Tag Archives: security

A Pathway To Trusted AI

Artificial Intelligence (AI) has infiltrated our lives for decades, but since the public launch of ChatGPT showcasing generative AI in 2022, society has faced unprecedented technological evolution. 

With digital technology already a constant part of our lives, AI has the potential to alter the way we live, work, and play – but exponentially faster than conventional computers have. With AI comes staggering possibilities for both advancement and threat.

The AI industry creates unique and dangerous opportunities and challenges. AI can do amazing things humans can’t, but in many situations, referred to as the black box problem, experts cannot explain why particular decisions or sources of information are created. These outcomes can, sometimes, be inaccurate because of flawed data, bad decisions or infamous AI hallucinations. There is little regulation or guidance in software and effectively no regulations or guidelines in AI.

How do researchers find a way to build and deploy valuable, trusted AI when there are so many concerns about the technology’s reliability, accuracy and security?

That was the subject of a recent C.D. Howe Institute conference. In my keynote address, I commented that it all comes down to software. Software is already deeply intertwined in our lives, from health, banking, and communications to transportation and entertainment. Along with its benefits, there is huge potential for the disruption and tampering of societal structures: Power grids, airports, hospital systems, private data, trusted sources of information, and more.  

Consumers might not incur great consequences if a shopping application goes awry, but our transportation, financial or medical transactions demand rock-solid technology.

The good news is that experts have the knowledge and expertise to build reliable, secure, high-quality software, as demonstrated across Class A medical devices, airplanes, surgical robots, and more. The bad news is this is rarely standard practice. 

As a society, we have often tolerated compromised software for the sake of convenience. We trade privacy, security, and reliability for ease of use and corporate profitability. We have come to view software crashes, identity theft, cybersecurity breaches and the spread of misinformation as everyday occurrences. We are so used to these trade-offs with software that most users don’t even realize that reliable, secure solutions are possible.

With the expected potential of AI, creating trusted technology becomes ever more crucial. Allowing unverifiable AI in our frameworks is akin to building skyscrapers on silt. Security and functionality by design trump whack-a-mole retrofitting. Data must be accurate, protected, and used in the way it’s intended.

Striking a balance between security, quality, functionality, and profit is a complex dance. The BlackBerry phone, for example, set a standard for secure, trusted devices. Data was kept private, activities and information were secure, and operations were never hacked. Devices were used and trusted by prime ministers, CEOs and presidents worldwide. The security features it pioneered live on and are widely used in the devices that outcompeted Blackberry. 

Innovators have the know-how and expertise to create quality products. But often the drive for profits takes precedence over painstaking design. In the AI universe, however, where issues of data privacy, inaccuracies, generation of harmful content and exposure of vulnerabilities have far-reaching effects, trust is easily lost.

So, how do we build and maintain trust? Educating end-users and leaders is an excellent place to start. They need to be informed enough to demand better, and corporations need to strike a balance between caution and innovation.

Companies can build trust through a strong adherence to safe software practices, education in AI evolution and adherence to evolving regulations. Governments and corporate leaders can keep abreast of how other organizations and countries are enacting policies that support technological evolution, institute accreditation, and financial incentives that support best practices. Across the globe, countries and regions are already developing strategies and laws to encourage responsible use of AI. 

Recent years have seen the creation of codes of conduct and regulatory initiatives such as:

  • Canada’s Voluntary Code of Conduct on the Responsible Development and Management of Advanced Generative AI Systems, September 2023, signed by AI powerhouses such as the Vector Institute, Mila-Quebec Artificial Intelligence Institute and the Alberta Machine Intelligence Institute;
  • The Bletchley Declaration, Nov. 2023, an international agreement to cooperate on the development of safe AI, has been signed by 28 countries;
  • US President Biden’s 2023 executive order on the safe, secure and trustworthy development and use of AI; and
  • Governing AI for Humanity, UN Advisory Body Report, September 2024.

We have the expertise to build solid foundations for AI. It’s now up to leaders and corporations to ensure that much-needed practices, guidelines, policies and regulations are in place and followed. It is also up to end-users to demand quality and accountability. 

Now is the time to take steps to mitigate AI’s potential perils so we can build the trust that is needed to harness AI’s extraordinary potential. For the Silo, Charles Eagan. Charles Eagan is the former CTO of Blackberry and a technical advisor to AIE Inc.

Amidst Waves of Data Breaches, U.S. Gov Advised Agencies: Implement Zero Trust Architecture

It’s been nearly two years since arguments and questions kept rising following the FAA outage that happened on January 11th, 2023, which resulted in the complete closure of the U.S. Airspace and most of the airspace here in Canada.

Although the FAA later confirmed that the outage was, in fact, caused by a contractor who unintentionally damaged a data file related to the Notices to Air Missions (NOTAM) system, the authenticity of the fact is still debated. 

The FAA initially urged airlines to ground domestic departures following the system glitch Credit: Reuters

“The FAA said it was due to one corrupted file – who believes this? Are there no safeguards against one file being corrupted, bringing everything down? Billions of Dollars are being spent on cybersecurity, yet this is going on – are there any other files that could be corrupted?” questions Walt Szablowski, Founder and Executive Chairman of Eracent, a company that specializes in providing IT and cybersecurity solutions to large organizations such as the USPS, Visa, U.S. Airforce, British Ministry of Defense — and dozens of Fortune 500 companies.

There has been a string of cybersecurity breaches across some high-profile organizations.

Last year, on January 19th, T-Mobile disclosed that a cyberattacker stole personal data pertaining to 37 million customers, December 2022 saw a trove of data on over 200 million Twitter users circulated among hackers. In November 2022, a hacker posted a dataset to BreachForums containing up-to-date personal information of 487 million WhatsApp users from 84 countries.

The Ponemon Institute in its 2021 Cost of a Data Breach Report analyzed data from 537 organizations around the world that had suffered a data breach. Note all of the following figures are in US dollars. They found that healthcare ($9.23 million ), financial ($5.72 million), pharmaceutical ($5.04 million), technology ($4.88 million), and energy organizations ($4.65 million) suffered the costliest data breaches.

The average total cost of a data breach was estimated to be $3.86 million in 2020, while it increased to $4.24 million in 2021.

“In the software business, 90% of the money is thrown away on software that doesn’t work as intended or as promised,” argues Szablowski“Due to the uncontrollable waves of costly network and data breaches, the U.S. Federal Government is mandating the implementation of the Zero Trust Architecture.

Eracent’s ClearArmor Zero Trust Resource Planning (ZTRP) consolidates and transforms the concept of Zero Trust Architecture into a complete implementation within an organization.

This image has an empty alt attribute; its file name is image-4.png

“Relying on the latest technology will not work if organizations do not evolve their thinking. Tools and technology alone are not the answer. Organizations must design a cybersecurity system that fits and supports each organization’s unique requirements,” concludes Szablowski. For the Silo, Karla Jo Helms.

Alleged Terrorist Plotter Was Seeking Refugee Status in Canada

The Pakistani national who allegedly plotted to travel to New York to murder Jews was seeking refugee status in Canada, according to an immigration consultant.

Muhammad Shahzeb Khan, who came to Canada in June 2023 on a student visa, was arrested on Sept. 4 by the RCMP for allegedly intending to carry out a mass shooting targeting Jews in New York City. He was charged by U.S. authorities with attempting to provide material support and resources to a designated foreign terrorist organization, the Islamic State of Iraq and al-Sham (ISIS), and the United States is seeking to have him extradited.

Fazal Qadeer, an immigration consultant who had worked with Khan, said Khan was applying for refugee status on the basis of sexual orientation, saying he is gay, CBC reported on Oct. 7.

It is not known what Khan’s refugee claim status was when he was arrested, but Qadeer said Khan had recently had a lengthy interview with Immigration, Refugee and Citizenship Canada (IRCC).

Immigration Minister Marc Miller said in September that Khan entered Canada on a student visa.

According to a U.S. criminal complaint that was unsealed in September 2024, Khan repeatedly expressed his support for ISIS and his intention to carry out a terrorist attack around November 2023.

That month, he began interacting online with an undercover FBI agent, and explained his plan to attack Jewish religious centres in the United States around the time of the one-year anniversary of Hamas’s Oct. 7 terrorist attack against Israel.

