14th Feb Happy Valentines Day 2018 Wishes Love Quotes with Images Sayings Wallpapers Sad Messages Poems Songs for bf gf husband wife
tech new of all gadgets, iphone, apple other latest
Target released its own mobile payments system today, called Wallet, which will live inside its app on iOS and Android. Reports of Target working on an in-house mobile wallet surfaced as early as 2015. Target confirmed the reports this past January to The Verge’s sister site Recode.
The feature works like this: you open Wallet inside a Target store, scan any coupon barcodes, and then scan your Wallet barcode at the register to pay with your REDcard (which you upload beforehand). Currently, you must have a REDcard — which are Target-branded credit or debit cards with special offers — if you want to use the Wallet feature, but the feature will eventually roll out to non-cardholders. Target gift cards can’t be used with Wallet yet.
Target reportedly tested how long it took to check out with the app compared to checking out at a kiosk or with a cashier. The company found checkout with the app to be up to four times faster than other methods.
You could already use Apple Pay with the Target app on iOS as a payment option, so this new service appears to mainly be a promotion of Target’s REDcard.
Hackers who booby-trapped widely used security software also used their malware to infiltrate machines at tech firms, suggests analysis.
Evidence that other companies had been compromised came to light as Cisco researchers probed how attackers got at the popular CCleaner programme.
Millions of people downloaded a Windows version that hackers had laced with malicious code.
Cisco said the attackers were seeking valuable intellectual property.
Last week CCleaner creator Piriform revealed that attackers had managed to place a hijacked copy of version 5.33 that works on Windows on some download servers. The booby-trapped code was available for about a month between August and September,
Millions of people downloaded the compromised version of CCleaner but damage was limited because whoever created it had not updated it to include elements that could scan machines and steal data.
However, Cisco said its analysis suggested that attackers had taken that extra step on machines at tech firms they had managed to infiltrate.
Hi-tech giants including Cisco, Intel, Google, Samsung and Microsoft were among the 20 or so companies believed to have been hit in this way.
“These new findings raise our level of concern about these events, as elements of our research point towards a possible unknown, sophisticated actor,” wrote the Cisco researchers.
Cisco said it was likely that a lot of other firms had been hit by whoever was behind the sophisticated and wide-ranging attack.
It recommended that anyone cleaning up after finding they had been compromised restore machines from backup as it was not clear what other code the attackers had installed on those computers. It said it was still analysing the code to find out exactly what it did.
Cisco said it was not yet clear who carried out the sophisticated attack on CCleaner and the other technology firms.
Hackers who compromised a US aerospace organisation were working on behalf of the Iranian government, according to researchers.
The cyber-espionage group, known as APT 33, has been targeting multiple companies with aviation-related partnerships with Saudi Arabia, according to an intelligence report by cybersecurity firm FireEye.
The group could be looking for insights on Saudi Arabia’s military aviation capabilities to enhance Iran’s domestic capabilities or for intelligence to support its military and strategic decision making.
Organisations in the aerospace and petrochemical industries in the US, Saudia Arabia and South Korea have been targeted by the group.
While the attacks carried out against those organisations were similar enough to be attributed to the same group, the identity of the group had not been established until now.
“One of the things we see with intelligence organisations worldwide is their obfuscation tactics, so there’s almost never perfect confidence, but we’ve seen a lot of clues that this is Iranian,” FireEye’s John Hultquist told Sky News.
Aside from the technical relationship between APT 33’s code – which included Farsi language artefacts -the time of the hacking activities also corresponded with the Iranian working week, Saturday to Wednesday.
But the biggest clue, according to FireEye, were the targets that the hackers had been going after.
“It’s like the Chinese government may have the most technically sophisticated team out there hacking, but the moment they start targeting Tibetans we have a pretty good idea who we’re looking at,” said Mr Hultquist.
Iran has spoken out about Saudi Arabia’s armament, accusing the US of selling weapons to “dangerous terrorists” when President Trump visited in May.
While APT 33 has mainly focused on cyber-espionage at the moment – ultimately considered an expected and acceptable state activity – it has also been connected to the destructive malware.
“They could become a much more serious risk if geopolitics shift. If the Iranians become more aggressive their mission could change overnight,” said FireEye’s expert.
Last year, seven hackers allegedly tied to the Iranian government were charged with attacks on a small dam outside of New York City and dozens of banks.
A proposal from Theresa May for internet companies to remove online extremist content within two hours of it being posted has been criticised as “unreasonable” by experts.
The Prime Minister is to broach the subject of online terrorist propaganda in her keynote speech to the United Nations General Assembly in New York on Wednesday.
May, who has previously accused big internet companies of giving terrorist ideology “the safe space it needs to breed”, is joining with France and Italy in demanding that technology companies go “further and faster”.
Currently tech companies use a combination of thousands of researchers, called labellers, and a technology called machine learning to help flag and then remove illegal or extremist content.
But a number of experts in artificial intelligence and machine learning have cast doubt on May’s takedown target.
University of Cambridge professor Zoubin Ghahramani called the current system “challenging”.
“Although I am sure the current algorithms can be improved and made faster,” he told HuffPost UK, “It’s unreasonable to expect that they will be able to remove all such content within a few hours.”
Despite tech companies hiring thousands of content labellers, politicians have continued to call on artificial intelligence and machine learning to provide a more robust solution to the problem.
However machine learning expert Shimon Whiteson from Oxford University is not convinced that artificial intelligence is the only solution to the problem.
“The ability of computers to understand natural language content remains quite limited.” he says. “So I am skeptical that any tech company can reliably identify extremist content in an automatic way, regardless of how much time they have to do it.
“In addition, any automatic filter they put in place can probably be quickly foiled by those determined to evade it.”
Humans will still provide part of the answer, according UCL’s Dr Emine Yilmaz, who believes a combination of using both machine learning and trained experts could help tech companies reach the two hour target.
“I think that with the current technology it is doable,” she says. “Not right away as it would take us some time. Right now the algorithms are smart enough and capable of doing really interesting tasks with high accuracy.
“I would expect them to make some errors, and this is a problem where recall is very important because you wouldn’t want to miss any content, so your algorithm should identify all content.”
She believes the biggest hurdle to overcome in meeting this target is creating a system that combines both speed and accuracy.
“The main bottleneck here is the checking,” she says. “Making sure that machine learning is not making big errors.”
To do this, companies will need to hire even more human experts who can double-check the decisions being made by machine learning algorithms.
Earlier this week a leading think tank argued that companies like Google, Facebook and Twitter should be fined if they fail to remove extremist, terrorist content, warning their progress in in stopping it has been “glacial”.
Policy Exchange said a regulator should have the power to punish the UK subsidiaries of tech giants, just as Ofcom can fine broadcasters, that inadvertently host terrorist messages like propaganda and instructions on how to carry out attacks.
Policy Exchange’s report follows the Parsons Green attack last week, when an improvised explosive device was set off on a packed rush hour train. The device was reportedly built with help from online instructions.