Friday, May 14, 2021

dWebServe Submit News Opinions Worldwide

dWebServe Submit News Opinions Worldwide


Stoke Space and Sequoia Scientific win NASA funding to advance tech innovations

Posted: 14 May 2021 05:40 PM PDT

dWeb.News Article from Alan Boyle

Stoke Space Technologies' second-stage engine injector undergoes a test firing at the company's component test facility. (Stoke Photo)

Two Washington state companies have won grants of up to $750,000 each from NASA to take space-related technologies they're already working on to the next stage of development.

The awards to Renton-based Stoke Space Technologies and Bellevue-based Sequoia Scientific are part of the latest batch of NASA Small Business Innovation Research Phase II grants. Nationwide, $105 million in awards were allocated to 140 projects proposed by 127 small businesses spread across 34 states and Washington, D.C.

The aim of the program is to encourage the development of innovations that could contribute to NASA's efforts in human exploration, space technology, science and aeronautics — and could find commercial, non-NASA applications as well. All of the Phase II awardees previously received NASA SBIR Phase I awards that were worth up to $125,000 each.

"These small businesses received Phase I awards towards the onset of the global pandemic and persevered through it to evolve promising up-and-coming technology solutions," Jim Reuter, associate administrator for NASA's Space Technology Mission Directorate, said in a news release issued Thursday. "As the government helps get small businesses back on track, we value their commitment and dedication to supporting NASA missions and goals."

Sequoia Scientific's NASA-supported project is aimed at building a new submersible imaging device for analyzing ocean color and biogeochemistry. The hyperspectral absorption spectrophotometer could provide significantly greater accuracy and resolution than existing in-water sensors, and may provide validation for future NASA ocean-color missions such as PACEGEO-CAPE and GLIMR.

Stoke Space's award will fund the development and testing of hardware for a new type of rocket engine that's designed for use in planetary landers, reusable second stages and other types of spacecraft that perform entry, descent and landing maneuvers. The engine's nozzle would serve as an actively cooled metallic heat shield as the spacecraft descends through the atmosphere, and as a shield against debris thrown up during terminal descent.

Phase II projects typically cover up to 24 months of development work. If the projects show promise, NASA's SBIR program offers additional funding opportunities to help small businesses find investors and customers outside the space agency.

"The Phase II contract period is an exciting time, as small businesses put their ideas into practice and develop prototypes attractive to NASA and private investors," said Jason Kessler, NASA's SBIR program executive. "The selected technologies have displayed great potential impacts for their respective sectors, and we are proud to continually invest in today's booming aerospace economy through these small businesses."

Stoke Space has already attracted private investors: In February, the startup raised $9.1 million in seed funding to support the development of reusable second stages.

Two Washington state companies have won grants of up to $750,000 each from NASA to take space-related technologies they're already working on to the next stage of development. The awards to Renton-based Stoke Space Technologies and Bellevue-based Sequoia Scientific are part of the latest batch of NASA Small Business Innovation Research Phase II grants. Nationwide, $105 million in awards were allocated to 140 projects proposed by 127 small businesses spread across 34 states and Washington, D.C. The aim of the program is to encourage the development of innovations that could contribute to NASA's efforts in human exploration, space technology, science… Read MoreSpace, NASA, SBIR, Sequoia Scientific, Stoke Space

The post Stoke Space and Sequoia Scientific win NASA funding to advance tech innovations appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

Samsung’s next super cheap 5G phone just leaked in full

Posted: 14 May 2021 05:40 PM PDT

dWeb.News Article from Jacob Siegal

Samsung's flagship phones are often the ones that get the most attention from publications like ours, but millions of people all around the world prefer to spend their money elsewhere, and are more than happy to use more affordable handsets rather than one that retails for over $1,000. In fact, despite their lower price tags, modern "budget" phones don't have to compromise when it comes to important features, including support for 5G networks.

5G technology has yet to fully penetrate the market, but we are already getting a smattering of cheap 5G phones to go along with all of the pricey flagships from the top vendors. To that point, on Friday, 91mobiles shared new leaked images of the Galaxy A22, which is rumored to be Samsung's cheapest 5G phone to date.

