Tag Archive for: Process

How keywords can hack the hiring process


job
Credit: CC0 Public Domain

An assistant professor of computer science and engineering at The University of Texas at Arlington has found that job applicants can improve their position, on average, by at least 16 spots on a pool of 100 applicants by employing an algorithm that uses job-specific keywords.

Shirin Nilizadeh said she was motivated to pursue this line of research after seeing friends not be selected for positions or second-round interviews.

“We found out that you can tailor your resume for a specific job by using specific keywords that could get you pushed toward the top,” she said. “It’s a kind of hack to the recruiting process.”

Nilizadeh’s paper—”Attacks Against Ranking Algorithms with Text Embeddings: A Case Study on Recruitment Algorithms”—was accepted into the Proceedings of the Fourth BlackboxNLP Workshop on Analyzing and Interpreting Neutral Networks for NLP. Anahita Samadi, now a doctoral student at UTA who studied under Nilizadeh, led the project and presented it at the 2021 conference on Empirical Methods in Natural Language Processing.

Text-embedding algorithms used in job recruiting match words and sentences in resumes to the job description to obtain similarity scores. Resumes are ranked based on those scores. Few studies until now have shown that ranking algorithms that use text embeddings are vulnerable to adversarial attacks.

“We thought recruitment algorithms were the best example of such ranking algorithms and therefore we decided to work on them,” Nilizadeh said. “The goal of our attack was to identify the keywords from the job description that can improve the ranking of the resume.”

As expected, adding more keywords improves the ranking. The research also showed, however, that adding too many similar words or phrases might not improve the ranking of a resume.

One of the main topics that Nilizadeh studies in the UTA Security and Privacy Research Lab is adversarial robustness of artificial intelligence (AI)-based, data-driven systems. In other words, she tests…

Source…

China Could Be Exploiting Internet Security Process to Steal Data, Cyber Experts Warn


To access data from unsuspecting users, the Chinese Communist Party (CCP) could be exploiting a universal authentication process that’s thought to be secure, but in reality may not be, cybersecurity experts have warned.

While encryption remains the preferred method to secure digital data and protect computers, in some cases, the very digital certificates used for authentication on the internet are allowing the Chinese regime to infiltrate various computer networks and wreak havoc, they said.

Bodies around the world, known as “certificate authorities” (CA), issue digital certificates that verify a digital entity’s identity on the internet.

A digital certificate can be compared to a passport or a driver’s license, according to Andrew Jenkinson, CEO of cybersecurity firm Cybersec Innovation Partners (CIP) and author of the book “Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare.”

“Without it, the person or device they are using cannot be according to industry standards, and vital data encryption could be bypassed, leaving what was assumed to be encrypted in plain text form,” Jenkinson told The Epoch Times.

Through cryptography, digital certificates are used to encrypt internal and external communications that prevent a hacker, for example, from intercepting and stealing data. But invalid or “rogue certificates” can manipulate the entire encryption process, and as a result, “millions of users have been given a false sense of security,” Jenkinson said.

Layers of False Trust

Michael Duren, executive vice president of cybersecurity firm Global Cyber Risk LLC, said that digital certificates are typically issued by trusted CAs, and equal levels of trust are then passed on to intermediate providers. However, there are opportunities for a communist entity, a bad actor, or another untrustworthy entity to issue certificates to other “nefarious folks” that would appear to be trustworthy but aren’t, he said.

“When a certificate is issued from a trusted entity, it’s going to be trusted,” Duren said. “But what the issuer could actually be doing is passing that trust down to someone that shouldn’t be trusted.”

Duren said he…

Source…

‘We have a dynamic process in place that keeps evolving’


What makes you the best among engineering colleges in India?

One of the best things that distinguishes IIT Delhi from [others] is its faculty. We follow a three-level reviewer selection process to recruit our faculty. In the last four years, we have started nine new departments and centres. This means that we have created a new IIT within an existing IIT. Among the new centres are the Centre for Automotive Research and Tribology that focuses on electric vehicles (EVs). We also have three new schools—School of Public Policy, School of Artificial Intelligence and the School for Interdisciplinary Research.

We have a dynamic process in place that keeps evolving…. Institutions have to emphasise on new things that are important in society today such as EVs. If we do not, then India will have to import all those technologies. We are now recruiting at least 20 new faculty members in the EV space.

How important are collaborations and constant engagements for IIT Delhi?

Being in Delhi, we thought that we needed to get into policy studies in a major way. So we started a school of public policy. We are again recruiting a large faculty in the space. At the same time, Delhi also has a lot of location advantages. We get to directly engage with the ministries, and some of the finest institutions of India—AIIMS Delhi, National Institute of Immunology, Regional centre for BioTechnology—are also in Delhi. We have MoUs with all the major institutes, and have joint supervision of faculty and students between them, which helps in bringing a multi-disciplinary focus to our research.

Any new innovations you have worked on?

During the pandemic, we have undertaken and licenced at least 13 innovations. For instance, we have the cheapest low-cost RT-PCR kit. We also developed a Rs 50 antigen test. Around 70 lakh Kawach PPE suits, developed by IIT Delhi, have been sold until now. [Likewise,] N95 masks were very expensive and were not freely available. We launched masks under the Kawach brand for just Rs40, which met all the N95 specifications.

Are you introducing any new multidisciplinary course?

We have started an MTech in cyber security, which involves multiple departments in the institute,…

Source…

Samsung’s new mobile security chip protects booting process and crypto transactions – The Next Web

  1. Samsung’s new mobile security chip protects booting process and crypto transactions  The Next Web
  2. Samsung Achieves Highest Ever Rating for New Mobile Security Chip  PCMag
  3. Samsung Elevates Data Protection for Mobile Devices with New Security Chip Solution  Olean Times Herald
  4. EAL 6+ certified-SE chip promises increased mobile security  eeNews Europe
  5. Samsung develops new security chip for mobile devices  TechRadar
  6. View Full Coverage on read more

“mobile security news” – read more