Experts Say 'Emotion Recognition' Lacks Scientific Foundation

Experts Say 'Emotion Recognition' Lacks Scientific Foundation

“The topic of facial expressions of emotion — whether they’re universal, whether you can look at someone’s face and read emotion in their face — is a topic of great contention that scientists have been debating for at least 100 years,” Lisa Feldman Barrett, Professor of Psychology at Northeastern University and an expert on emotion, told me.

Upgrade Readiness

Upgrade Readiness

Upgrade Readiness is a feature in Windows that according to [1], "collects system, application, and driver data for analysis. It can collect "detailed computer and application inventory" and "guidance and insights into application and driver compatibility issues, with suggested fixes".

When AI-enhanced customer service is on the line, so is your privacy

When AI-enhanced customer service is on the line, so is your privacy

Another feature that a unified pool of messaging data makes possible is “sentiment analysis”, to provide human agents with the context they need to personalize future customer interactions.

App Analysis: Nimses

App Analysis: Nimses

PewDiePie noticed this outcry and came back to ensure his users that the application was not a scam, that the app collects a similar amount of data as other social media applications, and that his fans are spreading "misinformation".

Should Police Facial Recognition Be Banned?

Should Police Facial Recognition Be Banned?

While San Francisco officials ponder a ban we should consider if there are policies that could allow for police to use facial recognition without putting our civil liberties at risk or if the potential for abuse is so great that it warrants a ban.

A Vision of the Dark Future of Advertising

A Vision of the Dark Future of Advertising

Via complex analysis that no one will understand, taking in data from your fridge, smart car, work calendar, facial expressions, and toilet, your smart TV will fire off a personalized ad about buying that shiny new handgun just at the moment you’re starting to feel… well, in fact, you won’t know what the reason is.

Facebook’s Ad Archive API is Inadequate

Facebook’s Ad Archive API is Inadequate

Researchers’ guideline : A functional, open API should provide the content of the advertisement and information about targeting criteria. Facebook’s API : The API provides no information on targeting criteria, so researchers have no way to tell the audience that advertisers are paying to reach.

Hackers Can Tell What Netflix Bandersnatch Choices You Make

Hackers Can Tell What Netflix Bandersnatch Choices You Make

In practice, though, the researchers say that they can analyze Netflix's encrypted interactive video traffic to find clues about what users are watching, and which choices they've made in their movie journeys.

IT grids case: Aadhaar data of 7.8 crore with IT firm, FIR filed

IT grids case: Aadhaar data of 7.8 crore with IT firm, FIR filed

HYDERABAD: The Cyberabad police has filed an FIR on the complaint of UIDAI stating that information technology firm IT Grids (India) was in possession of Aadhaar data of over 7.8 crore residents of Telangana and Andhra Pradesh.

New Report: Video Surveillance And VSaaS Market Booming Globally | Industry Forecast 2019-2028

New Report: Video Surveillance And VSaaS Market Booming Globally | Industry Forecast 2019-2028

Worldwide Video Surveillance and VSaaS market autopsy: Depending upon the influence, the company profiles of all key manufacturers, their establishment year, regional market for marketing and sales, products and services serves as well as the contact details are offer in this research report.

Malware and Firmware Trojans

Malware and Firmware Trojans

1 Malware 1.1 The Importance of a Malware Free System 1.2 The Utility of Antivirus Tools 1.3 Preventing Malware Infections 1.4 Detecting Malware Infections 1.5 Watering Hole Attacks 2 Firmware Trojans 2.1 Virtualizers and Hardware Compromise 2.2 The Promise of Libre Firmware 3 References Malware[edit ].

New leaked documents reveal that NSA can read minds of 4G LTE users

New leaked documents reveal that NSA can read minds of 4G LTE users

Whenever your phone receives 4G LTE signal, invisible goop tendrils actually extend out of your phone’s charging port and attach to your occipital lobe to form a Brain-Computer interface that allows the NSA to read your mind.

Privacy-Preserved Data Sharing for Evidence-Based Policy Decisions: A Demonstration Project Using Human Services Administrative Records for Evidence-Building Activities

Privacy-Preserved Data Sharing for Evidence-Based Policy Decisions: A Demonstration Project Using Human Services Administrative Records for Evidence-Building Activities

Three key issues motivated the launch of a domestic secure computation demonstration project using real government-collected data: Using new privacy-preserving approaches addresses pressing needs in society.

School of Privacy - schoolofprivacy/TUMBLR enabled SSL support for blogs!

School of Privacy - schoolofprivacy/TUMBLR enabled SSL support for blogs!

So we have been using tumblr for a long time and a few years back we started requesting support for SSL and they finally made a option feature in your themes settings if you go to edit appearance you can select enable HTTPS which will add full SSL support for your tumblr blog/site.

Sandboxing and DMARC Authentication Added to SpamTitan Email Security Solution

Sandboxing and DMARC Authentication Added to SpamTitan Email Security Solution

This week, TitanHQ has rolled out two new features for its award-winning email security solution SpamTitan: Sandboxing and DMARC email authentication. SpamTitan now incorporates DMARC authentication to provide even greater protection against email spoofing attacks.

