Saturday, January 30, 2016

FreeSamples! and Yerdle pakage.

Google's AlphaGo Defeats Human Master of Ancient Game

Google's AlphaGo Defeats Human Master of Ancient Game

ceb69c2f5c52ab3909eaadf4d77fb0842a87a40d4fea073691
Print
By Richard Adhikari
Jan 29, 2016 11:43 AM PT
google-research

 Find the Best CRM Software for Your Needs
With hundreds of CRM solutions on the market today, how do you know which one is best for your organization? This free buyer's guide reviews the best CRM software systems and allows you to request a price or demo for the system that best fits your needs. Get started now!
Research at Google on Wednesday announced that AlphaGo has become the first computer software system to beat a human at the ancient game of Go.
There are more possible positions in Go than there are the number of atoms in the universe, and it has a googol (that's 1 followed by 100 zeroes) more positions than chess, noted Google DeepMind researchers David Silver and Demis Hassabis in a blog post. That complexity makes it difficult for computers to play Go.


"Chess can be played very well with a number-crunching CPU," said Rob Enderle, principal analyst at the Enderle Group.
"Go requires a visual component to do well, or the GPU more common in today's supercomputers," he told TechNewsWorld, because "Go requires pattern recognition in addition to analysis."
Traditional artificial intelligence methods, which construct a search tree covering all possible positions, can't handle Go, noted DeepMind's Silver and Hassabis, so Google researchers combined an advanced tree search with two deep neural networks to create AlphaGo.


"Constructing a search tree that includes defining and evaluating all possible positions or outcomes isn't AI," pointed out Gartner Fellow Tom Austin.
That's a brute-force model that's "too computationally expensive," he told TechNewsWorld.
AlphaGo beat 499 of the top 500 Go software programs, then beat reigning three-time European Go champion Fan Hui five games to zero in October, Google DeepMind's Silver and Hassabis wrote.
In March, AlphaGo will play a five-game challenge match in Seoul, South Korea, against Lee Sedol, whom the DeepMind researchers described as the top Go player worldwide over the past decade.
Lee isn't unbeatable; he has won 71.8 percent of his games.

How AlphaGo Works

AlphaGo's neural networks take a description of the Go board as an input and process it through 12 network layers containing millions of neuron-like connections.
One AlphaGo neural network, the "policy network," selects the next move to play, and the other, the "value network," predicts the winner of the game.
Google researchers trained the system's two neural networks on 30 million moves from games played by human experts, until it could predict the next move 57 percent of the time. If that sounds low, the previous record was 44 percent.
AlphaGo's neural networks then played thousands of Go games with each other and adjusted their connections using reinforcement learning in order to discover new strategies for itself.
That required leveraging the Google Cloud Platform to tap the necessary computing power.
"It takes huge amounts of data and compute cycles to train a deep neural network," Gartner's Austin said. Once trained and tested, however, these networks "can often run in a smartphone."
Possibly, but, while Google Cloud or something similar "is a must in order to harness the enormous computing power [of AlphaGo] to individual humans' use, it requires high-speed wired or wireless networks," pointed out Chansu Yu, chairman of Cleveland State University's Department of Electrical Engineering and Computer Science.

Doing Good

The most significant aspect of AlphaGo is that it uses general machine learning techniques to figure out how to win at Go, instead of being an expert system built with hand-crafted rules, according to Google's Silver and Hassabis. That means it might be used to address some of society's toughest and most pressing issues, from climate modeling to complex disease analysis.
Expert systems for medicine and natural language processing are possible areas where AlphaGo might be useful, CSU's Yu suggested.
"Right now, AlphaGo's a showcase for how far these systems have evolved," observed Enderle. "Next is to showcase what that means outside of a game. Recall that [IBM's] Watson won Jeopardy!, and now it runs a good chunk of our national defense."

The Ghost in the Machine

Stephen Hawking, Elon Musk and Bill Gates have expressed concerns about unrestricted research into AI, and Cambridge University has set up the Center for the Study of Existential Risk to look into the technological risks AI may pose in the future.
Oxford University also is studying the impact of AI at the Future of Humanity Institute.
"Expectations are, computers will surpass human intelligence before midcentury," Enderle said.
Still, it may be awhile before AI can match the human brain because "it's not just a matter of computing power," said CSU's Yu. "It's the [efficient] interconnection of cells." 

Oracle Pulls Plug on Java Browser Plug-In

Oracle Pulls Plug on Java Browser Plug-In

Print
By John P. Mello Jr.
Jan 30, 2016 10:00 AM PT

Free E-Mail News Alerts from ECT News Network
Keep up with the latest breaking business and technology news from ECT News Network. Receive real-time alerts as stories break -- or a daily version dispatched once each day. Easily add or eliminate keywords and modify service right from your inbox. Target your news today!
Oracle earlier this week announced its decision to scrap its Java browser plug-in.
Oracle Pulls Plug on Java Browser Plug-InThe plug-in, which has been a frequent target of hackers, won't be included in the next version of the kit for Java developers, JDK 9, which is expected to ship in September.
Oracle's action was motivated by browser makers' withdrawal of support for the plug-in.
As browser vendors restrict and reduce support for plug-ins in their products, developers of applications that depend on the Java plug-in need to consider alternatives, the company said.