Today’s Top Deal


Deal alert: Amazon shoppers are swarming to get this 2K camera drone that folds up as small as a smartphone

Price: $64.99
You Save: $15.00 (19%)
Buy Now

As was the case for several previous Galaxy A series phones, the Galaxy A22 features a teardrop notch at the top of the display which houses the selfie camera. There will be both a 4G model and a 5G model of this phone, and though the designs are virtually identical at a glance, there are a few subtle differences worth noting.

Leaked images of Samsung's Galaxy A22 5G. Image source: 91mobiles

First up, the bezel on the 4G model appears to be slightly less obtrusive than that of the 5G model. Both phones also have a square camera module in the top left corner of the rear panel, but where the 5G model has three cameras and a flash, the 4G model squeezes four cameras into the module and shifts the LED flash beneath it.

All told, the Galaxy A22 4G is simply more powerful than its 5G sibling. Leaks claim that the 4G model will have a 6.4-inch HD+ AMOLED display, a MediaTek Helio G80 CPU, and a camera system with a 48MP+5M+2MP+2MP setup. The selfie camera clocks in at 13 megapixels, and the RAM and storage are still unknown.

As for the Galaxy A22 5G, you should expect a 6.4-inch FHD+ LCD display, a MediaTek Dimensity 700 CPU, and three cameras in a 48MP+5MP+2MP configuration. The 5G model is also slightly thicker and heavier than the 4G model, but both come with 5,000mAh batteries that support 15W fast charging.

Finally, and perhaps most important, the Galaxy A22 is expected to cost around KRW 200,000, which converts to about $180. For the sake of comparison, Samsung's Galaxy A42 5G is priced at $359.99 on Amazon and launched for KRW 449,000 in South Korea last November. If the Galaxy A22 5G really is half the price of the Galaxy A42 5G, it could end up being one of the most affordable 5G phones on the market bar none.

Today’s Top Deal


Amazon shoppers are obsessed with these Wi-Fi smart plugs – get them for just $4.72 each!

Price: $18.89
You Save: $8.10 (30%)
Coupon Code: ECHE76M7 (by 5/31)
Buy NowSamsung’s flagship phones are often the ones that get the most attention from publications like ours, but millions of people all around the world prefer to spend their money elsewhere, and are more than happy to use more affordable handsets rather than one that retails for over $1,000. In fact, despite their lower price tags, modern “budget” phones don’t have to compromise when it comes to important features, including support for 5G networks.
5G technology has yet to fully penetrate the market, but we are already getting a smattering of cheap 5G phones to go along with all of the pricey flagships from the top vendors. To that point, on Friday, 91mobiles shared new leaked images of the Galaxy A22, which is rumored to be Samsung’s cheapest 5G phone to date.

As was the case for several previous Galaxy A series phones, the Galaxy A22 features a teardrop notch at the top of the display which houses the selfie camera. There will be both a 4G model and a 5G model of this phone, and though the designs are virtually identical at a glance, there are a few subtle differences worth noting.
First up, the bezel on the 4G model appears to be slightly less obtrusive than that of the 5G model. Both phones also have a square camera module in the top left corner of the rear panel, but where the 5G model has three cameras and a flash, the 4G model squeezes four cameras into the module and shifts the LED flash beneath it.
All told, the Galaxy A22 4G is simply more powerful than its 5G sibling. Leaks claim that the 4G model will have a 6.4-inch HD+ AMOLED display, a MediaTek Helio G80 CPU, and a camera system with a 48MP+5M+2MP+2MP setup. The selfie camera clocks in at 13 megapixels, and the RAM and storage are still unknown.
As for the Galaxy A22 5G, you should expect a 6.4-inch FHD+ LCD display, a MediaTek Dimensity 700 CPU, and three cameras in a 48MP+5MP+2MP configuration. The 5G model is also slightly thicker and heavier than the 4G model, but both come with 5,000mAh batteries that support 15W fast charging.
Finally, and perhaps most important, the Galaxy A22 is expected to cost around KRW 200,000, which converts to about $180. For the sake of comparison, Samsung’s Galaxy A42 5G is priced at $359.99 on Amazon and launched for KRW 449,000 in South Korea last November. If the Galaxy A22 5G really is half the price of the Galaxy A42 5G, it could end up being one of the most affordable 5G phones on the market bar none.Galaxy A22, Samsung
Tech News at http://dWeb.News