A Serious Concern About Post-Quantum Cryptography and Strength Targets

A Serious Concern About Post-Quantum Cryptography and Strength Targets

A “Security Level 1” cipher that has a breakthrough that allows a sqrt speedup on analysis suddenly only has 64 or less “bits of strength”, which is very breakable.

Big Data meets Big Gov't: New IRS spy software

Big Data meets Big Gov't: New IRS spy software

This is exactly the kind of data analysis it will take to establish the IRS’ so-called “up-front tax system,” which I describe in my book “How to Win Your Tax Audit.” Under that system, the taxpayer is essentially removed from the tax preparation process because the IRS knows everything there is to know about your personal, business and financial affairs to the point where the agency prepares the return for you.

Understanding differential privacy and why it matters for digital rights

Understanding differential privacy and why it matters for digital rights

In a three-part series, we’ll describe the way private companies, like Apple, both properly and improperly use differential privacy tools. In a globally private system, one trusted party, whom we’ll call the curator — like Alice, above — has access to raw, private data from lots of different people.

Los Angeles Accuses Weather Channel App of Covertly Mining User Data

Los Angeles Accuses Weather Channel App of Covertly Mining User Data

The government said the Weather Company, the business behind the app, unfairly manipulated users into turning on location tracking by implying that the information would be used only to localize weather reports.

How Facebook tracks you on Android

How Facebook tracks you on Android

WebM Download 1080p 410 MB Download 576p 144 MB Download 576p 252 MB These files contain multiple languages. The files available for download contain all languages as separate audio-tracks. Please look for "audio tracks" in your desktop video player.

Feasibility of Reidentifying Individuals in Large National Physical Activity Data Sets From Which Protected Health Information Has Been Removed With Use of Machine Learning

Feasibility of Reidentifying Individuals in Large National Physical Activity Data Sets From Which Protected Health Information Has Been Removed With Use of Machine Learning

Methods Design, Setting, and Participants We conducted a cross-sectional study in 2018 (during which time data were being analyzed) using physical activity data measured by accelerometers (ActiGraph AM-7164) from the National Health and Nutrition Examination Survey (NHANES) from 2003-2004 and 2005-2006.19,20 NHANES is a yearly program conducted by the National Center for Health Statistics (NCHS) to track health and nutrition in the United States, and NCHS uses a multistage probability sampling design to select a participant sample that is representative of the diverse adult and child population in the United States.

FBMessage Explorer

FBMessage Explorer

On the left, and below this central pane, you can see a graph showing the quantity of messages sent depending on the date / the time of day.

Opposition slams cyber surveillance order

Opposition slams cyber surveillance order

The agencies have been authorised “for the purpose of interception, monitoring and decryption of any information generated, transmitted, received or stored in any computer resource under the said Act (section 69 of the IT Act, 2000)”, the order states.

Amazon reveals private Alexa voice data files

Amazon reveals private Alexa voice data files

His request not only gave him access to his own Amazon search data, but also to around 1,700 Alexa voice files recorded in a stranger’s living room, bedroom, and shower. This data privacy disaster occurred because amazon.de saves Alexa voice recordings indefinitely and because the processes it uses to leverage them have serious security issues.

Privacy no more: How machine learning in the cloud will strip us naked

Privacy no more: How machine learning in the cloud will strip us naked

Machine learning and data lakes are powerful tools that, like social media, can improve our quality of life, and help us to gain important business as well as personal insights that will allow us to become more agile and responsive.

Uncle Sam Wants to Snoop on Your Monero Transactions

Uncle Sam Wants to Snoop on Your Monero Transactions

According to the document, blockchain monitoring frameworks geared toward Zcash and Monero are of special interest to the DHS because its existing Bitcoin-focused analytics capabilities “cover only a limited scope within the realm of cryptocurrencies.” The expansion into the privacy cryptocurrency area is intended to keep pace with newer blockchain implementations and demonstrate that the DHS possesses sufficient extensibility to deal with the threat posed by illegal hidden transactions.

German federal office BSI publishes Telemetry analysis

German federal office BSI publishes Telemetry analysis

The research paper, which is available in English (partially) and German, provides a deep analysis of Telemetry functionality that Microsoft implemented in the company's Windows 10 operating system.

4 Free Online Tools for Examining Suspicious PDFs

4 Free Online Tools for Examining Suspicious PDFs

These online tools automate the scanning of PDF files to identify malicious components. The list includes PDF Examiner, Jsunpack, Wepawet and Gallus. In this way, it differs from Jsunpack and Wepawet, which focus on automating the analysis as much as possible.

Bitwarden Completes Third-party Security Audit – Bitwarden Blog

Bitwarden Completes Third-party Security Audit – Bitwarden Blog

In the interest of providing full disclosure, below you will find the technical report that was compiled from the team at Cure53 along with an internal report containing a summary of each issue, impact analysis, and the actions taken/planned by Bitwarden regarding the identified issues and vulnerabilities.

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

iBorderCtrl provides a unified solution with aim to speed up the border crossing at the EU external borders and at the same time enhance the security and confidence regarding border control checks by bringing together many state of the art technologies (hardware and software) ranging from biometric verification, automated deception detection, document authentication and risk assessment.

More