Victim of Mobile

In a white paper for developers released this month, Oracle said plug-ins have become undesirable in a tech world that's increasingly mobile.
"The rise of web usage on mobile device browsers, typically without support for plugins, increasingly led browser makers to want to restrict and remove standards based plugin support from their products, as they tried to unify the set of features available across desktop and mobile versions," the white paper said.
"Google and Microsoft have already gotten away from using the Java plug-in," said Jim McGregor, principal analyst at Tirias Research.
"It's an evolution of the software environment," he told TechNewsWorld. "Plug-ins were great when we were first trying to enable multimedia features at websites, but the way that things are programmed now, they're more a security hazard than a benefit."

History of Vulnerability

Plug-ins are similar to browser extensions, but with a lot more permissions, noted Alex Smith, director of identity and access management products at Intermedia.
"They were primarily created to allow non-HTML content to be viewed from within the browser. A program external to the browser, like a PDF viewer, would actually render the content and then display it within the browser," he told TechNewsWorld.
"In the case of the Java plug-in, this allows Java code -- not JavaScript -- to be executed locally -- that is, outside of the browser -- and displayed within the browser window," Smith said.
"Since the Java client has a long history of security bugs and sloppy patching, it makes for a really attractive attack vector when paired with a browser," he added.
Because the latest versions of the leading browsers have disabled the Java plug-in, Oracle's move won't affect many consumers, but it could have an impact on some businesses.
"I only really see it used for legacy applications, typically in-house-developed apps which should have died years ago," Smith said.
"Forcing companies to deal with and remove this legacy crap might be painful in the short term, but it's always the right thing to do in the long term," he added.

HTML5 or Web Start?

For some companies, however, retiring those legacy apps -- even in the name of security -- could prove to be difficult.
"Overall this is a good step forward, but it doesn't address legacy dependencies," said Simon Crosby, CTO at Bromium.
"For example, if your company uses Oracle ERP 11, you're still stuck on Java 6 or 7 on the endpoint, which have a woeful security record," he told TechNewsWorld. "You can't buy a new ERP system just to prevent cyberattacks."
Pulling the plug on the Java plug-in means developers will have to move any apps that use it to another technology. Oracle recommends using Java Web Start, although that may not be the best alternative.
"I believe that most vendors should invest in HTML5 technologies that are native to the browser and receive the development attention of the whole community," Wolfgang Kandek, CTO of Qualys, told TechNewsWorld.
Removing unnecessary plug-ins from browsers can only improve security, said Craig Williams, senior technical leader at Cisco's Talos Security Intelligence and Research Group.
"By removing plug-ins from the browser," he told TechNewsWorld, "we remove this attack surface, making all users more safe from both known and unknown zero-day vulnerabilities." 

Google, Movidius to Bring Deep Learning to Mobile Devices

Google, Movidius to Bring Deep Learning to Mobile Devices

Print
By Richard Adhikari
Jan 29, 2016 2:24 PM PT
google-movidius-machine-learning-mobile-neural-network

 CRM Buyer's Guide
There are hundreds of CRM solutions on the market today, so how do you know which one is best for your organization? This free buyer's guide compares the best CRM software systems and allows you to request a price or demo for the system that best fits your needs. [View the Guide]
Movidius on Wednesday announced that it's working with Google to put deep learning on mobile devices.
Google will source Movidius' latest flagship chip -- the MA2450 -- and software development environment, and will contribute to Movidius' neural network technology road map in return.
That could result in smartphones and other mobile devices that will be able to understand images and audio swiftly and accurately.


The Movidius Technology

The MA2450 is the most powerful iteration of Movidius' Myriad 2 vision processor unit, which the company said is the only commercial solution available to perform complex neural network computations.
The Myriad 2 is the first always-on vision processor, Movidius said.
It has a programmable architecture and comes with the Myriad Development Kit, or MDK, which includes a software development framework. That lets developers incorporate proprietary functions and build arbitrary processing pipelines while leveraging the vision, imaging, and linear algebra software libraries and reference vision processing pipeline examples Movidius provides, all as source code.
The MDK includes all necessary programming and debugging tools.
Movidius's Myriad VPU processor powers Google's Project Tango.

What to Expect

"We can expect to see run-time deep neural networks for speech-to-text, vision and many other smart machine applications running in phones, cameras, automobiles, medical devices and others because the DNN models can be downloaded and run disconnected from the cloud,"Gartner Fellow Tom Austin said.
"Remember that working with Google on a project doesn't necessarily translate into products," cautioned Jim McGregor, principal analyst at Tirias Research. "However, this has the potential for almost any device and extends well beyond just facial recognition; this is machine learning."
Facial recognition and retinal scans the technology enables "could significantly increase the level of security over fingerprints and even help identify people," he told TechNewsWorld.
Facial recognition could be used in two-factor authentication, and Google could bake it into Android as it did with fingerprint IDs, suggested Wayne Lam, a principal analyst at IHS Technology.
Google also could apply the technology to home security platforms, he told TechNewsWorld. "Think Nest and other IoT uses."

