Tag Archive for: wary

Brain-Computer Interface Companies Are Wary of Regulation


The nascent field of brain-computer interfaces is particularly sensitive to security concerns, making it a natural target for stringent oversight. But at a conference Thursday, several executives warned of the potential for what they called overregulation.

Brain-computer interfaces, or BCIs, aim to enhance brain function using specialized devices. At a conference hosted by the US Commerce Department on Thursday, representatives from BCI companies including Elon Musk’s Neuralink Corp. spoke about their work and voiced concerns about government intervention.

Source…

BBB: Pennsylvanians should be wary of new tech support scam with ‘adult twist’


This scam can quickly turn from an innocent conversation about a slow computer to the “representative” accusing a household member of watching adult videos.

PENNSYLVANIA, USA — The newest scam sweeping the states is an old trick with an “adult twist.”

According to the Better Business Bureau, the scam is easy to avoid, in theory. It stems from something being wrong with the victim’s home computer or internet connection. The victim will search online for a customer support phone number, and—in a rush to fix the problem—will click on the top result. 

A company “representative” will answer and ask a few standard questions about your device, such as the make and model number. 

At first, the call will appear normal, but it will quickly take a turn. The “tech support representative” will insist that someone in your house has been watching adult videos. 

In a recent report, the scammer asked the caller if they had a teenage son and then insisted the boy was to blame. In another case, “tech support” claimed that thousands of people had been using the caller’s IP address to view adult content. 

The end goal? The scammer wants to sell the victim expensive computer security software, which typically costs anywhere between $200 and $900. 

This software, however, will not fix the victim’s computer or internet access. In some cases, the scammers will also want remote access to your computer. Allowing them access only enables them to install malware that records passwords, keystrokes, and other files that hold personal information. 

The best way to avoid these scams? 

  • Never open attachments or links in emails from unknown senders. These can generate fake warning pop-ups that prompt you to make a call to scammers. If you get a suspicious pop-up alert, don’t click on anything and restart your computer, tablet or…

Source…

Some Republicans in Washington state cast a wary eye on an election security device


In northeast Washington state, a remote region nestled against the Canadian border, the politics lean conservative and wariness of government runs high.

Earlier this year, a Republican-led county commission there made a decision that rippled across Washington — triggering alarm at the secretary of state’s office, and now among cybersecurity experts who have worked for the past six years to shore up the security of America’s voting systems.

It happened on Valentine’s Day during the regular weekly meeting of the three-member commission in Ferry County, where Donald Trump received more than 63% of the vote in the 2020 election.

After an agenda that included an update on the county fair and a discussion about a local water and sewer district, the commissioners took up a proposal to disconnect a recently installed cybersecurity device from the county’s computer network.

The device, known as an Albert sensor, was designed to alert local governments to potential hacking attempts against their networks. More than 900 Albert sensors have been deployed across the country, primarily to states and counties, and they have been a key component of the federal government’s cybersecurity response following Russian election interference around the 2016 election.

But the commissioners in Ferry County had come to the conclusion that the sensor, which had been provided by the state at no cost, was more of a liability than an asset.

“Let’s get rid of it,” Commissioner Nathan Davis said before making his motion to remove the device.

The vote in support of the motion was unanimous.

“Bye bye, Albert sensor,” one of the commissioners quipped.

Another county in Washington state also disconnected its sensor, and a third decided not to install one. It’s an isolated trend in Washington at this point, but one that represents a stark example of how Republican mistrust in elections and government systems more broadly threatens to dismantle bipartisan progress made over the past decade to improve election security.

During the Ferry County meeting, Commissioner Davis quoted from a memo that circulated among Washington state Republicans. That memo,…

Source…

Watch now: Central Illinois universities wary of cybersecurity threats | Local Education


NORMAL — Illinois State University is working to address several potential cybersecurity weaknesses identified in its most recent state audit. The changes come as universities across the country are working in a constantly evolving cybersecurity landscape.

The audit from the Illinois Auditor General identified weakness associated with the formal information technology policies as well as more specific issues around the management of application accounts. Released May 26, the report covers the period from June 30, 2020, to June 30, 2021.

Dan Taube, chief information security officer for the university, said ISU staff members are working to address the issues brought up in the audit, and to make continual efforts toward keeping the university’s networks safe.



Dan Taube

Taube


Those efforts include formalizing updated IT policies, which are central to making sure all 60,000 accounts that interact with the ISU network are not becoming vulnerabilities, Taube said.

“The truth about cybersecurity is it’s everyone,” he said.


Illinois State University’s financial audit summary for fiscal year 2021 from the state auditor’s office.


Other steps ISU has taken to address weaknesses include improving communication to delete accounts from some applications soon after an employee leaves the university or changes jobs.

Managing what accounts have access to certain data can help address the issue with measures such as limitations on what student accounts can access, FBI Springfield Computer Scientist Justin Harris said….

Source…