The post Samsung's next super cheap 5G phone just leaked in full appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

dWeb ART: ‘Photo’ Shows What George Washington Might Look Like Today, if He Was Alive

Posted: 14 May 2021 05:07 PM PDT

dWeb.News Article from Daniel Webster

what george washington would look like today

By Daniel Webster dWeb.News

"Firstly, thank you all for the amazing support and reaction to the image," George Aquilla Hardy wrote. "As an individual whom as a child said 'I want to be an artist' I'm really quite taken back by the response." Hardy posted his image of George Washington on Reddit.

George Aquilla Hardy had some time on his hands during the pandemic. He put his artistic skills to works and created an image of what George Washington, the first president of the United States from 1789 to 1797, if Washington were alive today.

Hardy studied Washington's facial features and also searched for modern lookalikes online. According to the artist, he used "lots of source images of people with the correct features." These references include "Glenn Close, Michael Douglas, a wax work of Washington, and Roger Williams." He ultimately used Photoshop to create the final digital image.

"He's a blend of those people really, in reference to paintings of him," Hardy said.

A viewer could never tell Washington’s face is actually a digital mash-up. Hardy did great work. After posting the image on Reddit, Hardy’s Washington went viral—much to the surprise of the artist.

"Firstly, thank you all for the amazing support and reaction to the image," he wrote. "As an individual whom as a child said 'I want to be an artist' I'm really quite taken back by the response."

"There are many things I would have done differently with the Washington image if I had known it would garner this kind of reaction, that said, this is the first time I have [endeavored] to create such an image, and publicly display it. Perhaps some day I will redo the Washington image with your feedback in mind."

Inspired by Hardy, other Redditors went to work. with eoford and when-the-fart both used face swap software to create their own present-day figures from American history.

Eoford rendered a modern Abraham Lincoln and when-the-fart created Benjamin Franklin as if he were alive today. Both look oddly familiar.

Check out the present-day George Washington, Abraham Lincoln, and Benjamin Franklin below.

George Aquilla Hardy Shares His George Washington Look-Alike on Twitter:

Hardy’s impressive rendering inspired others to make their own present-day presidents and statesmen using face swap software.

https://old.reddit.com/r/interestingasfuck/comments/n5i3qw/i_created_a_photorealistic_image_of_abraham/

The post dWeb ART: ‘Photo’ Shows What George Washington Might Look Like Today, if He Was Alive appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

OOPS: A First Family Privacy Nightmare Applies to Everyone — President Joe Biden’s Venmo Account Exposed in 10 minute search

Posted: 14 May 2021 03:50 PM PDT

dWeb.News Article from Daniel Webster

Lo and behold, quickly a dozen Biden family members and a mapping of the Biden family social web popped up, including the first family and a wide network of people around them, including the president’s children, grandchildren, senior White House officials, and all of their contacts on Venmo.

Joe Biden Family Tree, EntiTree, Wikimedia, Wikidata

The peer-to-peer payments app Venmo leaves everyone from ordinary people to the most powerful person in the world exposed, in as quickly as 10 minutes

President Joe Biden's Venmo account was found after less than 10 minutes of looking for it by BuzzFeed News, revealing a network of his private social connections. It is a national security issue for the United States, and a major privacy concern for every Venmo user on the popular peer-to-peer payments app.

Following a passing mention in the New York Times that the president had sent his relatives money on Venmo, a search began for the president's account using only a combination of the app's built-in search tool and public friends feature. Lo and behold, quickly a dozen Biden family members and a mapping of the Biden family social web popped up, including the first family and a wide network of people around them, including the president’s children, grandchildren, senior White House officials, and all of their contacts on Venmo.

A Privacy Disaster

Sen. Joe Biden campaigns in Ankeny PHOTO: IowaPolitics.com

The president's personal financial transactions are not public, and BuzzFeed News is not identifying the usernames for the accounts mentioned in this story due to potential national security concerns.