Potential Uses for the Technology

Banks will begin using smart machines widely, and a report Gartner's Austin co-authored suggests most banks will invest in six main types of smart machines during the next few years.
The smart machines resulting from Google's team-up with Movidius could make wireless banking more secure, he told TechNewsWorld.
Other possible uses include authenticating users or admins signing in remotely to an enterprise network, and tracking and authenticating users for security purposes and for provisioning or deprovisioning as needed.
"Facial recognition and retinal scans are much more secure and user-friendly than any of the more common security solutions," Tirias Research's McGregor said. "This could allow users to log in and begin using platforms in a secure manner effortlessly."
The technology also could be used in wearables and industrial applications in the medical and industrial automation fields, where the Internet of Things might come into play, he suggested.

A New Trend Emerges

"This capability is not limited to the Movidius solution," McGregor pointed out. "Qualcomm is doing it in conjunction with its image signal processor, and this could be done within most SoCs by leveraging the ISP, DSP, GPU, VPU and CPU resources."
Microsoft, Apple "and a whole range of social sites like Facebook, ... Amazon, Baidu, IBM and a few thousand other firms" might follow suit, Gartner's Austin suggested.
As global smartphone sales slow, noted IHS's Lam, "we'll see more and more efforts to create differentiated value for platforms such as Android and iOS just to keep up with the furious pace of competition and innovations." 

Thursday, January 28, 2016

3D Printing: Innovation's New Lifeblood

3D Printing: Innovation's New Lifeblood

Print
By Pam Baker
Jan 27, 2016 5:00 AM PT
3d-printing

 CRM Buyer's Guide
There are hundreds of CRM solutions on the market today, so how do you know which one is best for your organization? This free buyer's guide compares the best CRM software systems and allows you to request a price or demo for the system that best fits your needs. [View the Guide]
To many, 3D printing is little more than a toy. A toy that mostly prints toys. To others, it's a prototyping tool good for a hands-on feel of a manifested idea but not much more.
Yet for a select few, 3D printing is the heart of innovation, and each new iteration is pumping the future's lifeblood.
Here are some of the innovations 3D printing is bringing to life.

The Pulse Behind the Tech

For years, scientists have wanted to create the equivalent of Star Trek'sreplicator in the real world and have sought to develop the necessary technology.
The 3D printer was invented in the mid-1980s, according to a report by Michael Vidikan, founder of Future in Focus. While it was a rudimentary model, as inventions are wont to be, "progress in the industry has been slow but steady."
It isn't only scientists and sci-fi fans who want to see 3D printing come to fullStar Trek replicator functionality. Industries across the board envision substantial benefits once the technology is perfected. Some see benefits now.


The 3D Pulse Quickens

Known in the manufacturing sector as "additive manufacturing," or AM, 3D printing is used heavily in prototyping already. There is also some use of it in producing machine parts, since additive manufacturing -- the layering of materials to make a product -- generally is faster and more cost effective than subtractive manufacturing -- the cutting or pressing a product out of a material, thereby producing waste.
"In the coming year, we are going to see 3D metal parts being flight-tested in real applications, not just trivial parts -- e.g., brackets, hinges, flanges -- attached to noncritical components," said Tim Simpson, professor of mechanical engineering at Penn State.
"It'll be done in the aerospace industry, which will then cause everyone else to fully commit to additive manufacturing. No one wants to be the first, but once someone else has done it, then no one wants to be last!" he told TechNewsWorld.
"Meanwhile, companies that don't get into the game will start to lose employees to those that are readily using AM, which will create a further divide between companies that want to do AM and those that can do AM," Simpson added. "Buying a machine is the easier part; learning how to run it well is challenging."
Expect to see a seemingly sudden uptake in 3D printing in the manufacturing sector shortly -- first in producing existing products, but quickly moving into innovation.
"The main benefits are low cost, speed, versatility and innovation," said Jorge M. Zuniga, director of the 3D Research & Innovation Laboratory at Creighton University.
"The use of 3D printing brings professionals from different areas to collaborate, and innovation is a side effect of these collaborations," he told TechNewsWorld.
However, manufacturing isn't the only industry using 3D printing to its advantage or planning to increase that use going forward.

Infusions of New 3D Printing Blood

"Industries leveraging 3D printing in a sizable way today include dental; some other medical, such as hearing aids and surgical models; some limited and specific aerospace applications; and then the widely applicable consumer space for education, design and customization of collectibles," said Michael Raphael, CEO of Direct Dimensions.
"I look for applications where the design is essentially consistent yet where each of them is unique for some reason," he told TechNewsWorld.
Ease of customization arguably is most appealing to the medical and dental sectors, according to Raphael.
"Dental and medical are obvious. Teeth are essentially the same, but each is different. 3D printing shines for these applications because no tooling is required, and you can make them each unique just as easy as you can make them all the same," he said.
"Following this paradigm, I look for adoption in other human body-related products. Medical devices provide a good case, such as orthotics, braces and splints. Other extractions would include protective gear, sports and performance gear, and footwear," Raphael added.
The same holds true for printing customized human body parts.
"Patients have already received 3D-printed jaws, ribs, sternum, teeth, tracheas and skulls," said Steven J. Hausman, president of Hausman Technology Presentations.
"There will be no part of the body that will not be duplicated in the future, ranging from inexpensive customized prosthetics to bioprinted organs using the patient's own stem cells so that tissue rejection will not be an issue," he told TechNewsWorld.
Medicines increasingly will be 3D printed, partly driven by the need to contain healthcare costs and partly by President Obama's precision medicine initiative.
"In August 2015, the FDA approved the first 3D-printed prescription drug -- no doubt to be the first of many," said Hausman.