Pakistani National Charged in Murder-for-Hire Plot Against US Official

What We Know About the Alleged ISIS Terror Plot by Pakistani National Arrested in Canada

In a statement, IRCC said it would not comment on individual cases, but that all asylum claimants receive an “independent and fair assessment on the individual merits of their claim,” which included whether they fear persecution based on race, religion, political opinion, nationality, or if they are LGBT.

Minister ‘Confident’ in Screening System

Khan’s arrest came months after a father and son were arrested by the RCMP in Richmond Hill, Ont., for allegedly being in the “advanced stages of planning a serious, violent attack in Toronto.” The two are facing nine terrorism charges, including conspiracy to commit murder on behalf of ISIS.

Ahmed Eldidi had been admitted into Canada in 2019 and later given citizenship, while Mostafa Eldidi was granted refugee status, according to documents provided by IRCC.

Miller defended Ottawa’s immigration system when appearing before the House of Commons public safety committee in September, saying the government remains “confident in the way our biometric system works in the progressive screening that operates in our country.”

Miller told the committee that Ahmed Eldidi had his initial temporary resident visa application refused because of concerns he would not leave Canada at the end of his authorized stay, but his second application was approved after an officer was satisfied he merely intended to visit Canada. He was given a favourable recommendation, Miller said, and officers found no issues that made him inadmissible to Canada.

Conservative MPs on the committee questioned screening procedures and accused the Liberal government of removing the mandatory requirement for police background checks for arrivals from some countries including Pakistan in 2018.

The IRCC’s website currently states that those applying for permanent residence, citizenship, or the International Experience Canada program “may need to provide a police certificate for any other programs” if they have a prior criminal record, but does not specifically mention Pakistan. For the Silo, Matthew Horwood.

Featured image- RCMP logo is seen outside the force’s ‘E’ division headquarters in Surrey, B.C., on March 16, 2023. The Canadian Press/Darryl Dyck.


USB Juice Jacking Is New Way Hackers Attack Travelers

How to avoid being hacked during this Fall’s travel season. 

According to a recent study by cybersecurity firm NordVPN, one in four travelers has been hacked when using public Wi-Fi while traveling abroad. However, unsecured Wi-Fi is not the only factor travelers should be worried about. 

Last year, the FBI published a tweet (see below) warning users against smartphone charging stations in public places (airports, hotels, and shopping malls). Hackers may have modified the charging cables with the aim of installing malware on phones to perform an attack called juice jacking. 

“Digital information, although it exists virtually, can also be stolen using physical devices. So it is important to take a 360-degree approach and secure your device from both online and offline threats,” says Adrianus Warmenhoven, a cybersecurity advisor.

What is juice jacking?

Juice jacking is a cyberattack where a public USB charging port is used to steal data or install malware on a device. Juice jacking attacks allow hackers to steal users’ passwords, credit card information, addresses, names, and other data. Attackers can also install malware to track keystrokes, show ads, or add devices to a botnet.

Image

Is juice jacking detectable?

Juice jacking attacks can be difficult to detect. If your device has already been compromised, you may notice some suspicious activity – but that won’t always be the case.

For example, you may notice something you don’t recognize on your phone — like purchases you didn’t make or calls that look suspicious.

Your phone may also start working unusually slowly or feel hotter than usual. Chances are you may have picked up malware. For a full list of signs to watch out for read on and find out how to know if your phone is hacked.

How to protect yourself

Since no sign of juice jacking is 100% reliable, it is best to avoid falling victim to this attack by using the following the advice:

  • Get a power bank. Power banks are a safe and convenient way to charge your device on the go. Getting a portable power bank means that you’ll never have to use public charging stations where juice jacking attacks occur. Always ensure your power bank is fully charged so you can use it on the go.
     
  • Use a USB data blocker. A USB data blocker is a device that protects your phone from juice jacking when you’re using a public charging station. It plugs into the charging port on your phone and acts as a shield between the public charging station’s cord and your device.
     
  • Use a power socket instead. Juice jacking attacks only happen when you’re connected to a USB charger. If you absolutely need to charge your phone in public, avoid the risk of infected cables and USB ports and use a power outlet. This is typically a safe way to charge your mobile device and other devices in public.

For the Silo, Darija Grobova.

FBI- Trump Shooter Was Lone Gunman

Today, the aftermath of the attempted assassination of former President Donald Trump: a breakdown of the assassination attempt, and initial theories about the gunman. Via our friends at the Associated Press & The Epoch Times.

Highlights

A Breakdown of the Assassination Attempt Against Trump


It started at 6:02 p.m. with former President Donald Trump taking the stage in Butler, Pennsylvania. Ten minutes later Mr. Trump was lying bleeding on the stage and shielded by Secret Service agents.


Why It Matters: An attempted political assassination of a former and potential U.S. president impacts the world.


FBI Found ‘Suspicious Device’ in Shooter’s Car, Investigating Attack as Domestic Terrorism


The FBI has provided background on its investigation of the would-be killer of former President Trump and what else he may have been trying to do.
Officials said they don’t have a motive yet, but did find a suspicious device in the dead gunman’s car and continue to work with his family as the investigation continues.


Why It Matters: Many questions need to be answered, including what the shooter’s motive was, and how he was able to nearly kill a former president.

FBI Investigating Attack as Act of Domestic Terrorism

The FBI said a ’suspicious device,’ which was later defused, was found in the assailant’s car.

FBI Believes Trump Shooter Acted Alone, Investigating Attack as Act of Domestic Terrorism
State and local police block off roads surrounding the home of the suspected shooter of former President Donald Trump, as the FBI carries out an investigation, in Bethel Park, Pa., on July 14, 2024. (Rebecca Droke/AFP via Getty Images) Joseph Lord

FBI officials say they believe the would-be assassin of former President Donald Trump acted alone.

The agency is investigating the attack as both an attempted assassination and an act of domestic terrorism, officials told reporters in a call with news media on July 14.

The new details emerged less than 24 hours after the United States saw its first major assassination attempt of a president or presidential candidate since President Ronald Reagan was shot in 1981.

Authorities have identified the shooter as 20-year-old Thomas Matthew Crooks, a resident of Bethel Park, Pennsylvania. At a Trump rally in Butler, Pennsylvania, on July 13, the assailant fired several shots from an elevated position near the venue. Witnesses saw a man with a rifle on the rooftop of a nearby building.

Former President Trump’s right ear was pierced by one of the bullets before he was rushed to his car by Secret Service agents. However, one of the attendees at the rally, 50-year-old firefighter Corey Comperatore, was killed. Two other rally attendees—identified by Pennsylvania State Police as David Dutch and James Copenhaver—were injured.

Both of the injured attendees are in stable condition, according to Pennsylvania State Police, which did not provide further details on their injuries. A GoFundMe effort established by the Trump campaign for the victims and their families had raised more than $3 million usd/ $4,090,000 cad as of the evening of July 14.

FBI Investigation

The FBI has not yet identified a motive. The assailant’s family is cooperating in the investigation, officials said.

Trump Says God ‘Prevented the Unthinkable’ During Assassination Attempt

Biden Says He’s Directed an Independent Review of Security at Trump Rally

Biden Says He’s Directed an Independent Review of Security at Trump Rally

Attorney General Merrick Garland called the assassination attempt on the former president “an attack on our democracy itself.”

“[The Justice Department has] no tolerance for such violence, and as Americans, we must have no tolerance for it,” Mr. Garland told reporters. “This must stop.”

The agency said a “suspicious device” was located during a sweep of Mr. Crooks’s car. It was later defused by bomb technicians.

FBI Director Christopher Wray vowed that his agency would “leave no stone unturned” in its investigation of the attack.

“An attempt to assassinate a presidential candidate can only be described as absolutely despicable and will not be tolerated in this country,” Mr. Wray told reporters.

Earlier on July 14, President Joe Biden said he asked that the investigation be “thorough and swift.”

FBI Director Christopher Wray testifies about the bureau’s budgetary needs during a Senate Appropriations Committee hearing in Washington on June 4, 2024. (Allison Bailey/Middle East Images via AFP via Getty Images)
FBI Director Christopher Wray testifies about the bureau’s budgetary needs during a Senate Appropriations Committee hearing in Washington on June 4, 2024. (Allison Bailey/Middle East Images via AFP via Getty Images)

Prior to the attack, officials said, the perpetrator wasn’t on the FBI’s radar as a potential threat.

The FBI’s screening of the shooter’s social media presence has so far revealed no ideology or political beliefs that could have been his basis for the attack, officials said.

The FBI has received more than 2,000 tips so far, they said.

