Subject: Temporary moratorium on use of #FacialRecognition
Source: beSpacific Mastodon Newsie
via https://newsie.social/@bespacific/111230043681569938 see https://www.cpomagazine.com/data-privacy/state-of-new-york-makes-moratorium-on-facial-recognition-technology-in-schools-permanent/
Subject: Temporary moratorium on use of #FacialRecognition
Source: beSpacific Mastodon Newsie
https://newsie.social/@bespacific/111230043681569938
Source: FDA
https://www.fda.gov/news-events/press-announcements/fda-establishes-new-advisory-committee-digital-health-technologies
- For Immediate Release:
Today, the U.S. Food and Drug Administration announced the creation of a new Digital Health Advisory Committee to help the agency explore the complex, scientific and technical issues related to digital health technologies (DHTs), such as artificial intelligence/machine learning (AI/ML), augmented reality, virtual reality, digital therapeutics, wearables, remote patient monitoring and software.
The Digital Health Advisory Committee will advise the FDA on issues related to DHTs, providing relevant expertise and perspective to help improve the agency’s understanding of the benefits, risks, and clinical outcomes associated with use of DHTs. The committee should be fully operational in 2024.
Digital health is a rapidly evolving, cross-cutting space that spans a wide range of technologies. In addition to the technologies mentioned above, it also includes issues such as decentralized trials, patient-generated health data and cybersecurity.
…
Related Information
Subscribe to Podcasts and News Feeds – https://www.fda.gov/about-fda/contact-fda/subscribe-podcasts-and-news-feeds
Source: VentureBeat
https://venturebeat.com/ai/uh-oh-fine-tuning-llms-compromises-their-safety-study-finds/
As the rapid evolution of large language models (LLM) continues, businesses are increasingly interested in “fine-tuning” these models for bespoke applications — including to reduce bias and unwanted responses, such as those sharing harmful information. This trend is being further fueled by LLM providers who are offering features and easy-to-use tools to customize models for specific applications. However, a recent study by Princeton University, Virginia Tech, and IBM Research reveals a concerning downside to this practice. The researchers discovered that fine-tuning LLMs can inadvertently weaken the safety measures designed to prevent the models from generating harmful content, potentially undermining the very goals of fine-tuning the models in the first place.
Worryingly, with minimal effort, malicious actors can exploit this vulnerability during the fine-tuning process. Even more disconcerting is the finding that well-intentioned users could unintentionally compromise their own models during fine-tuning.
…
Category: https://venturebeat.com/category/ai/
Source: HackRead
https://www.hackread.com/linkedin-phishing-scam-smart-links-microsoft/
KEY FINDINGS
- A new LinkedIn phishing scam targets users to steal their Microsoft account login credentials.
- Phishing actors are exploiting LinkedIn’s Smart Link feature to evade email security mechanisms and redirect users to phishing pages designed to steal financial data.
- The Smart Links feature is part of LinkedIn Sales Navigator and Enterprise and allows users to send up to 15 documents with a single trackable link.
- Phishing actors are interested in exploiting Smart Links to make their phishing emails seem legitimate and appear to be sent by a trusted source apart from bypassing email protections.
- This campaign targets diverse industries, but the most prominent targets are the finance and manufacturing sectors.
If you use LinkedIn to connect with your colleagues or industry experts, then you should feel alert because, in the newly discovered phishing campaign, threat actors are abusing a legitimate feature of LinkedIn to send authentic-looking phishing emails.
According to a report from email security firm Cofense, the feature exploited in this campaign is Smart Links, part of the LinkedIn Sales Navigator and Enterprise service. Phishers are abusing it to steal payment data. They exploit Smart Links to bypass email protection mechanisms and deliver malicious lures into the email inboxes of Microsoft users.
…
Tagged:
RSS: https://www.hackread.com/feed/
Source: tech.co
https://tech.co/news/how-to-spot-zelle-scams
[from the Zelle Hell dept … ] As a digital payments app that allows users to send and receive money directly to their bank accounts, scammers love Zelle.
Zelle is a popular digital payment platform that allows direct access to user bank accounts, which means that it is, of course, a prime target for scammers online.
Unfortunately, Zelle represents a particularly attractive scam candidate, as there is little recourse for scammed individuals to get their money back. So what can you do to keep yourself safe? You can understand what kind of Zelle scams are out there, so you can spot them before it’s too late.
What Are Zelle Scams?