Mobile First Responder

Another advantage to 3D printing is its ability to serve as a supply chain in remote areas and mobile venues.
"A low-gravity 3D printer that is able to operate in space has been created," said Hausman. "This will permit the crew of the International Space Station to create replacement parts when needed without the necessity of awaiting a resupply mission from Earth. Similarly the ability to manufacture parts on demand has clear utility in military ships at sea."
Imagine its use in disaster areas where blood, organs, artificial limbs, blankets, life-saving equipment and even food can be produced on the spot.
"3D printing has gained traction in the food industry, wherein pasta, candy and other foods can already be printed," said Chinh Pham, who co-leads the emerging tech practice at Greenberg Traurig.

Industries in Transition

"The worldwide 3D printing industry is expected to grow from about $3 billion in revenue to close to $13 billion by 2018, and exceeding $21 billion in revenue by 2020," he told TechNewsWorld.
Its impact won't be entirely benign as it will disrupt several traditional industries, including shipping, which will be affected as manufacturers and retailers begin shipping 3D printer code instead of goods. Supply chains on every front will feel the impact as well. How each is affected depends on how well it adapts to the change.
Stores such as StaplesFedEx and UPS already are moving to adapt their business models to the upheaval 3D printing is likely to bring.
Retailers too may find it hard to compete when consumers can order 3D printing codes directly from designers and manufacturers and customize that code on their home 3D printers. Notions of bulk sizing will disappear as clothing printed to each customer's exact measurements replaces sizes 0 to 18 for women.
All these changes will spur additional innovations as time progresses, personalization becomes imperative, and the technology and materials improve.

GoPro Shooters Can Send Live Streams Up Periscope Print Email By John P. Mello Jr.

GoPro Shooters Can Send Live Streams Up Periscope

Print
http://www.technewsworld.com/story/GoPro-Shooters-Can-Send-Live-Streams-Up-Periscope-83037.html
Also check out my YouTube channel: https://www.youtube.com/channel/UCutjAG28vk2d4rIuln5Zxaw
Print
By John P. Mello Jr.
Jan 27, 2016 10:37 AM PT
gopro-hero4-periscope-live-streaming

Goodbye, guesswork. Hello, money.
With Multivariate Testing in MailChimp Pro, you can create and test up to 8 different email campaigns. When your customers choose the winner, you sell more stuff.
Learn More Now
GoPro on Monday announced an integration with Twitter's Periscope app that allows live streaming from a GoPro Hero4 camera.
Periscope users can switch between broadcasting from their iPhone's camera to their GoPro directly from the phone screen with the touch of a button, GoPro said.
The feature allows GoPro shooters to use the Periscope interface like a production switchboard. They can toggle between their iPhone and GoPro cameras on the fly, adding variety to video of a live event.
Thanks to the Periscope integration, the GoPro can take the risks that accompany shooting live-action video, while the iPhone can remain safely in a user's pocket, Periscope said. A screen-lock button prevents accidental camera switching while the iPhone is pocketed.


Fits Business Strategies

Twitter's teaming with GoPro fits in with both companies' business strategies.
"Twitter wants to become a more media-rich environment," said Ross Rubin, senior director for industry analysis at App Annie.
"It's one of the ways that it's looking to go beyond the 140 characters that have defined the service for much of its existence," he told TechNewsWorld.
"The GoPro footage is often very exciting, and it makes for a more dynamic Twitter experience," Rubin said. "It will get people thinking about Twitter in a new way. Instead of just news updates or short missives, it will be thought of as more of an entertainment brand."

Trouble in Twitter City

Integration with Periscope furthers GoPro's strategy to integrate content created with its cameras with more service providers.
"GoPro has also been trying to drive its own media effort," Rubin explained.
"Being able to broadcast GoPro content in real time and spontaneously via Twitter and Periscope is a good complement to some of the on-demand and edited footage that it's been developing," he said.
Building excitement around its products and services is important to Twitter right now, as some of its top brass have left the company. Its stock has been steadily declining for months, as Wall Street has been disappointed with Twitter's ability to generate money and grow its membership.

Bot Woes

"Twitter doesn't make as much money from its advertising as Microsoft and Google do with their search engines," noted Darren Hayes, an associate professor atPace University.
Twitter's portfolio isn't as diversified as its competitors either.
"Facebook has purchased many different companies and facilitates many other services," Hayes told TechNewsWorld. "Twitter has done some of that -- but not to the same extent as companies like Facebook do."
Attracting new users has been a problem for Twitter, as is getting a handle on how many flesh-and-blood members it has.
"Twitter has a problem with the number of bots using it. There's a huge number of followers who are just bots. People don't realize how big that number is," Hayes said.
"Twitter tries to adjust that. I've heard of people who have lost tens of thousands of followers in an hour because Twitter was going through and clearing out bots that were using the service," he continued. "So their membership numbers may be inflated."

