Security News This Week: Japan's Top Cybersecurity Official Has Never Used a ComputerTOSHIFUMI KITAMURA/AFP/Getty ImagesThe US refused to join a new global cybersecurity agreement this week—maybe because it was created by French president Emmanuel Macron, with whom President Trump isn’t on great terms with.On the same day, internet traffic that was supposed to route through Google’s cloud servers instead went haywire, traveling through unplanned servers based in the likes of Russia and China.
Of course the story is more complicated than that, but the ability for members of society to privately smoke weed was essential for putting it on the path to legalization.We don’t yet know which subversive ideas and illegal acts of today will become political causes and positive social change tomorrow, but they’re around.
Artificial intelligence, she says, presents a huge opportunity for the government and the private sector, but the risks of its being abused, biased, or deployed by foreign adversaries is so real that the government and tech companies should be collaborate to secure it.Some in tech openly agree with that notion—Bezos told the audience at WIRED 25 last month that “if big tech companies are going to turn their back on US Department of Defense, this country is going to be in a lot of trouble”—much of the rank and file are uneasy or flat-out hostile to the idea of working with the government on matters of war.Google, in particular, has had a recently rocky relationship.
“The private sector is now willing to say that we can and we will do more.”"Over the past three or four years, we’ve really seen a groundswell of private leadership."Megan Stifel, Public KnowledgeIn April, Microsoft announced the Cybersecurity Tech Accord, an agreement similar to the Paris Call that was signed by more than 60 technology corporations, which it dubbed a “a Digital Geneva Convention.” In July, the company publicly advocated for the regulation of facial recognition technology and said it was developing its own set of principles for how it should be used.
Now, two days before an election in which Kemp himself is the Republican candidate for governor, he has levied similarly unsupported charges—this time against his democratic opponents.The Georgia Secretary of State’s office released a short statement on Sunday morning that it had opened an investigation into the Democratic Party the previous evening, “after a failed attempt to hack the state's voter registration system.”The Democratic Party of Georgia sharply denied the accusations in a statement to reporters.
It's not super technically challenging."Segerdahl notes that the findings have particular implications for corporations and other institutions that manage a large number of computers, and could have their whole network compromised off of one lost or stolen laptop.'It's pretty quick and very doable for a knowledgable hacker.'Olle Segerdahl, F-SecureTo carry out the attack, the F-Secure researchers first sought a way to defeat the the industry-standard cold boot mitigation.
"We remain woefully underprepared to secure the upcoming elections, and an executive order is simply no substitute for congressional action," Democratic Senator Mark Warner of Virginia, the vice chairman of the Senate Intelligence Committee, said in a statement.Analysts also noted that the apparent lack of collaboration between the White House and Congress could indicate that the order is more of a bandaid than a concerted effort by the administration to build deterrents against election meddling."Trump is way late to the game.
How You Can Prepare to Evacuate Your Home for Hurricane Florence Here are some tips for getting ready: Make a plan, bring documents, close lids, clear the yard, blast the freezer.Illustration by Claire O'Neill/The New York TimesFor the latest updates, read our Hurricane Florence live briefing here.When a hurricane is poised to make landfall and the authorities issue an evacuation order, you may not have much time before you leave to protect your home from the storm — and from flooding.“People have a hard time internalizing, preparing for something that’s outside their realm of experience,” said J.
Security experts warn that Russia and China are both catching up and developing anti-satellite weapons capable of tripping up America’s strategic orbital foothold.The fourth thing to know about space power is, if America gives up its military dominance, expect its economic influence to wane as well.
So the original design of Chrome had two big pieces: auto-updates to make sure you always had the most updated version, and the Chrome sandbox to make sure that if there was a vulnerability that could be exploited we could confine that within the sandbox."'I will be very, very upset if three to five years from now password phishing is still something that we don’t feel we’ve largely solved.'Justin Schuh, Chrome EngineerThese features that set Chrome apart in 2008 are now an industry standard, but at the time Google received criticism for its new browser's big bets.
We’re on just one of thousands of such trips the service will execute this year as it delivers classified cargo, contained in tamper-proof orange pouches, to 270 US embassies and consulates around the world.The little-known, 100-year-old Diplomatic Courier Service works like your interoffice mail system, but on a planetary scale, with complex protocols and security measures that ensure the reliable transport of sensitive material by land, air, and sea.
Companies don't seem interested in catching up.'If it’s not a secret, then you can’t use it as an authenticator.'Jeremy Grant, Better Identity CoalitionIdentity management experts have warned for years about over-reliance on phone numbers.