Zelle scams are simply scams that are perpetrated through the Zelle platform. For those that don’t know, Zelle is an online payment service that allows users to send and receive money directly to their bank accounts. Unlike platforms like Venmo and CashApp, Zelle doesn’t have an in-app wallet, but instead facilitates transfers directly into and out of bank accounts for faster payments.
While this feature is understandably quite convenient, it does lend itself to abuse from scammers. Because the funds go immediately into, or in the case of scams out of, you’re bank account, there’s little recourse for getting it back when fraudulent situations arise.
Here are some of the most common Zelle scams to look out:
…
Category: https://tech.co/tag/privacy-security
Source: WJS via MSN
https://www.bespacific.com/how-ads-on-your-phone-can-aid-government-surveillance/
—
Abstracted from beSpacific
Copyright © 2023 beSpacific, All rights reserved.
Source: TechRepublic
https://www.techrepublic.com/article/new-nsa-cisa-iam-guidance/
This CISA-NSA guidance reveals concerning gaps and deficits in the multifactor authentication and Single Sign-On industry and calls for vendors to make investments and take additional steps.The National Security Agency and the Cybersecurity and Infrastructure Security Agency published on October 4, 2023, a document titled Identity and Access Management: Developer and Vendor Challenges. This new IAM CISA-NSA guidance focuses on the challenges and tech gaps that are limiting the adoption and secure employment of multifactor authentication and Single Sign-On technologies within organizations.
The document was authored by a panel of public-private cross-sector partnerships working under the CISA-NSA-led Enduring Security Framework. The ESF is tasked with investigating critical infrastructure risks and national security systems. The guidance builds on their previous report, Identity and Access Management Recommended Best Practices Guide for Administrators.
…
- How to Prevent Phishing Attacks with Multi-Factor Authentication (TechRepublic)
- 8 Best Penetration Testing Tools and Software for 2023 (TechRepublic)
- 6 Best Cybersecurity Certifications of 2023 (TechRepublic)
- Network security policy (TechRepublic Premium)
- Cybersecurity: More must-read coverage (TechRepublic on Flipboard)
Topics:
Sample RSS feed: https://www.techrepublic.com/rssfeeds/topic/security/
Source: ACLU
https://www.bespacific.com/digital-dystopia-the-danger-in-buying-what-the-edtech-surveillance-industry-is-selling/ACLU Report – Digital Dystopia. The Danger in Buying What the EdTech Surveillance Industry is Selling [63 pages]:
“Over the last two decades, a segment of the educational technology (EdTech) sector that markets student surveillance products to schools — the EdTech Surveillance industry — has grown into a $3.1 billion a year economic juggernaut with a projected 8% annual growth rate. The EdTech Surveillance industry accomplished that feat by playing on school districts’ fears of school shootings, student self-harm and suicides, and bullying — marketing them as common, ever-present threats. Capitalizing on its significant financial resources and political influence, the EdTech Surveillance industry has succeeded in shaping and controlling the narrative around its products. … As a result, from student communications monitoring to facial recognition technology, school districts are rapidly deploying a huge array of surveillance technologies to spy on their students in the name of “safety.” While buying these EdTech Surveillance products may make school districts feel safer, the reality is …
Table of Contents
Executive Summary…………………………………………………………………………………………………………………..4
Introduction………………………………………………………………………………………………………………………………..8
The EdTech Surveillance Industry’s Deceptive Marketing Practices………………………….11
Surveillance Technology in Schools Is Hurting Kids, Not Helping Them…………………..20
Efforts to Push Back Against Student Surveillance…………………………………………………………31
Recommendations and Conclusions: How To Protect Students and Promote
Better Student Surveillance Technology Decision-Making…………………………………………..39
Methods…………………………………………………………………………………………………………………………………….43
Appendix 1: Ed Tech Surveillance: 10 Leading Products………………………………………………46
Appendix 2. Model Legislation: Student Surveillance Technology Acquisition
Standards Act…………………………………………………………………………………………………………………………..52
Endnotes………………………………………………………………………………………………………………55
—
Abstracted from beSpacific
Copyright © 2023 beSpacific, All rights reserved.
Source: Help Net Security
https://www.helpnetsecurity.com/2023/10/17/passwordless-technology-move/
Moving to passwordless technology
- Businesses are ready to embrace a passwordless future, with 92% having a plan to move to passwordless technology and 95% currently using a passwordless experience at their organization.
