Tag Archive for: Machine

Is There a New Ghost in Our Machine?


more gentlemanly times, when fliers fired pistols at each other during dogfights in Sopwith Camels and Albatros fighters
More gentlemanly times, when fliers fired pistols at each other during dogfights in Sopwith Camels and Albatros fighters
David Aitken

I’m told by those who know — one of the best ways to learn — that there is a device in computer circles called a “weird machine.”  I was somewhat alarmed at the idea of computer security geeks running around in circles acting weirdly, until I read my latest bank statement, after which nothing could alarm me further.

A weird machine is ‘an artefact with additional code execution’.  It operates, as you might expect, on “weird instructions,” whereby ‘an exploit is based on crafted outside input.’  No, I didn’t understand it either, but the words ‘execution outside’ gave me even more to be alarmed about.

By the time I was being informed — by those in the know, no less — that a classical attack takes advantage of a ‘stack buffer overflow’, I had to lie down with a damp artefact on my fevered brow.

The ghost in the machine usually refers to our mind as opposed to our body, and my own mind began to be haunted at an early age, when I first read about a machine that could fire bullets through the propeller blades of an aircraft in motion.  That must have made some older pilots hanker after more gentlemanly times, when fliers fired pistols at each other during dogfights in Sopwith Camels and Albatros fighters.  (If those actual creatures ever fought, which one would win, I wonder?)  The creator of Biggles, Captain W.E. Johns, shot his own propeller off twice, something Biggles never did.

More gentlemanly times, when fliers fired pistols at each other during dogfights in Sopwith Camels and Albatros fighters

Machines are useful when they do our bidding obediently, but with the emergence of weird machines it increasingly looks as if they can now do anything they happen to feel like, by adding their own ‘code executions’ without executing our wishes.  And (so far) not us either.

Older machines still serve us well, of course, and I don’t just mean drink dispensers.  My elderly chicken-shaped egg boiler still functions, as does my ice cream cone producer and Rubik Cube Solver, time savers…

Source…

IoT and Machine Identity Management in Financial Services


IoT and Machine Identity Management in Financial Services
brooke.crothers
Tue, 06/28/2022 – 17:39

How is IoT changing the financial sector?

IoT has already positively impacted the financial sector and will only continue to in the future. The bank of things facilitates the billions of data transfers that take place every day. It enables insurance companies to collect and share data with customers about their insured goods in real time, allows consumers to make instant contactless payments and provides the framework for retail banks to collect information on each customer that enters one of their locations.

DevOps Connect:DevSecOps @ RSAC 2022

The most notable and well-documented example of investment in the IoT infrastructure has been by retail banks. To create a convenient consumer experience, they have invested growing amounts of revenue into “fintech” that makes payment transactions and transfers behind the seamless processes that we know and use today.

IoT has also transformed the financial services sector in a variety of ways:

  • Real-time data. With IoT, data can be gathered in real-time. This gives banks a huge advantage since they can quickly make important financial decisions.
  • Fraud detection. IoT has helped mitigate many risks associated with fraud and has helped detect and block hacked accounts. IoT can gather user data and analyze the activity, where it is then sent over to the cloud, where it matches the user’s typical behavioral patterns. If any unusual data has been detected, the user will be alerted, and the account will become temporarily disabled.
  • Better investment decisions. Tracking the real-time state of the market can help improve investment decision-making. IoT has the ability and potential to make accurate business predictions and track company behaviors.
  • Personalized customer experience. IoT personalizes the customer’s experience and provides real-time data to make more informed decisions, while providing a seamless experience.
Security challenges are looming

The susceptibility of fintech devices and networks to malfunctioning is a big concern. In June 2018, Visa payment systems crashed throughout Europe, preventing millions of customers from using POS devices to pay for goods….

Source…

Cat Caught on Camera Trying To Hack Treat Machine Has Internet in Stitches


A video of a cat desperately trying to get hold of some extra treats has delighted the internet after gaining viral attention on Reddit.