Money Generator?

Integrating Periscope with GoPro could have an impact on Twitter's revenue stream.
"There are monetization options available, but only if this app really takes off," said Andreas Scherer, managing partner at Salto Partners.
"For example, celebrity athletes who are into action sports -- such as snowboarders, extreme alpine skiers, X Games players -- could potentially create huge numbers of followers," he told TechNewsWorld.
"That crazy ride down the mountain, the double back flip -- all these experiences can be shared in real time. The audience for those video streams are a great platform for targeted ads. It's easy to imagine a shared revenue model between Twitter, the brand and the athlete," Scherer continued.
"Similar business models work today on YouTube," he pointed out. "It takes millions of followers per athlete to really make sense, though."
Any revenues garnered from targeted advertising will be a plus for Twitter, but they won't address the company's biggest problem, noted Brian Blau, a research director at Gartner.
"Twitter has to do a lot more with making the service more appealing to users," he told TechNewsWorld. "I don't think adding GoPro is going to add the tens if not hundreds of millions of users Twitter needs to make the business viable long term."

FDA Guidelines Target IoT Medical Device Security

FDA Guidelines Target IoT Medical Device Security

Print
By John P. Mello Jr.
Jan 28, 2016 5:00 AM PT
fda-internet-things-medical-device-security

 CRM Buyer's Guide
There are hundreds of CRM solutions on the market today, so how do you know which one is best for your organization? This free buyer's guide compares the best CRM software systems and allows you to request a price or demo for the system that best fits your needs. [View the Guide]
The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices.
"A growing number of medical devices are designed to be networked to facilitate patient care. Networked medical devices, like other networked computer systems, incorporate software that may be vulnerable to cybersecurity threats," the FDA says in its proposal.
"The exploitation of vulnerabilities may represent a risk to the safety and effectiveness of medical devices and typically requires continual maintenance throughout the product life cycle to assure an adequate degree of protection against such exploits," the agency notes.
"Proactively addressing cybersecurity risks in medical devices reduces the patient safety impact and the overall risk to public health," it says.
The guidelines offer best practices for assessing, remediating and reporting cybersecurity vulnerabilities in medical devices.
Stakeholders have 90 days to submit comments to the FDA on the proposed guidelines before they're finalized.

An IoT First

"The FDA is to be congratulated because this is the first time that somebody is acknowledging the risk associated with the Internet of Things," said Torsten George, vice president for global marketing at RiskSense.
The agency is raising the security bar for medical device makers, said Lee Kim, director of privacy and security at the Healthcare Information and Management Systems Society.
"I think that provides some assurance for healthcare providers, but they need to scan their networks for vulnerabilities, too," she told TechNewsWorld. "The healthcare providers can't turn a blind eye to this either."
The guidelines are especially important because healthcare IT is very compliance-oriented, noted Chris Wysopal, CTO of Veracode.
"If a regulating authority doesn't have anything to say, organizations think they don't have to do anything because they don't take a risk-based approach, as financial service companies or manufacturers do when they try to protect their brand or intellectual property," he told TechNewsWorld.

Guidelines With Teeth

While the FDA's move is a good one, guidelines are only recommendations on how to behave. Medical device makers could ignore them without having to worry about punishment -- yet.
"There are no fines mentioned yet, but they could come," RiskSense's George told TechNewsWorld.
Competition also could play a role in nudging device makers to comply with the guidelines.
"There are so many medical devices out there and so much competition that a differentiating factor could become compliance with these guidelines," HIMSS's Kim said.
The guidelines could provide fodder for potential legal actions against device makers.
"The courts are being very stringent when it comes to cybersecurity. If you're not following best practices these days, the courts are leaning toward consumers and end users when making their judgments," George noted.
"There's the potential that some attorneys looking at this would use these guidelines to establish negligence in a civil case," Kim said. "That legal pressure could be a motivator for medical device manufacturers to shore up their security practices."

More Concern Over App Flaws

Healthcare IT execs don't seem to share the FDA's heightened concern over the risks medical devices pose to patients and their data, according to a survey released last week by Veracode and HIMSS.
The survey, which was part of Veracode's "State of Web and Mobile Application Security in Healthcare" report, found that only 7 percent of the 200 participating healthcare IT execs placed the insecurity of IoT devices -- such as medical devices, POS devices, printers and building automation -- on their list of top security threats.
What most concerned the execs was cyberattackers exploiting vulnerabilities in applications (28 percent), followed by phishing attacks on employees, negligent employees and malicious insiders (26 percent).
Fears over application vulnerabilities are being raised with good reason.
"Data from actual code-level analysis of billions of lines of code conducted by Veracode shows that 80 percent of healthcare applications exhibit cryptographic issues such as weak algorithms upon initial assessment. Given the large amount of sensitive data collected by healthcare organizations, this is quite concerning," the report notes.
"In addition, healthcare fares worse than the vast majority of other industries when it comes to addressing remediation, with only 43 percent of known vulnerabilities being remediated," it continued.
Healthcare organizations should test the medical devices they use and hold vendors accountable for security gaps, the report recommends.
"Many medical devices, including MRI scanners, X-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients," the report notes.

