingly becoming yet more severe as new technology develops, from self-driving vehicles to internet-facilitated security schemes.

To prevent such security breaches, HackersEra Introduces “ICS/OT/IIoT Security Consultation” to Assist Critical Infrastructure Organizations with Cyber Threat Elimination.

What is HackersEra all about?

HackersEra is a renowned cybersecurity service provider that pioneered the adoption of flexible business techniques that now allow our clients to operate in a more secure environment while producing more value.

Their strength rests in their ability to comprehend their clients’ company processes, culture, vision, and goals across industries and provide dependable client-oriented solutions. HackersEra began operations in 2015 with the goal of providing cybersecurity consulting services to customers worldwide as partners, as well as conceptualizing, realizing, and leading technology-driven business transformation initiatives to achieve their goals.

HackersEra’s expansion over the years

HackersEra commenced its operations in the year 2015, and in just six years, the company has been able to expand itself internationally.

What began as a single man’s dream has dramatically transformed the cybersecurity sector. They are working to turn the digital age around and make it a safer place to live.

Vikash Chaudhary, the company’s CEO, and founder founded HackersEra in Pune, Maharashtra. It has lately expanded globally into two of the world’s most powerful marketplaces, namely the United States and Malaysia, with the goal of reaching…

Source…

Imperva introduces Serverless Protection to secure serverless computing functions

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Imperva launches Imperva Serverless Protection, a new product built to secure organizations from vulnerabilities created by misconfigured apps and code-level security risks in serverless computing environments. Designed with the developer and security team in mind, the new product is easily deployed as an AWS Lambda layer, protecting functions without changing code.

Built on Amazon Web Services (AWS), Imperva Serverless Protection is a fully integrated tool within AWS Lambda Extensions. The integration gives developers faster access to the new Imperva offering to provide an additional layer of security for their AWS Lambda environment. This latest innovation from Imperva adds to the company’s solutions for protecting applications in all their forms: legacy, APIs, microservices, and serverless functions.

“We see hundreds of thousands of customers of all sizes embrace serverless applications to quickly deliver value to their customers,” says Holly Mesrobian, General Manager, AWS Lambda, AWS. “The Imperva extension enables customers to easily embed additional security in their DevOps processes for serverless applications with just a simple configuration change.”

Developers are increasing adoption of serverless functions that offer lower costs, less configuration and faster deployment. However, “through 2022, 80% of successful attacks on serverless [platform as a service] PaaS will have a root cause of misconfiguration or the use of known vulnerable code due to immature tools and processes,” writes Neil MacDonald, Vice President, Distinguished Analyst, Gartner, in the March 2020 report, “Security Considerations and Best Practices for Securing Serverless PaaS”.

He adds, “New approaches and techniques for securing serverless will be required and should be designed using a life cycle approach, starting in development and carrying through into operations.”

Imperva Serverless Protection offers market-differentiated capabilities to help organizations manage the complex security risks that emerge in serverless functions.

  • Protection against malicious activity: Purpose-built for serverless computing, Imperva uniquely enables a positive security model that…

Source…