Officials believe that the rifle used in the attack was a semi-automatic rifle similar to an AR-15.

Kevin Rojek, special agent in charge of the FBI’s Pittsburgh Field Office, told reporters that the weapon belonged to the shooter’s father, who purchased it legally. It’s still unclear how Mr. Crooks got his hands on the rifle, or if his father was aware that he had taken it.

“These are facts that we’ll flesh out as we conduct interviews,” Mr. Rojek said.

Independent Review

President Biden said that he has directed an independent review of the security present at the rally.

Speaking from the White House, President Biden said the assassination attempt was “contrary to everything we stand for as a nation.”

“It’s not who we are as a nation, it’s not America, and we cannot allow this to happen,” he said.

The president said that he had a “short but good conversation” with former President Trump on the evening of July 13.

The former president, meanwhile, was due to arrive in Milwaukee for the Republican National Convention on July 14, as originally planned. He said in a social media post that he had wanted to delay the travel in the immediate aftermath of the attack, but ultimately decided against it.

Secret Service officials confirmed on July 14 that no changes have been made to security at the convention, which starts on July 15, noting that the event has already been given the highest-grade security.

“Currently, there are no known articulated threats against the RNC or anyone visiting the RNC,” Michael Hensle, special agent in charge of the FBI for Wisconsin, said at a news conference.

The Secret Service has refuted claims that the 45th president’s security team requested additional security for the July 13 event and was denied.

“This is absolutely false. In fact, we added protective resources & technology & capabilities as part of the increased campaign travel tempo,” Secret Service spokesman Anthony Guglielmi wrote in a July 14 post on X.

Former President Trump, in a statement on July 14, thanked his supporters, saying of the attack that it was “God alone who prevented the unthinkable from happening.”

The former president made a call for unity, saying, “In this moment, it is more important than ever that we stand United, and show our True Character as Americans.”

Former First Lady Melania Trump, in her own statement, called on Americans to “ascend above the hate” and “simple-minded ideas that incite violence.”

“When I watched that violent bullet strike my husband, Donald, I realized my life, and Barron’s life, were on the brink of devastating change,” Ms. Trump wrote.

She said that she was “grateful to the brave Secret Service agents and law enforcement officials who risked their own lives.”

Over on Capitol Hill, lawmakers are vowing their own investigations into the matter.

House Speaker Mike Johnson (R-La.) said Congress will probe if there were security lapses at the rally.

“We need to know: How could an individual be at that elevation that was seen by apparently bystanders on the ground—how could that not be noticed by Secret Service?” Mr. Johnson told NBC’s “Today” on July 14.

In a July 14 letter to Department of Homeland Security (DHS) Secretary Alejandro Mayorkas, House Homeland Security Committee Chairman Mark Green (R-Tenn.) revealed several pieces of information, including the security plan that was in place on the day of the shooting. The Secret Service falls under the umbrella of DHS.

A DHS spokesperson confirmed receipt of the letter.

“DHS responds to congressional inquiries directly via official channels, and the Department will continue to respond appropriately to Congressional oversight,” the spokesperson told The Epoch Times in an email. For the Silo, Joseph Lord.

Joseph Lord

The Associated Press contributed to this report. 

The Role of AI in Strengthening Security at Cryptocurrency Casinos

Artificial Intelligence (AI) is revolutionizing the way security is managed at cryptocurrency casinos. From detecting fraudulent activities to ensuring fair play, AI’s role is becoming indispensable. Understanding how AI enhances security can provide better insights into its applications and benefits.

In recent years, the rise of cryptocurrency casinos has brought new challenges and opportunities for security measures. As a casino enthusiast, you might wonder how these platforms maintain integrity and protect users’ assets. The answer lies in the sophisticated use of AI technologies that are transforming the landscape of online gambling.

How AI detects fraudulent activities

One of the most significant advantages of AI in cryptocurrency casinos is its ability to detect fraudulent activities. By analyzing large datasets and recognizing patterns that indicate suspicious behaviour, AI systems can flag potential fraud before it causes harm.

For instance, some platforms featured on casinoutansvensklicens.ltd leverage AI to identify unusual betting patterns that might suggest cheating or money laundering. This proactive approach not only safeguards the casino’s operations but also ensures a secure environment for players. AI can even delve deeper, analyzing blockchain transactions to identify suspicious activity linked to specific crypto wallets, further strengthening the platform’s defences.

The importance of fair play

Another crucial aspect where AI shines is in ensuring fair play at cryptocurrency casinos. These platforms rely on complex algorithms to generate random outcomes for games, which can sometimes be vulnerable to manipulation. By implementing AI-driven solutions, casinos like those found here can monitor and verify the randomness of game results continuously. Utilizing such technology builds trust among players, knowing that the games they are participating in are fair and unbiased.

Improving user experience

AI isn’t just about security; it also significantly enhances the overall user experience at cryptocurrency casinos. Personalized gaming experiences are becoming more common as AI analyzes players’ behaviours and preferences to offer tailored recommendations. This means you can enjoy a more engaging and enjoyable gaming session with suggestions that match your interests. Additionally, AI-powered chatbots provide instant customer support, addressing queries and resolving issues swiftly.

The future of AI in cryptocurrency casinos

Looking ahead, the role of AI in cryptocurrency casinos is poised to expand even further. As technology continues to advance, so will the capabilities of AI systems in predicting and mitigating risks. New developments in machine learning and data analytics promise even more robust security measures and enhanced player experiences. Staying informed about these innovations is essential for anyone interested in the dynamic landscape of online gambling.

True Cases Of Phantom Transmissions And Hijacked Television Signals

The call letters KLEE-TV had not been broadcast since July 1950, more than 3 years before a viewer in London, England picked up their transmission on his television set.

Adding to the mystery was the fact that while in operation KLEE-TV was based out of Houston, Texas- an entire continent and ocean away. Since this was an era before satellite t.v. transmission how could the images be picked up? Was it simply a hoax?

klee tv signal cardThough debunkers have stated that this story first appeared in Readers Digest, it actually was first reported in 1953 by TV Guide: a viewer based magazine that organized and listed television programming and reviewed highlighted television shows. Hugely successful and widely distributed- it seems counter-intuitive to consider how this might affect an already paranoid and anxious viewer body. After all, the Cold War and the Space Race were underway. Many Americans were building nuclear bomb shelters and keeping their eyes to the skies.

Television was still a new form of media and to many it transcended the boundaries of space of time.

It seemed possible that ghostly transmissions from another time and another place could occur. TV Guide pointed out in its story that at the time of the phantom KLEE-TV transmission, no other t.v. station in the world used those call letters.

For the next 12 year this enigma was forgotten but then in February 1962 Mrs. Rosella Rose of Milwaukee, Wisconsin witnessed the following. The KLEE-TV letters were flashed onto her screen as well as the images of an unknown man and woman arguing on a balcony, followed by the flashing of the word “HELP!” Then suddenly, her screen went blank. It seemed as though Mrs. Rose had witnessed an electronic netherworld. Could an alternate universe be superimposing its reality onto hers? The simplest answer is that Mrs. Rose was a victim of her time.

Phantom signal transmission in Stranger Things.
Phantom signal transmission in Stranger Things.

Perhaps as mentioned in Haunted Media Static and Stasis, “….The fleeting and inexplicable transmissions of KLEE are eerie in that they are symptomatic of a general loss of self presence felt socially in electronic communications as a whole.” I think it’s safe to say that Canadian Film Director David Cronenberg felt this way and successfully incorporated these themes into Videodrome. I think it’s also safe to say that the success of the recent Netflix series Stranger Things is due in some part to this notion of a technologically created netherworld. And what about the Australian reports of a Coke bottle and drinking flask being transmitted during the Moon Landing?

Today there are reports of phantom webcam transmissions, of strange beings quickly seen on a monitor or a tablet. If we are able to view images on our devices then is it so far fetched to imagine that we ourselves can be seen by others through our devices? And if that’s possible to what end are we being surveilled? For the Silo, Jarrod Barker.

The Max Headroom Signal Intrusion Incident of 1987

Captain Midnight HBO Transmission Hijacking

Recommended Reading- Haunted Media Electronic Presence From Telegraphy to Television by Jeffrey Sconce

Why McLaren Formula 1 Teamed Up With Dropbox

Every second counts when a racing team’s intellectual property is their competitive edge.