Breach Diary


  • Jan. 18. Softpedia reports confirmation of a data breach that compromised a database of 6 million Nexus Mods user accounts. Nexus Mods is the biggest gaming mods database on the Internet.
  • Jan. 18. New West Health Services reports theft of laptop containing personal information of current or former customers. The breach reportedly could affect 25,000 people. However, the company says there is no evidence that the data has been accessed or used.
  • Jan. 19. Security researcher Chris Vickery reports that a database containing the private account information of 325,000 Earbits users was exposed on the Internet for an unknown period of time.
  • Jan. 20. FACC announces it incurred US$55 million in damages when its financial accounting department was the target of cyberfraud.
  • Jan. 20. SplashData releases annual list of worse passwords. Its analysis of more than 2 million leaked passwords in 2015 reveals that the most used password was "password," followed by 123456 and 12345678.
  • Jan. 20. A distributed denial-of-service attack disrupts the website for Ireland's National Lottery for two hours.
  • Jan. 20. Students at Virginia Tech University petition the administration to remove two-factor authentication requirement for certain sites because it's a "hassle."
  • Jan. 21. Kantar Worldpanel Comtech reports TalkTalk, which suffered a large data breach in last year's fourth quarter, lost 7 percent of its customers and 4.4 percent of its market share during that period.
  • Jan. 21. Irish Computer Society releases a survey that found 55 percent of Irish businesses have seen their data stolen, hacked or otherwise compromised over the last year largely because of "negligent employees."
  • Jan. 22. The Obama administration announces it has asked the Defense Department to design, build and operate a new computer system for storing and processing personal information for federal employees, contractors and others. According to news reports, the move is a response to the massive data breach at the Office of Personnel Management last year.
  • Jan. 22. The University of Virginia announces that a data breach of its human resources systems has exposed tax information for 1,400 employees and direct deposit banking information for 40 others.
  • Jan. 22. Irish government websites return online after DDoS attack took them offline.
  • Jan. 22. Northwest Territories Power sends letter to an undisclosed number of customers informing them that their personal information was sent accidentally to a customer in an email attachment. The company says the customer did not open the email and has signed a confidentiality agreement.

Upcoming Security Events


  • Jan. 28. Understanding Malware Lateral Spread Used in High Value Attacks. Noon ET. Webinar sponsored by Cyphort. Free with registration.
  • Jan. 28. State of the Phish -- A 360-Degree View. 1 p.m. ET. Webinar sponsored sponsored by Wombat Security Technologies. Free with registration.
  • Jan. 28. Cybersecurity Forecast: What's on the Horizon. 2 p.m. ET. Webinar sponsored by Kaspersky Lab. Free with registration.
  • Feb. 3. Building an IT Security Awareness Program That Really Works. 2 p.m. ET. InformationWeek DarkReading webinar. Free with registration.
  • Feb. 4. 2016 annual Worldwide Infrastructure Security Update. 11 a.m. ET. Webinar sponsored by Arbor Networks. Free with registration.
  • Feb. 5-6. B-Sides Huntsville. Dynetics, 1004 Explorer Blvd., Huntsville, Alabama. Free.
  • Feb. 9. Start With Security. University of Washington Law School, 4293 Memorial Way NE, Seattle. Sponsored by Federal Trade Commission. Free.
  • Feb. 11. SecureWorld Charlotte. Charlotte Convention Center, 501 South College St., Charlotte, North Carolina. Registration: conference pass, $195; SecureWorld Plus, $625; exhibits and open sessions, $30.
  • Feb. 11. Data Breach & Privacy Litigation Conference. Julia Morgan Ballroom, 465 California St., San Francisco. Registration: attorneys and companies, $795; litigation service provider, $1,195; law firm assistant, $375; legal marketing attendee, $595.
  • Feb. 11-12. Suits and Spooks DC. The National Press Club, 529 14th St. NW, Washington, D.C. Registration: $599; government and academia, $499.
  • Feb. 16. Architecting the Holy Grail of Network Security. 1 p.m. ET. Webinar sponsored by Spikes Security. Free with registration.
  • Feb. 17. Stopping Breaches at the Perimeter: Strategies for Secure Access Control. 1 p.m. ET. Webinar sponsored by 451 Research and SecureAuth. Free with registration.
  • Feb. 20. B-Sides Seattle. The Commons Mixer Building, 15255 NE 40th St., Redmond, Washington. Tickets: participant, $15 plus $1.37 fee; super awesome donor participant, $100 plus $3.49 fee.
  • Feb. 28-29. B-Sides San Francisco. DNA Lounge, 375 11th St., San Francisco. Registration: $25.
  • Feb. 29-March 4. RSA USA 2016. The Moscone Center, 747 Howard St., San Francisco. Registration: full conference pass before Jan. 30, $1,895; before Feb. 27, $2,295; after Feb. 26, $2,595.
  • Feb. 29-March 4. HIMSS16. Sands Expo and Convention Center, Las Vegas. Registration: before Feb. 3, $865; after Feb. 2, $1,165.
  • March 10-11. B-Sides SLC. Salt Palace Convention Center, 90 South West Temple, Salt Lake City. Registration: $65.
  • March 18. Gartner Identity and Access Management Summit. London. Registration: before Jan 23, 2,225 euros plus VAT; after Jan. 22, 2,550 euros plus VAT; public sector. $1,950 plus VAT.
  • March 29-30. SecureWorld Boston. Hynes Convention Center, Exhibit Hall D. Registration: conference pass, $325; SecureWorld Plus, $725; exhibits and open sessions, $30.
  • June 13-16. Gartner Security & Risk Management Summit. Gaylord National Resort & Convention Center, 201 Waterfront St., National Harbor, Maryland. Registration: before April 16, $2,950; after April 15, $3,150; public sector, $2,595.