- Businesses believe passkeys will help make them more secure: 92% believe passkeys will benefit their overall security posture, and 93% agree that passkeys will eventually help reduce the volume of unofficial (i.e., “Shadow IT”) applications.
- However, many recognize that work still needs to be done: A majority of businesses surveyed are still using phishable authentication methods, such as passwords (76%) and multi-factor authentication (MFA) (43%) when it comes to authenticating users within their organization.
- The majority recognize that this transition will take time and education: 55% of IT leaders surveyed feel they need more education on how passwordless technology works and/or how to deploy it, and 28% cited concerns that users may be resistant to change or using a new technology.
- When making this transition, businesses made it clear they want to choose where they store passkeys, with 69% of IT leaders anticipating storing them in a third-party password manager.
…
Tagged
Source: FDA
https://www.fda.gov/news-events/press-announcements/fda-establishes-new-advisory-committee-digital-health-technologies
- For Immediate Release:
Today, the U.S. Food and Drug Administration announced the creation of a new Digital Health Advisory Committee to help the agency explore the complex, scientific and technical issues related to digital health technologies (DHTs), such as artificial intelligence/machine learning (AI/ML), augmented reality, virtual reality, digital therapeutics, wearables, remote patient monitoring and software.
The Digital Health Advisory Committee will advise the FDA on issues related to DHTs, providing relevant expertise and perspective to help improve the agency’s understanding of the benefits, risks, and clinical outcomes associated with use of DHTs. The committee should be fully operational in 2024.
Digital health is a rapidly evolving, cross-cutting space that spans a wide range of technologies. In addition to the technologies mentioned above, it also includes issues such as decentralized trials, patient-generated health data and cybersecurity.
…
Related Information
Subscribe to Podcasts and News Feeds – https://www.fda.gov/about-fda/contact-fda/subscribe-podcasts-and-news-feeds
Source: VentureBeat
https://venturebeat.com/ai/uh-oh-fine-tuning-llms-compromises-their-safety-study-finds/
As the rapid evolution of large language models (LLM) continues, businesses are increasingly interested in “fine-tuning” these models for bespoke applications — including to reduce bias and unwanted responses, such as those sharing harmful information. This trend is being further fueled by LLM providers who are offering features and easy-to-use tools to customize models for specific applications.However, a recent study by Princeton University, Virginia Tech, and IBM Research reveals a concerning downside to this practice. The researchers discovered that fine-tuning LLMs can inadvertently weaken the safety measures designed to prevent the models from generating harmful content, potentially undermining the very goals of fine-tuning the models in the first place.
Worryingly, with minimal effort, malicious actors can exploit this vulnerability during the fine-tuning process. Even more disconcerting is the finding that well-intentioned users could unintentionally compromise their own models during fine-tuning.
…
Source: HackRead
https://www.hackread.com/linkedin-phishing-scam-smart-links-microsoft/KEY FINDINGS
- A new LinkedIn phishing scam targets users to steal their Microsoft account login credentials.
- Phishing actors are exploiting LinkedIn’s Smart Link feature to evade email security mechanisms and redirect users to phishing pages designed to steal financial data.
- The Smart Links feature is part of LinkedIn Sales Navigator and Enterprise and allows users to send up to 15 documents with a single trackable link.
- Phishing actors are interested in exploiting Smart Links to make their phishing emails seem legitimate and appear to be sent by a trusted source apart from bypassing email protections.
- This campaign targets diverse industries, but the most prominent targets are the finance and manufacturing sectors.
If you use LinkedIn to connect with your colleagues or industry experts, then you should feel alert because, in the newly discovered phishing campaign, threat actors are abusing a legitimate feature of LinkedIn to send authentic-looking phishing emails.
According to a report from email security firm Cofense, the feature exploited in this campaign is Smart Links, part of the LinkedIn Sales Navigator and Enterprise service. Phishers are abusing it to steal payment data. They exploit Smart Links to bypass email protection mechanisms and deliver malicious lures into the email inboxes of Microsoft users. Cofense
…
Tagged:
RSS: https://www.hackread.com/feed/
Source: tech.co
https://tech.co/news/how-to-spot-zelle-scams
Zelle is a popular digital payment platform that allows direct access to user bank accounts, which means that it is, of course, a prime target for scammers online.
Unfortunately, Zelle represents a particularly attractive scam candidate, as there is little recourse for scammed individuals to get their money back. So what can you do to keep yourself safe? You can understand what kind of Zelle scams are out there, so you can spot them before it’s too late.