Dropbox has partnered up with McLaren Racing as an Official Technology Partner of the McLaren Formula 1 Team.

McLaren car with Dropbox logo on the back.

From Mission Control to Track, Formula 1 is a team effort.

The best teams, like cars, are more than the sum of their parts. They’re built for performance and continually pushing for more. Dropbox gives McLaren the tools they need to unlock an extra gear. Now they can share info instantly and collaborate on files in real time, wherever they’re racing around the world. All while being confident their IP is safe and secure.

Our track record of fast, efficient, and easy-to-use products makes Dropbox a perfect partner for the McLaren Formula 1 Team. And our newest products push beyond storage, to support teams the way they work today. We help teams get the best results across the finish line. Dropbox is the one tool they rely on to stay organized and share info while safeguarding their business-critical content.

McLaren driver sitting in car.
A team’s intellectual property is their competitive edge. The McLaren Formula 1 Team trusts Dropbox to keep their most important content protected. With features like advanced sharing permissions and access management, we help keep McLaren’s confidential information private and secure, so they can focus on pushing for more podiums. Stay secure 
In a race against time, McLaren counts on Dropbox.
Organization is key to unlocking optimal performance. With shared workspaces and folders, Dropbox makes it easy for the McLaren Formula 1 Team to stay in sync, and spend more time on the work that matters. Staying organized helps teams move faster, and that’s a huge advantage when every second counts. Get organized 

The record time to change four tires is 1.8 seconds.
The McLaren Formula 1 Team set that record last year. Their success depends on everyone working together in perfect sync. And Dropbox enables easy, efficient collaboration across the team. Now they can: Quickly and safely share large, high-res files with internal or external stakeholders. Track sent files to see who’s opened them and what they’ve viewed. Review creative assets or race footage in real-time, even when the team is all around the world

EMP Pulse Attack Would Cripple North American Energy Grids

EMP Attacks: Expert William Forstchen Describes Cataclysmic Impact

Washington, D.C., 2023 — An electromagnetic pulse (EMP) attack above the center of North America would cripple the already vulnerable energy grid, wiping out power and setting off a cascade of deadly events. But just how real is the threat?

“I believe the threat of America being hit by an EMP weapon is the single greatest danger to the survival of [North] America,” said William R. Forstchen, Ph.D.

Widely considered one of the foremost experts on EMP attacks, Forstchen has been consulted by agencies within the American federal and state governments and has spoken at conferences all over the United States.

Forstchen has also written extensively about the devastating impact of EMP strikes, beginning with his New York Times bestseller, One Second After, a realistic look at a weapon and its awesome power to destroy the entire United States and Canada, literally within one second.

One Second After immerses readers in the terrifying concept of an EMP attack, prompting discussions regarding:

  • The frightening specifics about EMP
  • The societal impact of an EMP attack
  • Hour-by-hour, day-by-day, month-by-month details on the effect an EMP attack would have on a community
  • What, if anything, can be done to protect people and the country against an EMP attack?
  • If EMP is such a threat, why aren’t we preparing?
  • The serious threats facing America regarding physical and cyberattacks on our nation’s infrastructure

The publication of One Second After spawned a series that includes One Year AfterThe Final Day and the upcoming book, Five Years Later. A feature film based on One Second After is currently being developed.

“EMP is a byproduct of detonating a nuclear weapon,” Forstchen said in an interview. “If you detonate a weapon 200-250 miles above the center of the United States … the gamma ray burst when it hits the upper atmosphere starts a chain reaction. … By the time this hits the earth’s surface at the speed of light, it is a giant electrostatic discharge … it blows out the entire power grid of the United States and Canada. Game over.”

William R. Forstchen is a New York Times bestselling author and holds a doctoral degree from Purdue University with a specialization in military history and technology. He is a noted expert historian and public speaker and has been interviewed on FOX News, C-SPAN, and Coast to Coast on topics ranging from history to technology and cultural issues, to space technology development, to security threats.

The Benefits And Disruptions Of Blockchain Technology

It’s safe to say Blockchain technology has disrupted the internet in quite a dramatic fashion.

Despite only being invented about fourteen years ago, cryptocurrency has formed a world of its own and it is now estimated the market will hit well above a $1 trillion USD valuation from four years ago…..

Allowing transactions, alongside other things such as documents and invoices, to be sent across a P2P network, the technology has been praised for its advanced security and anonymity benefits.

The latest infographic crafted by Bitfortune looks into how many ways Blockchain technology impacted the world and various business industries, such as charities and banking.

In the world of cybersecurity, Blockchain can help reduce or eliminate fraud and errors, along with being a more accurate and confidential platform for industry professionals.

For example, REMME is a secure platform that has eliminated the need for passwords and instead uses Blockchain as a form of authentication.

In supply chain management, Blockchain is being used to reduce the number of errors and exposure to potential threats.

The technology also helps reduce time and increase efficiency – a win-win all around, really. FedEx recently announced plans for an internal Blockchain pilot program that will help solve customer disputes while IBM and Maersk are also working together on a new company that will use Blockchain within global shipping supply chains.

Take a look at the infographic below to learn how Blockchain is disrupting other industries around the world for the better and why it’s time to start thinking about how you can incorporate the technology into your lives.

For the Silo, Josh Wardini. 

16 Blockchain Disruptions Infographic

Supplemental- Why some traditional banks are broke: Fractional reserve banking.

Sci Fi Like Devices Part Of Queen’s Park Security Update

Canadian director James Cameron projected into the future for 1986's Aliens radar motion tracker. Now this tech seems to be ready for Queen's Park.
1986 film- Aliens radar motion tracker. Now this tech is ready for Queen’s Park.

Eight years ago at Queen’s Park, the Cross-Border Institute (CBI), part of the University of Windsor, hosted an event to demonstrate advances in security, surveillance and fingerprinting technology. That technology had immediate application for border crossing screening, supply chain security and cybersecurity.

The CBI hosted the event as part of its mandate to support ongoing, practical research aimed at addressing numerous cross-border issues with the United States. The CBI works in collaboration with a number of University of Windsor departments, private sector partners and organizations and all levels of government, looking at making land border crossings work better.  The technologies demonstrated represented a number of research projects and initiatives currently being conducted at the University of Windsor as part of its strategic focus related to understanding borders. These projects and activities were also supported by the Department of Research and Innovation at the University of Windsor.

Queen’s Park staff and members had a first-hand opportunity to see the work of Dr. Roman Maev’s high-speed biometrics ultrasonic system for 3-D fingerprint imaging. This system allows reconstruction of fingerprint patterns from deeper layers of skin while embedding the internal parameters of these deeper layers as key features of the fingerprints. Also on display was Dr. Sazzadur Chowdhury’s 77GHz short range radar. At the time- the smallest and thinnest in the world and economical enough to be carried by an individual for mobile motion detection or used in multiples in such large surveillance application as airports. Cue the Aliens movie soundtrack.  Both Drs. Maev and Chowdhury are members of the University of Windsor Faculty.

The University of Windsor has developed an area of expertise in technologies that can detect threats and violations, provide positive identification and secure the transfer of data. The projects all have practical security applications and are at or approaching the commercialization stage. All of these projects have received support from the Federal Development Corporation for Southern Ontario (FedDev Ontario) Prosperity Initiative Project 802390, which is administered by the Cross-Border Institute at the University of Windsor.

Quick Facts: The Cross-Border Institute at the University of Windsor was founded in 2008 under the direction of Dr.  Bill Anderson.  The Centre approaches the study of border issues from a multi-disciplinary perspective that includes economic development, geography, engineering, management science and political science.  The CBI has focused on initiatives, events and research that address ongoing challenges at land crossings between Canada and the United States. The CBI, as part of the University of Windsor, looks at the impact of trends in cross-border transportation and the impact of policy decisions by governments on both sides of the border. Currently, the CBI is working to launch Canada’s first university level certificate program in border management, Managing Borders and International Trade.

Technology Quick Facts:
Short Range Radar for Surveillance ApplicationsUWindsor engineering professor Dr. Chowdhury has developed the world’s smallest and thinnest short-range radar unit. Because it is inexpensive to build and completely weatherproof it can be used effectively in a variety of applications for motion detection, ranging from individual units attached to a soldiers uniform to arrays of units for border and perimeter surveillance.

High Speed Biometrics Ultrasonic System for 3D Fingerprint Imaging – World-renowned UWindsor physicist Dr. Maev has taken a new approach to fingerprinting using acoustic microscopy technology. This device generates far more detailed information from fingerprint images below the skin level, making it more accurate than conventional technologies, yet it is fast and practical.