Wednesday, January 27, 2016

Suggestion Glitch Crashes Safari Browser

Suggestion Glitch Crashes Safari Browser

Print
By Richard Adhikari
Jan 27, 2016 3:25 PM PT
safari-browser-glitch

Attention Marketers: Generate Qualified Leads to Fill Your Sales Funnel Instantly!
Access the most comprehensive database of more than 30 million IT and Business Decision Makers. 99% accuracy and satisfaction guaranteed. No registration required to learn more.
Apple's Safari browser has been crashing on Macs and iOS devices when users launch a search through its address bar, according to reports that surfaced Wednesday.
OS X and iOS users worldwide have been affected, according to The Verge, which confirmed the problem on several iOS devices and at least one OS X machine.
One of the first mentions of the glitch was a tweet by app developer Phillip Caudell, who asked if anyone else's Safari browser on the Mac mysteriously stopped working.


Disabling the "include search engine suggestions" fixed the problem, Caudell later tweeted.
The problem affected English, French and German language versions of Safari but not the Dutch version, according to developer Steve Troughton-Smith.
Further, iOS 7 and earlier versions weren't affected.
Apple reportedly has fixed the problem.

Hit and Miss

"It happens for all search engines, have confirmed that," Troughton-Smith tweeted. "They all go through Apple's API."
"Merely tapping the address bar on iOS 9.x crashes Safari right now," Troughton-Smith wrote. "Not only has Safari been killed outright on OS X, but it affects every iOS device too. You can't make this stuff up."
Only impacted people whose suggestions cache had updated while they were using their devices between 1:00 a.m. and 4:00 a.m. PST were hit, the BBC said. So, users in Europe were more likely to have been affected than others.
However, not everyone was impacted.
"Working fine on five devices," Pete Dillon wrote on Troughton-Smith's Twitter feed.
Danilo Torisi couldn't crash his devices when he tried.
"I've decided to stop trying to make them crash, I'll keep enjoying my lucky devices," he wrote.
"We have a Radar and a fix identified. It is lower level than WebKit," said Timothy Hatcher, WebKit developer experience manager at Apple.
At this point, the issue is a nuisance, said Laura DiDio, a research director atStrategy Analytics. She didn't have a problem with her two MacBooks and her iPhone.
The glitch will see most users switching off Safari Suggestions, Troughton-Smith opined. "Few

Apple's Software Issues

Safari for Mac wouldn't resolve Twitter's shortened "t.co" links, according to idownload. That issue apparently has been around since last fall.
Apple identified a fix for that problem, Hatcher said earlier this month, using language identical to his response regarding the latest Safari search glitch.
That raises the question of whether perhaps the search glitch was caused by the same bug.
Safari on the Mac and iOS earlier this week became the target of a prank site, crashsafari.com, that caused the browser to crash.
Although a solution to the crashsafari.com problem quickly appeared, "the possibility that this technique can be used to install a malicious program cannot be ruled out," Tripwire researcher Craig Young told TechNewsWorld.
Mac users last fall were forced to reinstall apps they downloaded from the Mac App Store because a security certificate expired overnight.

Is Apple's Cybersecurity Up to Snuff?

These issues raise questions about the quality of Apple's security. Are its customers now more vulnerable to hacks?
"The number of attacks and their sophistication are scaling at a much faster rate than security on all platforms," observed John Gunn, VP of corporate communications at Vasco Data Security.
"The worst is yet to come," he told TechNewsWorld.
The real problem is the increasing interconnectedness of devices, suggested Strategy Analytics' DiDio.
"As things get more connected, the volume, velocity and variety of traffic go up and these things will happen," she told TechNewsWorld. "I think it's a sign of the times."
Apple did not respond to our request to comment for this story.

Samsung Rolls Out Stylish Gear S2 Classic Smartwatches

Samsung Rolls Out Stylish Gear S2 Classic Smartwatches

By Richard Adhikari
Jan 25, 2016 4:19 PM PT
samsung-gear-s2-classic-smartwatch

 Find the Best CRM Software for Your Needs
With hundreds of CRM solutions on the market today, how do you know which one is best for your organization? This free buyer's guide reviews the best CRM software systems and allows you to request a price or demo for the system that best fits your needs. Get started now!
Samsung on Monday began a global rollout of the latest versions of its Gear S2 Classic smartwatch, hitting China first.
There are two models in the Gear S2 Classic New Edition line -- one with 18K rose gold plating and the other with a platinum finish.
They have ivory and black genuine leather bands, respectively.
The watches' new faces feature characters from the Peanuts comic strip, as well as designs created by artists including Keith Haring and Jean-Michel Basquiat. Twisting the bezel changes the face.
New apps from CNN and Bloomberg include their own specialized watch face features.
Samsung also has added apps from eBay, ESPN, Uber and Voxer.
Introduced at CES in January, the New Edition line also includes Samsung Pay, NFC technology that soon will be available to users, beginning in the United States.
Samsung didn't indicate pricing for the line.