What Are Zelle Scams?
Zelle scams are simply scams that are perpetrated through the Zelle platform. For those that don’t know, Zelle is an online payment service that allows users to send and receive money directly to their bank accounts. Unlike platforms like Venmo and CashApp, Zelle doesn’t have an in-app wallet, but instead facilitates transfers directly into and out of bank accounts for faster payments.
While this feature is understandably quite convenient, it does lend itself to abuse from scammers. Because the funds go immediately into, or in the case of scams out of, you’re bank account, there’s little recourse for getting it back when fraudulent situations arise.
Here are some of the most common Zelle scams to look out:
…
Category: https://tech.co/tag/privacy-security
Source: WJS via MSN
https://www.bespacific.com/how-ads-on-your-phone-can-aid-government-surveillance/
—
Abstracted from beSpacific
Copyright © 2023 beSpacific, All rights reserved.
Source: TechRepublic
https://www.techrepublic.com/article/new-nsa-cisa-iam-guidance/
This CISA-NSA guidance reveals concerning gaps and deficits in the multifactor authentication and Single Sign-On industry and calls for vendors to make investments and take additional steps.The National Security Agency and the Cybersecurity and Infrastructure Security Agency published on October 4, 2023, a document titled Identity and Access Management: Developer and Vendor Challenges. This new IAM CISA-NSA guidance focuses on the challenges and tech gaps that are limiting the adoption and secure employment of multifactor authentication and Single Sign-On technologies within organizations.
The document was authored by a panel of public-private cross-sector partnerships working under the CISA-NSA-led Enduring Security Framework. The ESF is tasked with investigating critical infrastructure risks and national security systems. The guidance builds on their previous report, Identity and Access Management Recommended Best Practices Guide for Administrators.
…
- How to Prevent Phishing Attacks with Multi-Factor Authentication (TechRepublic)
- 8 Best Penetration Testing Tools and Software for 2023 (TechRepublic)
- 6 Best Cybersecurity Certifications of 2023 (TechRepublic)
- Network security policy (TechRepublic Premium)
- Cybersecurity: More must-read coverage (TechRepublic on Flipboard)
Topics:
Sample RSS feed: https://www.techrepublic.com/rssfeeds/topic/security/
Source: ACLU
https://www.bespacific.com/digital-dystopia-the-danger-in-buying-what-the-edtech-surveillance-industry-is-selling/ACLU Report – Digital Dystopia. The Danger in Buying What the EdTech Surveillance Industry is Selling [63 pages]:
Acknowledgements……………………………………………………………………………………………………………………3
Executive Summary…………………………………………………………………………………………………………………..4
Introduction………………………………………………………………………………………………………………………………..8
The EdTech Surveillance Industry’s Deceptive Marketing Practices………………………….11
Surveillance Technology in Schools Is Hurting Kids, Not Helping Them…………………..20
Efforts to Push Back Against Student Surveillance…………………………………………………………31
Recommendations and Conclusions: How To Protect Students and Promote
Better Student Surveillance Technology Decision-Making…………………………………………..39
Methods…………………………………………………………………………………………………………………………………….43
Appendix 1: Ed Tech Surveillance: 10 Leading Products………………………………………………46
Appendix 2. Model Legislation: Student Surveillance Technology Acquisition
Standards Act…………………………………………………………………………………………………………………………..52
Endnotes………………………………………………………………………………………………………………55
Source: Help Net Security
https://www.helpnetsecurity.com/2023/10/17/passwordless-technology-move/
Moving to passwordless technology
- Businesses are ready to embrace a passwordless future, with 92% having a plan to move to passwordless technology and 95% currently using a passwordless experience at their organization.
- Businesses believe passkeys will help make them more secure: 92% believe passkeys will benefit their overall security posture, and 93% agree that passkeys will eventually help reduce the volume of unofficial (i.e., “Shadow IT”) applications.
- However, many recognize that work still needs to be done: A majority of businesses surveyed are still using phishable authentication methods, such as passwords (76%) and multi-factor authentication (MFA) (43%) when it comes to authenticating users within their organization.
- The majority recognize that this transition will take time and education: 55% of IT leaders surveyed feel they need more education on how passwordless technology works and/or how to deploy it, and 28% cited concerns that users may be resistant to change or using a new technology.
- When making this transition, businesses made it clear they want to choose where they store passkeys, with 69% of IT leaders anticipating storing them in a third-party password manager.
…
Tagged