Real Time Location System for Security and Indoor LocationBased on the novel indoor positioning method developed by Dr. Majid Ahmadi and Dr. Rashid Rashidzadeh at the University of Windsor, this system will identify, locate and track people in indoor environments. Its positioning algorithm takes advantage of various sensors on smartphones to improve positioning accuracy.

Automated Vehicle IdentificationCameras that can read license plate information are increasingly common. University of Windsor computer scientists Dr. Imran Ahmad and Dr. Boubakeur Boufama have taken this technology several steps farther, allowing the shape and colour of a car to be extracted from video feeds and stored in a database. This technology will be tested in the University of Windsor’s new parking structure in the Spring of 2015.

Data Encryption Using Graphical Processing Units (GPUs)Data encryption is an increasingly important function that normally requires the use of expensive add-on cards known as crypto-accelerators. UWindsor researcher, Dr. Roberto Muscedere has developed algorithms that make it possible to achieve the same kind of encryption using much cheaper GPU units typically found in laptop computers and game consoles.

Secure vehicle-to-vehicle (v2v) communicationsAdvanced vehicular communications technology has enabled such life-saving features as collision warning, collision avoidance and emergency vehicle signaling. However these systems may be vulnerable to cyber-attacks that threaten the privacy and safety of drivers and passengers. University of Windsor faculty researchers Dr. Mitra Mirhassani, Dr. Kemel Tepe and Dr. Wu and their students are working to fill security gaps in V2V systems.

Control, Monitoring and Surveillance in Wireless SystemsLarge scale power and communications systems, manufacturing and process control plants, networked building energy systems and others are increasingly controlled by autonomous, sensor-rich, wireless systems. Given the consequence of failure in these systems and the danger of cyber-attacks upon them, UWindsor researchers Dr. Mehrdad Saif, Dr. Rashid Rashidzadeh, Dr. Alavi and Dr. Razavi-Far are developing methods to detect intruders and faults early.

Sensor fusion for concealed weapons detectionConventional images are good for revealing a person’s identity, while infrared images can spot concealed weapons. But what if you want to both identify a person and know if they are concealing a weapon? A University of Windsor engineer, Dr. Jonathan Wu, has found a way to fuse information from different sensors to produce a clear image not only of a suspect’s appearance but also of any concealed weapon they are carrying. For the Silo, Jarrod Barker. 
Learn More: www.uwindsor.ca/crossborder

1 In 2 Canadians Always Accept Browser Cookies

Digital privacy expert explains why often accepting cookies poses cyber risks

According to new research commissioned by internet security company NordVPN, only 3.5% of Canadians never accept cookies. To make matters worse, a whopping 43% say they always accept cookies. While most HTTP cookies are safe, some can be used to track people without their consent. Even more, cookies can sometimes be spied upon or used to fake the identity of a user, to gain access to their account or use their identity to commit a crime.

 “HTTP cookies are vital to the internet, but they are also a vulnerability to people’s privacy. As a necessary part of web browsing, cookies help web developers to provide more personal, convenient website visits. Because of cookies, websites remember you, your logins, shopping carts, and even more. But they can also be a treasure trove of private information for criminals to spy on,” says Daniel Markuson, a digital privacy expert at NordVPN. 

What are cookies, and why are they a threat?

Also known as an HTTP cookie or browser cookie, a cookie is a piece of data that’s stored on your browser whenever you visit a website. When enabled, the website will remember your preferences and any small changes you made during your last visit.

Cookies are a normal and necessary part of the internet. Without them, you couldn’t log into a website or fill your online shopping cart. However, too many cookies can become a threat to both your security and privacy.  

“People need to be aware that cookies follow you online. Even if you hide your IP address with a VPN, cookies can track what you do online and form a partial ID of who you are. Moreover, third parties can sell your cookies. Some sites earn revenue by serving third-party cookies. These aren’t functional – their purpose is to turn a profit from your data. Also, cookies are a vulnerability. With the wrong browser settings or when visiting the wrong website, cookies can introduce security vulnerabilities to your browsing experience,” says Daniel Markuson, a digital privacy expert.

68.5% of Canadians feel that their online data is used for targeted ads

Research shows that Canadians feel the consequences of collected cookies:

  • 68.5% feel that their online data is used for targeted ads;
  • 66% feel that it’s being sold to other companies.
  • Moreover, 57% and 53% respectively believe that their ​​data is analyzed by websites for their internal use and that it’s used by social media platforms for people to find the most relevant information 

“Canadians must be pretty aware of the constant pop-up requesting them to ‘Accept all cookies?’ while visiting online websites. It happens in order to comply with data privacy laws, which were designed to protect users’ personal information and force companies to state what kind of data is being collected and how it is being used,” says Daniel Markuson.  

How to stop cookies from tracking you

There are plenty of tools and tips to make your online activity more private. 

“First, navigate to your browser’s settings and choose to delete all the cookies stored in your browser. Most browsers also offer features to block unnecessary cookies automatically.  Second, use incognito mode. While incognito mode does not equal privacy, this is exactly what it was made for — setting aside a single browsing session that won’t save cookies and your history.

On a related note concerning personal data- The Public Health Agency of Canada (PHAC) tracked 33 million Canadians via their mobile devices to “monitor lockdowns” during to coronavirus pandemic. Privacy advocates said they were concerned about the data tracking.

Finally, use a VPN. One of a VPN’s core features is to hide your IP address, which is critical if you want your online searches to stay private. You can also look at installing various types of tracker blocker programs. That means that third-party cookies won’t be able to gather data about people’s browsing habits and create a detailed profile on you.

Methodology: The survey was commissioned by NordVPN and conducted by the external company Cint on October 4-12, 2021. The survey’s target group was residents of France, the USA, Canada, Australia, Germany, Spain, the Netherlands, and Poland aged 18+ (nationally representative), and the sample was taken from national internet users. Quotas were placed on age, gender, and place of residence. 7800 people were surveyed in total, made up of 800 people from Spain and 1000 people from each of the remaining countries.

Top sites data breached last year include linkedin

Almost 6 billion accounts affected in data breaches in 2021 

The year 2021 was record-breaking in terms of the sheer size of data breaches. According to the data collected and analyzed by the Atlas VPN team, 5.9 billion accounts were affected by data breaches throughout 2021. 

Atlas VPN has retrieved and calculated the numbers of breached accounts based on multiple publicly available sources. The total count includes worldwide data breaches that took place from January 1st, 2021, to December 31st, 2021. 

Image

February saw the biggest data breach of all-time  COMB, or in other words, the Compilation of Many Breaches, which is responsible for the leak of a whopping 3.2 billion unique cleartext email and password combinations.

The breach was named this way because it is not a result of a single hack of a specific organization but rather combines leaked data from a number of different breaches spanning five years, including Netflix, LinkedIn, and others.

The breached data was first offered for sale on RaidForums, an underground database sharing and marketplace forum, for just $2 in February. Other breaches that made it to the top five biggest data leaks of 2021 include LinkedIn (700 million people), Facebook (533 million people), Brazil’s Ministry of Health (220 million people), and SocialArks (214 million people). 

Cybersecurity writer and researcher at Atlas VPN Ruta Cizinauskaite shares her thoughts on 2021 data breach trends: “Even with data breaches becoming a growing threat, it seems organizations are still not putting enough effort in protecting the personal information of their users. One of the first things every organization should do is evaluate the amount of sensitive user data it collects — the less sensitive data is stored, the lesser the risk of it being leaked.”

Minecraft is most malware infected game

228k Users Affected, Are You One Of Them?

As people are looking for ways to unwind at home, the gaming industry has been one of the primary places people set their eyes on. Not only is it a way to entertain yourself for hours on end, but it is also a place for people to connect, which is otherwise hard to do during the pandemic. 

According to data presented by the Atlas VPN team, 303,827 individuals’ devices were affected by gaming-related malware and unwanted software between July 1, 2020, and June 30, 2021. Mobile games are also a major threat for gamers.

As many as 50,644 users attempted to download 10,488 unique files disguised as the ten most-played mobile games, generating a total of 332,570 detections. Minecraft was by far the most popular game on both PC and mobile platforms for dangerous app distributors to hide behind. On PC, nearly 185 thousand users were affected with over 3 million malware and unwanted software detections.