Fashion Forward

"The new designs launched at CES are part of the larger trend towards more bling and enhanced appeal for women that we also saw from Huawei at CES, and from models like the Moto 360 2 and Pebble Time Round earlier this year," remarked Cliff Raskind, a senior research director at Strategy Analytics.
That sensibility is reflected in "the premium metal-plated models, campy watch faces, and ... leather straps," he told TechNewsWorld.
"The larger trend, of course, is that smartwatches are meeting the challenge of adding style and fashion a lot faster than they're meeting the challenge of practical day-to-day convenience -- battery life, comfort, size," Raskind said.

Too Cool for the Real World?

Despite being extremely well made, with an intuitive interface and other good features, the Gear S2, predecessor of the New Edition line, reportedly has connectivity issues and only a limited number of apps for its Tizen OS, according to Kris Carlon, who reviewed it for AndroidPit.
Those aren't the only reported problems.
"You can't use the Verizon Message+ to respond through the watch. Typing is a joke ... can't use Gmail app to look at entire mailbox, only notifications, have to set up the email app to see everything," said Foxy in a comment posted in response to the AndroidPit review.
When using WhatsApp on the Gear S2, the reply icon disappeared and couldn't be retrieved even after the smartphone had been reset, reported Alfred Tang in another comment.
Battery life was "five to seven hours instead of the advertised 30 or 48" after the Instagram app was downloaded and used, BlueEyed Apache complained. "You can get a good 25+ hours from the battery but only if you use the watch solely for telling time."
However, dropped connections weren't a problem for commenter Adeshina Adeniran, who wrote that using the Gear S2 was "amazing and fun."

Getting Better All the Time?

Lack of apps is a problem, but "with ESPN, Uber and CNN, I think we're seeing the big names come in," said Ramon Llamas, a research manager at IDC.
"We need to see more local ones, but these are good ones to have," he told TechNewsWorld.
Tizen smartwatch shipments will grow from 1.7 million units shipped in 2015, with 8.2 percent of the market, to 2.5 million in 2019, according to IDC.
That's a 9.5 percent compound annual growth rate, but it won't be enough. The market share for Tizen smartwatches will slip to 2.8 percent in 2019.
"More ecosystem and SDK focus is clearly needed if Tizen is to compete head to head in apps with watchOS, Android Wear, and even Pebble's budding developer ecosystem," said Strategy Analytics' Raskind.
Tizen "remains much more confined to Samsung, limiting its ecosystem potential," he continued, while Android Wear, watchOS and Pebble OS "continue to evolve and gain a following." Attracting more developers to build more Tizen apps "will not be an easy task from its current low base."
There might yet be hope, Raskind suggested, because Samsung Electronics' new chief, DJ Koh, who took over the role Dec. 1, has the required software chops to address the apps shortfall. 

Sunday, January 24, 2016

CHECK OUT ALL THE MEGATALL SKYSCRAPERS WE'LL HAVE BY 2020

CHECK OUT ALL THE MEGATALL SKYSCRAPERS WE'LL HAVE BY 2020

THE NUMBER OF BUILDINGS TALLER THAN 600 METERS IS GOING UP, UP, UP
Across the globe, more than 100 buildings have reached a height of 300 meters (the approximate height of the Eiffel Tower) or higher, putting them in a category architects call "supertall." Many of them sprang up in the past dozen or so years, which could be considered the supertall era. But according to the Council on Tall Buildings and Urban Habitat, as reported by Dezeen, supertall is SO last decade. Now we're entering the regime of the megatall skyscraper, a category reserved for behemoths taller than 600 meters.
At the moment, only three buildings qualify as megatalls: Dubai's 2,717-foot (828-meter) Burj Khalifa (completed in 2010), the 2,073-foot (632-meter) Shanghai Tower (completed in 2015), and Mecca's 1,972-foot (601-meter) Makkah Royal Clock Tower (completed in 2012). But that number is expected to more than double by 2020, as four more join the list: Shenzhen's Ping An Finance Centre, Wuhan's Greenland Center, Jakarta's Signature Tower, and Jeddah's Kingdom Tower. When the latter is completed in 2018, it will reach over 3,200 feet (about a kilometer) in height and become the new tallest building in the world. Photos and illustrations of all these megatall structures are in the gallery above.
Why are all of these megatall buildings rising in Asia and the Middle East, while North America and Europe avoid the trend? It could be because skyscrapers, in addition to providing extra real estate, give rising powers a potent symbol of wealth and progress. Because these buildings don't just have high price tags—they also incorporate cutting-edge scientific advances.
To build structures that fit comfortably into an urban environment and remain stable even as they stretch to absurd heights, architects rely on: advanced materials, such as specially-treated glass; new tech applications, which could give a building the illusion of an invisibility; and engineering innovations, which may eventually include magnetically levitating elevators. Or maybe western nations are just more worried about buildings that waste space and can melt cars.