User u/GoobyTron420 shared the adorable footage of Egyptian Mau cat Gizmo—full name Gilbo Baggins—on the popular r/cats forum on Wednesday. The cat’s antics have since received over 36,000 upvotes on Reddit from thrilled viewers.

Angry cat and home camera
A cat looking grumpy, left, and a picture of a wireless in-home camera, right. A cat caught trying to hack an automatic treat dispenser has left the internet in stitches.
Nadya So/PORNCHAI SODA/Getty Images

Filmed on a pet video device that also has the ability to shoot treats—a feature controlled by the owner—Gizmo can be seen patting at the camera attempting to get it to release a treat.

“Please enjoy a video of my cute boy Gizmo trying to get a snack from the kitty camera because it can shoot treats,” said the cat’s owner in the caption.

Designed for keeping an eye on your pets even when you can’t be at home with them, pet cameras have gained popularity in recent years. Similar to security cameras, they are often designed with pet-friendly extras like a speaker so you can chat to your furry friend and—as is the case here—the ability to give your pet a treat from anywhere.

There are various versions on the market that retail at an average of around $100. Pet site Paw Shake says: “A pet camera is a really useful tool to monitor your pet’s behavior when you are away, even if you have a pet sitter watching your pet.” From ensuring nobody is on furniture they shouldn’t be to communicating with restless animals on your way home, they’re also a great way to capture moments you may otherwise miss—just like Gizmo’s search for treats.

In stitches at the feline’s antics, Reddit users headed to the comments to share their thoughts.

“Looks like he’s at the ATM… and forgot his PIN,” joked one Redditor. Another commenter said: “He seems very dedicated towards his job.”

“This is so cute and totally reminds me of our cat who is never late to feeding time,” wrote another user.

“Cats are skilled hackers,” shared another viewer of the video. “Mine have figured out numerous ways to hack the automated feeders.”

Other eagle-eyed…

Source…

Engineering seminar: Cyber Storm Tracker — Using Machine Learning for Cyber Log Data


Dr. Glenn A. Fink, a senior cyber sercurity researcher with Pacific Northwest National Laboratory (PNNL), will give the talk.

Cyber logs are not human language, but of all the common data types used in machine learning (ML), natural language is the closest. But cyber log data is very different from natural lanuage. Log lines contains lots of random-looking garbage. IP addresses and other things frequently change definition. Punctuationh is all over the place. Domain names look like Windows Active Directory names, which look like many other cyber “nouns.” And the syntax and semantics of phrases and terms changes from sensor to sensor. This makes cyber data challenging to ingest into ML models. 

Dr. Fink will talk about the work done at PNNL to ingest cyber logs into natural language processing tools using embeddings. He’ll also show how embeddings can be used as coordinates to show how IP addresses change behavior and relate over time. At the end, seminar attendees will understand why there are still not many true ML methods out there for cyber, and what the major challenges are ahead. 

Dr. Find has worked in computer security, deep learning, visualization, bio-inspired design and human-centric computing at PNNL since 2006. He is the lead inventor of several technologies, including PNNL’s Digital Ants technology, which Scientific American cited as one of 10 “world-changing ideas” in 2010. Digital Ants recently earned an award for Excellence in Technology Transfer from the Federal Laboratory Consortium and was listed as a finalist for an R&D 100 award. His work includes research in bio-inspired, decentralized cyber security and privacy. He has published numerous scientific articles and papers, has edited a book and hosted several workshops on computer security, privacy and the Internet of Things. 

Dr. Fink was a three-year NSF IGERT Graduate Fellow at Virginia Polytechnic Institute and State University, where he completed his Ph.D. in computer science in 2006. Dr. Fink’s dissertation, “Visual Correlation of Network Traffic and Host Processes,” fostered the Hone technology that currently is an open-source software project. Dr. Fink was a software…

Source…