On mobile, the number of victims exceeds 44 thousand for the period.

Unwanted software includes files like adware, spyware, and so on. There are various versions of Minecraft and a plethora of mods (modifications that may be placed on top of the basic game to diversify gameplay) may account for its enormous popularity. Because mods are unofficial and developed by users, they can be used to hide dangerous payloads or undesirable software. 

Security tips for gamers

  • Protect your accounts with two-factor authentication (2-FA) whenever possible. 
  • Use strong passwords for your accounts, with a different one for each. That way, even if one of your accounts is compromised, the remainder will remain unaffected.
  • Downloading games from official retailers such as Steam, Apple App Store, Google Play, or Amazon Appstore is safer. These marketplaces aren’t completely safe, but they are at least examined by store staff, and there is some sort of screening procedure in place: not every app is allowed into these stores.
  • If you want to buy a game that isn’t accessible in major stores, you should do it through the official website. Make sure to double-check the website’s URL to avoid impostor sites.
  • Be cautious of phishing campaigns and unfamiliar players. If you are unsure about the sender, do not open links you receive via email or in a gaming chat. Do not open files sent to you by strangers.

Another one of the most well-known game titles worldwide, The Sims 4, was the second most often used title to distribute unwanted files. Over 43 thousand users were impacted, with detections closing in on 1.3 million.  For the Silo, Valentina Perez.

Ecommerce Is Evolving And Here’s How

Thanks to the digital technology, we can carry out commercial transactions online. We can buy and sell items or services, pay bills, make orders, and so much more.

Online enterprises are heavily relying on this commodity. This is why we have numerous  online businesses nowadays.

The infographic below from Subscriptionly will inform you about the current and future tech trends that will influence the ecommerce sector. Some of the main trends are as follows.

Personalized Experience

Technology has enabled online businesses to give their customers personalized shopping experiences. For e-shoppers, this has engendered an engaging and satisfying shopping experience.

Businesses recorded an increase in revenue by employing this concept, since 48% of customers spend more when their experience is personalized.

Automated Customer Service

AI has transformed the way customer queries and complaints are attended to. Consumers now have their issues promptly resolved. It was reported that, this year, AI handled 45% of customer queries on its own. And it does this swiftly and effectively, which is definitely a factor that makes customer support a positive experience.

Excellent customer service is essential to building customer loyalty. In fact, 42% of customers buy more when they are served properly.

It is projected that, by 2020, AI will handle 85% of customer interactions.

Cryptocurrency

Soon, commercial transactions will be carried out with cryptocurrency. Via the use of cryptocurrency (such as Bitcoin), customers will get to make secure payments quickly and conveniently.

Also, businesses that add cryptocurrency as a payment method will make better sales. One retail outfit did and in 5 months, it generated $2million alternative currency sales and a 60% boost in new customers.

Drone Delivery

In the nearest future, e-shoppers will possibly have their purchased items delivered the same day. When this become reality, customers will be happier and businesses will undergo a rise in brand awareness and sales. The 72% of shoppers stated they would shop and spend more if same day delivery was available.

A method that is being considered to initiate same day delivery is the drone delivery. DHL tried it and recorded a 70% improvement in first-attempt deliveries, and a 90% success in resolution of customers’ critical cases. When popularized, 40% of parcels will be drone-delivered in 2 hours by 2028. For the Silo, Josh Wardini.

Future of eCommerce Infographic

Protect Your Belongings With Self Storage

A person standing in front of a box

Description automatically generated

People often store their belongings because they want to use them at a later time. However, keeping your items in your garage, crawlspace, or any other makeshift storage areas in your home can compromise your belongings and your overall organization and indoor air quality. 

Instead of turning your home into a storage facility, consider saving space and protecting your items by keeping them in a self-storage unit. This option is a much better alternative to storing your items at your home in a shed or garage. 

When you store your items outside, you have no control over the rising and dropping temperature. You won’t even know how these temperatures impact your belongings until you reach for something, and it’s not working anymore. 

The good news is that there are many spacious, climate controlled storage units in Canada available so that you can store your belongings without compromising them or your space. Consider how keeping your items in a self-storage unit can not only benefit you but benefit your belongings. 

Store Items in a Controlled Climate  

When you store your items outside in your garage or shed, you can’t regulate the storage temperature. Keep your things in a climate-controlled self-storage facility so that you can have peace of mind knowing that they are being stored at regulated temperatures.  

You’d be surprised how many things you need to store in a cool area. Climate control plays an essential role in protecting your belongings like artwork, electronics, paperwork, and furniture, which can be compromised by humid or freezing temperatures. Properly storing your belongings in a space with regulated temperature can also help to extend their overall lifespan.  

A large brick building with a tiled floor

Description automatically generated

Create More Space & Improve Air Quality  

Clutter is not just an eyesore. Storing your items close together can cause them to scratch and damage one another. Even more importantly, packing items so close together can impact the air quality of a space, which can compromise your belongings’ integrity.  

When items are packed together in a small area, there is no air-flow. Poor ventilation causes humidity, moisture build-up, and condensation. All of which can damage electronic items internally and the external surfaces of furniture.  

Cluttered furniture, appliances, and other devices can also trap and hold dust. This dust can build on your furniture and trigger allergies in those living in the space. Like humans, our belongings need space to thrive. 

Protect Items During a Renovation 

Home renovations are exciting, but the dirt, dust, and contractors in and out of your house are often overwhelming. When you are doing a home renovation project, protect your existing belongings by storing them in self-storage. 

This way, you can protect your things from dirt and dust build-up and prevent damage from tools, fallen objects, and movement. You move around furniture so much during a renovation that it is better to move the furniture out of the way entirely. Utilizing self-storage to store items will also help create more space for you and your contractors to work.  

Maintain Security & Privacy  

Maintain the privacy of your items while you are protecting them from wear and tear. Your self-storage unit should offer security to ensure that your items are adequately protected and can only be accessed by you. 

Choose a storage facility with state-of-the-art security features like passcodes and durable locks that can ensure your belongings’ safeguarding.  For the Silo, Mila Urosevic.

How Canada Influenced American Civil War

This August we saw the fifth U.S. Civil War re-enactment at Circle G Ranch, east of Cayuga, Ontario. On Sept. 13, re-enactors of the ‘Blue and Grey’ will go to battle in Otterville.

The American Civil War had a tremendous influence on the British North American colonies, and continues to be of mind.

At onset of the Civil War, Canada did not yet exist as a federated nation. When the war broke out in 1861, Canada was still a subject of Great Britain and had maintained an uneasy peace with its American neighbors since the War of 1812.

William Seward, the American Secretary of State during the Civil War, was an annexationist who felt that British North America was destined to become part of the United States. As it became obvious that the North would emerge victorious there was a fear the Union army would turn its eyes north of the border.

Many in the US government were supporters of Manifest Destiny, an ideology that stated America should conquer the continent. Canadians were concerned about the possibility of a US invasion.

The tensions between the United States and Britain, which had been ignited by the war and made worse by the Fenian Raids, led to concern for the security and independence of the colonies, helping to consolidate momentum for Canadian confederation.

In the election of 1864, the Republican Party used annexation as a means to gain support from Irish Americans and the land-hungry.

In 1866, an annexation bill passed in the US House of Representatives stating the United States acquire all of what is now Canada.

The Underground Railway- major sites in Ontario,Canada.

The Civil War also had an important effect on discussions concerning the nature of the emerging federation. Many Fathers of Confederation concluded the secessionist war was caused by too much power being given to the states, and thus resolved to create a more centralized federation. It was also believed that too much democracy was a contributing factor and the Canadian system was thus equipped with checks and balances such as the appointed Senate and the power of the British-appointed governor-general.

The guiding principles of the legislation which created Canada, the British North American Act, were peace, order and good government – in stark contrast to the perceived rugged individualism of the neighbours south of the border.

Since 1793, thanks to then Lieutenant-Governor John Graves Simcoe, Upper Canada – now present day Ontario – had banned the importation of slaves.
Canadians were largely opposed to slavery, and Canada had recently become the destination of the Underground Railroad.

The Underground Railway was a network of safe houses and individuals who helped runaway slaves reach free sates in the American North or in Canada.

It ran from about 1840 to 1860. It was most effective after the passage of the Fugitive Slave Act in 1850, which enabled slave hunters to pursue runaways onto free soil. It is estimated that about 30,000 reached Canada. Several communities were established in Ontario, including one east of Cayuga, at Canfield.

The Civil War claimed 7,000 Canadians and almost 620,000 US lives.

Between 33,000 and 55,000 men from British North America served in the Union army, and a few hundred in the Confederate army. Five served as generals, and 29 received the U.S. Medal of Honour. For the Silo, Toby Barrett MPP Haldimand-Norfolk.

VisaNet Connects Two And A Half Billion Credit Cards

One of the many ways the Internet is driving the global economy is through digital payments, making it easy for consumers to buy just about anything from anywhere. VisaNet is the largest payment processing network in the world, connecting 2.4 billion credit cards at 36 million locations across 200 countries.

World Agencies Are Eradicating Car Hacking

With Cars becoming more like smartphones nowadays, we thought we’d take a look at the growing concern of Car hacking, a phenomenon that’s sending chill up motorists’ and manufacturers’ spines across the globe, more efficiently than any air-conditioning unit could ever do.

However, perhaps even more importantly, we’ll tell you what the world’s governing agencies are doing to help eradicate car hacking and what YOU can do to prevent your car from being hacked. For the Silo, Louis S. Dixon and our friends at Select Car Leasing UK.

who discovered car hacking infographic

Portable Motion Activated Camera Replaces Peep Holes

MAC200 Home Security Camera Time LapseThe PHV MAC is an ‘electronic peephole’ for your home security that takes images of anyone or anything that is out front.

Its ambient light sensor allows images to be taken up to 30 inches from the door. This battery-powered device features an LCD screen on the inside of the door to display the photos, which stores still shots as well as video on a Micro SD card and includes dates and times of when the sensor was activated. The batteries inside last for 9,000 triggers, and can be powered for a little more than 6 months. The playback feature allows you to view a time-lapsed video with all images with one press of a button.

The MAC 200 can function as a separate security camera for your home. The portable, motion-activated camera can store up to 14 months of images. You can watch over 8 hours of images with a condensed, time-lapsed 1 minute video. There are three capture modes you can choose from: motion-activated, time lapse capturing, and a hybrid mode that includes both. Activity can be set to sense anywhere between 20 feet to 320 feet between the three different modes.

 

The view from your door, inside your home.
The view from your door, inside your home.

 

 

Click to support this Canadian Sound Artist

Current State of Cybersecurity Doesn’t Work

“You pay your money, as the saying goes, and you take your chances.” says Falkowitz, CEO of Area 1 Security. “More and more these days, it seems like this ‘policy’ is the rule rather than the exception, in everything from health care insurance to the commuter parking lot. Even though you’ve paid for the product or service, no one’s really responsible for some reason when you suffer damages while consuming whatever it is you bought. Or worse yet, you somehow find that whatever you bought doesn’t really do what you bought it for. And there’s an asterisk somewhere in the fine print to explain why. Unfortunately, nowhere is this more prevalent than in today’s cybersecurity industry.”

Despite the billions spent on cybersecurity we continue to suffer the most debilitating and expensive breaches imaginable, and some that cannot be imagined under any circumstances. Yet experts predict the worst is still to come. Cybercrime has moved from data theft and website defacement to a trajectory that includes data manipulation, data loss and eventually, if something is not done to change the economics of being a bad guy on the internet, threats to the stability of society itself.

“Cybersecurity companies seem to be content to collect their millions with the caveat that they can’t really offer protection in exchange,” continues Falkowitz. “Their customers likewise collect mountains of data on their customers and are appropriately contrite when that data is stolen or misused but the apology is not accompanied by compensation. Even the government can’t protect itself, or its citizens even if they’re attacked by another nation-state.”

Phishing

The excuses and the explanations are familiar: Cybersecurity is too complicated. Hackers are too clever. Attacks are unprecedented.

“Nonsense. Every bit of it.” says Falkowitz. “Cybersecurity is no more complicated than hundreds of other things we do routinely, from sending astronauts into space or open heart surgery. Hackers are human, just more persistent about how to fool the rest of us. And attacks are based on the same tried and true methods—phishing—they’ve been using for decades.”

Oren J. Falkowitz is the co-founder and CEO of Silicon Valley’s Area 1 Security. Oren held senior positions at the NSA and United States Cyber Command (USCYBERCOM) where he focused on Computer Network Operations & Big Data and is a predominant cybersecurity industry thought-leader committed to keeping high-level national security conversations relevant.  For the Silo, by Jennifer Vickery. 

Supplemental- What exactly is phishing?

What Single People Need to Do Before Buying A Home

The usual route to home ownership tends to start with meeting a special someone. When you’re a couple and you want to begin a life together, it makes more sense to get a new home for yourself. You may plan to get a roomier home for the two of you, and especially if kids are part of your plan in the foreseeable future.

What if you’re single? That doesn’t mean that you can’t get a house in Montreal, or a condo in NDG (Notre-Dame-de-Grâce) or anywhere else in Canada. Here are some tips that can help if you’re single and determined to buy your own home:

  1. Get your finances in order. This is the first and most important rule, as money will always be an issue for you especially since you don’t have a partner to share the expenses. It can be problematic to get a mortgage when you’re single since you’re less likely to repay a loan than two people together who both work for a living. So, pay off your credit card debts, raise your credit score, finish paying for your car, and have enough money to put down 20% of the house price as down payment.
  2. Have lots of money in the bank. What if you lose your job right after moving into your own home? You’ll need money for all your expenses while you search for a new job. You need some money in your bank account that’s equal to three to six times your monthly wages. Keep in mind that as a homeowner you have to pay for your home’s upkeep along with home insurance and property taxes. 
  3. Make sure to account for all your possible expenses. First-time owners are often unpleasantly surprised when they encounter expenses that they don’t normally deal with when they were apartment tenants. Home ownership can be very costly, especially when you have to remodel your home. It’s also difficult to estimate what you’d have to spend, especially when you have a backyard to maintain.
  4. See if a condo makes more sense for you. In general, a condo unit makes a lot more sense than an actual house if you’re still single. A condo will probably be located closer to where you work. It’ll also be located right in the middle of the city you’re in, so entertainment establishments are conveniently nearer. A condo building can have amenities that you’ll appreciate when they’re nearby, such as a gym or a salon. It also provides you with more social opportunities to meet new people so that you’re no longer single (if that’s what you want, of course).
  5. Be conscious about security. Security is another reason why condos work best for singles as they usually have guards in the lobby to keep out strangers. If you’re living in your own house, you may want to put in a strong lock on your doors and perhaps on your gate. You should make friends with your neighbours, who can call the police when they see strangers in your home when you’re not there. A security camera tied into your smartphone can help as well, though a dog can also be useful.
  6. Look for houses with a friend. Couples have the advantage of having someone to discuss their home options so that they’re more certain of their choices. If you’re looking for possible homes to buy, make sure you call a friend to come along. They can help you think logically so your emotions don’t get the best of you.

Of course, one “side effect” of having your own home when you’re single is that you generally become more attractive to potential partners. Just make sure you buy the right home when you can actually afford it, so you can actually enjoy your new status as a homeowner. For the Silo, Dimitry Karloff. 

Visionect And Heckler Design Collab On JOAN Digital Office Displays

November 2017—Phoenix, Arizona | Visionect, the maker of the award-winning JOAN meeting room scheduling solutions, has joined forces with Heckler Design, the creator of commercial-grade products for design-conscious consumers and businesses, to create a custom wall mount for JOAN. The powder-coated steel VESA bracket fixes the 6-inch JOAN digital office devices securely into place without distracting from their seamless look and feel for the perfect combination of quiet design and heightened safety.

JOAN from Visionect is a simple, easy-to-use device that helps organize and reserve meeting room spaces, displaying real-time meeting information outside of meeting rooms and eliminating confusion, meeting interruptions and double bookings.

JOAN Digital Office scheduling display

 

Previously, the cordless JOAN displays, ranging in size from 6 to 13 inches in diagonal, could be installed  with the Magnetic Mount adhesive strip located at the back of each device. This allowed for effortless installation on any surface, even glass, brick or steel, all without drilling or expensive wiring.

Furthering the high functionality and effortless design of the JOAN product line, Visionect has now teamed up with Heckler Design, the makers of commercial-grade products for design-conscious consumers and businesses, in order to create a wall mount for JOAN, offering an additional, more secure mounting option for the room booking solution.
Created by Visionect after a decade of market-leading expertise in building energy-efficient digital signs, JOAN was developed in close collaboration with its early users, from small businesses to Fortune 500 companies.

The result of this customer-influenced approach is a device that features a battery life of up to 12 weeks and combines the elegance of electronic paper with an intuitive, quiet design that won the CES Innovation Award for eco-design as well as the Red Dot Design Award, the highest distinction for design quality.

JOAN digital office display mount bracket

Laser cut from powder-coated steel, the new JOAN Secure Wall Mount offers an additional installation option for the 6-inch JOAN Manager and JOAN Executive devices, fixing them safely into place and preventing unauthorised removal. The minimalistic wall mount is a custom-built anti-theft VESA bracket that can also be attached via a Double-Sided Adhesive Pad, and represents the perfect blend of quiet elegance and enhanced security.

The Secure Wall Mount continues the tradition of effortless JOAN installation and can be attached to all surfaces, easily.



Fixing the Mount on drywall is a matter of installing the drywall anchor screws, while installation on glass is enabled with the use of a Double-Sided Adhesive Pad that the Secure Wall Mount is adhered to. A special locking bracket then fixes JOAN into place and prevents anyone from detaching it.

“With JOAN, the Visionect team has created a desirable and elegant meeting room scheduling solution. We designed the JOAN Secure Wall Mount to reduce the temptation and likelihood of theft while carefully maintaining the beautiful aesthetics of the JOAN hardware,” commented Dean Heckler, CEO and Head Designer of Heckler Design. “We can’t wait to see how enterprise and institutions will benefit from this complete solution.”

About Visionect | Visionect is the world leader in deploying digital signs in environments impossible before, setting a new standard in versatile, energy-efficient displays. The result of a decade of market-leading expertise, Visionect technology is unparalleled in versatility, ultra-low power consumption, ease of installation and simplicity of use. The force behind the breakthrough Place & Play signage concept and the maker of the award-winning JOAN room scheduling solutions.|

About Heckler Design | Heckler Design, known for its renowned OneLessDesk and WindFall Stand, creates beautifully simple, commercial-grade products for design-conscious consumers and businesses. Heckler Design’s products currently include office furniture, desk accessories, secure iPad stands, and point-of-sale hardware. Founded in 2007 and headquartered in Phoenix, Ariz., all of Heckler Design’s products are made in America. |

About JOAN | JOAN is a simple, easy-to-use device that helps organize and reserve meeting room space. It shows meeting information, the meetings coming up and eliminates meeting interruptions by clearly signalling the room is occupied and until when. It is a cost-effective meeting room solution which helps modern, busy workplaces be more productive. |

Read Here- Putin “Bilateralism” Christmas Letter To Trump

Statement from President-Elect Donald J. Trump 
(Palm Beach, FL) – President-elect Donald J. Trump released the following statement in response to the attached letter from Russian President Vladimir Putin.

“A very nice letter from Vladimir Putin; his thoughts are so correct. I hope both sides are able to live up to these thoughts, and we do not have to travel an alternate path.”

christmas letter to trump from putin2016bannerClick on the hyperlink above to read the full letter.

Celebrity Homes: Casino King’s Las Vegas Mansion Going To Auction

“Las Vegas Primm Ranch”…….Michael Jackson called it “Wonderland” and his daughter said it was “Candyland.” The 10-acre compound in a Las Vegas neighborhood of casino owners, entertainers and royalty (Wayne Newton lives nearby and the Sultan of Brunei was a neighbor) was designed to be a secure and safe haven for a family, a memorable experience for their guests and a place to safely enjoy their expensive hobbies. This was its appeal to Michael Jackson, who had sights on a Las Vegas residency show and, according to Las Vegas media, had toured the home several times. Jackson was planning on making an offer on the home when he returned from his “This Is It” London residency show scheduled to run through early 2010. However, Michael died just three weeks before the start of the tour.

Completed in 1994 for Nevada casino and resort developer Gary Primm, the compound was designed for luxury, but security was Primm’s biggest concern. Primm is a big-game hunter and car collector including the “Bonnie and Clyde Death Car” that he has displayed at several of his casinos. The home was completed soon after Las Vegas casino developer Steve Wynn’s daughter was kidnapped from the kitchen of their Las Vegas home. Primm was worried about the safety of his own two children and designed the home with a 10-foot wall surrounding the property and three gates that can be controlled by the owner, eliminating the need for round-the-clock guards who might be bought off by a rival. Throughout are security tunnels, bulletproof doors, secret rooms with entries disguised as walls or cabinets and a panic room with an oxygen supply and separate underground phone lines.

The Primm Ranch includes a main estate house with 15,000 square feet, a guest villa, grotto villa, staff quarters, horse trainer quarters, equestrian barn, arena, pens and pastures, a dog villa, grotto pool with spa, waterfall and slide, all surrounded by lush lawns and palms. There is also a garage/car showroom that will house 20 cars with its own gas station for diesel and unleaded fuels, a car wash with deionized water and mechanic’s lift. With a total living area of over 21,000 square feet, there are 10 bedrooms and 19 baths. Highlights include a beauty salon, trophy room with recorded animal sounds, driving range, 5,000-bottle wine cellar, theater, casino room, gym and sauna. The grounds include a greenhouse, outdoor kitchen adjacent to the pool with a bar and guest suite accessed under the waterfall, and a tennis court. Equestrian facilities include stalls for ten horses with training and riding areas. According to the estate’s listing agent, Jackson planned on converting the home’s underground shooting range into a recording studio.

Currently listed at $14.5 million USD, Primm Ranch will go up for auction on October 10th with no reserve. The auction company handling the sale is Concierge Auctions of New York City.

Real estate is never boring at TopTenRealEstateDeals. Check out today’s most entertaining, important and unusual real estate news stories of the week. News such as “Florida Foreclosure King Losing Home,” “Burt Reynolds Finally Sells Florida Home,” and “Exotic Islands For Sale.”

Canada’s New ePassport Contains Biometric Chip?

Canada states that new ePassports do not contain biometric data but the ICAO (see supplemental) set standards for passports internationally and do require biometric data. “..1.3 ICAO’s adoption of a blueprint for Biometric ID in MRTDs in May 2003, after extensive
work undertaken since 1997, represents an important step forward in machine- assisted identity
confirmation. This involved the selection of facial recognition as the globally interoperable biometric
FAL/12-WP/83 – 2 –
technology, in combination with contactless IC chips for data storage in a logical data structure (LDS),
using a modified public key infrastructure (PKI) scheme to prevent unauthorized alteration…” from http://www.icao.int/Meetings/FAL12/Documents/fal12wp083_en.pdf

Gatineau, Québec, October 26, 2012 – Foreign Affairs Minister John Baird today announced that Canada’s new ePassport will be full of iconic images that will make Canadian passports more attractive and more secure.

“The new ePassport will be more reflective and representative of who we are as Canadians,” said Baird during an event at the newly renamed Canadian Museum of History. “These images showcase Canada’s history and the building of our great nation while adding essential new security features for the 21st Century.”

The new images will also serve to keep the Canadian passport one of the world’s most secure travel documents. The complexity of the images is – first and foremost – a security feature that makes the passport more difficult to counterfeit.

“Our government is tremendously proud of Canada’s rich history. We urge all Canadians to learn more about the events and people that shaped Canada and the great sacrifices made to secure our freedom,” added Baird.

A look at the inside of the new Canadian ePassports image courtesy of ppt.gc.ca

Countries around the world review their passport designs and security features periodically to stay steps ahead of counterfeiters. The new-look ePassport will help facilitate legitimate trade and safe, secure travel which, in turn, helps create jobs, growth and long-term prosperity for Canadians.

The first 5-year ePassports will be issued in select locations during the first quarter of 2013. Production will ramp up through the spring resulting in the full availability of both a 5- and 10- year ePassport in early summer.

For a look at [ more of ] the images included in the new ePassport, please visit the new section on Passport Canada’s website, which features images and descriptions of the new passport design: www.pptc.gc.ca/eppt/photos.aspx?lang=eng.

Supplemental- International Civil Aviation Organization sets standards for ePassports. Standards require biometric data

Canada follows UK 2010 lead with new ePassport http://www.homeoffice.gov.uk/media-centre/press-releases/new-uk-passport-unveiled

UK ePassports do contain biometric data: http://news.bbc.co.uk/2/hi/uk_news/4776562.stm

Toronto Star reports that the new Canadian ePassports will no longer be made in Canada but will be subcontracted to a Netherlands firm