All of Joe Biden’s friends on his Venmo account were removed, after BuzzFeed News reached out to the White House, the new site reports. The White House did not have an immediate comment regarding the issue.

"The safety and privacy of all Venmo users and their information is always a top priority, and we take this responsibility very seriously. Customers always have the ability to make their transactions private and determine their own privacy settings in the app. We're consistently evolving and strengthening the privacy measures for all Venmo users to continue to provide a safe, secure place to send and spend money," a Venmo spokesperson told BuzzFeed.

The post OOPS: A First Family Privacy Nightmare Applies to Everyone — President Joe Biden’s Venmo Account Exposed in 10 minute search appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

World’s largest crypto exchange under investigation in the US

Posted: 14 May 2021 03:40 PM PDT

dWeb.News Article from Chris Smith

Bitcoin and cryptocurrencies have had an amazing year so far. Various digital assets, including bitcoin and ethereum, reached new all-time highs, taking the entire market on a continued bull run since January. The renewed interest in bitcoin and blockchain tech came from both retail investors and institutions.

Tesla bought bitcoin, then sold electric cars for bitcoin for a few months before discontinuing the practice. PayPal embraced crypto trading last year and then allowed users to convert their crypto balance to fiat to pay for goods online. These events all pushed the prices higher and the sentiment around cryptocurrencies rose, just as more stimulus money poured into bank accounts, as countries continued to prop up their pandemic-bruised economies.

Today’s Top Deal


Apple’s hot new AirTags are finally back in stock on Amazon – hurry before they sell out again!

Price: $29.00
Buy Now

But governments have not relented when it comes to investigating blockchain companies and looking to devise or enforce regulations in an industry that's difficult to control due to the decentralized nature of blockchain.

Over the past few months alone:

The SEC sued Ripple.
The U.S. Commodity Futures Trading Commission (CFTC) started investigating Binance for giving Americans access to digital token derivatives.
The IRS looked into Kraken's US customers.
The Indian government started considering new laws that would make it harder for citizens to buy and sell cryptocurrencies.

Binance, which happens to be the world's largest crypto exchange, faces two additional probes on top of the CFTC's investigation from March. The Justice Department and the IRS are also looking into Binance's US-related operations, targeting different illicit activities that crypto trading might facilitate.

People familiar with the investigations have informed Bloomberg that the agencies have sought information about Binance's business. Money laundering and tax offenses are at the core of the probes.

The specifics of what the agencies are examining have not been determined, the paper notes. Also, not all such inquiries lead to allegations of wrongdoing. Bloomberg notes that the Justice Department's bank integrity unit and investigators from the US Attorney's Office in Seattle are involved. The separate IRS investigation goes back months, with the agency reviewing the conduct of Binance customers and employees. The CFTC's investigation concerns illegal trading that Binance might have made available to Americans — companies need to be registered with the CFTC before offering derivatives linked to digital tokens to American customers.

The probes follow a recent Chainalysis report that found most of the crime-linked digital tokens that it tracks ended up on Binance. Of the $2.8 billion worth of bitcoin that Chainalysis suspects it's connected to illegal activity moved to trading platforms in 2019. Some $756 million (or 27%) ended up on Binance.

Binance said in a statement to Bloomberg that it takes its legal obligations very seriously:

We take our legal obligations very seriously and engage with regulators and law enforcement in a collaborative fashion. We have worked hard to build a robust compliance program that incorporates anti-money laundering principles and tools used by financial institutions to detect and address suspicious activity.

Binance CEO Changpeng Zhao has said that the trading platform follows US rules closely, blocking Americans from its websites and using algorithms to flag transactions for money laundering and other illicit activities. Last year, the company warned US residents that they would have their accounts frozen if found to be trading. Binance launched Binance.US for American customers in September 2019.

Binance spokesperson Jessica Jung also addressed VPN use, which would allow Americans to circumvent restrictions. Binance never encouraged US residents to rely on VPNs, Jung said. Zhao tweeted in January that Binance's security systems can block American customers. "We have implemented strong access controls that have been tested via external audit and are under continuous review and evaluation by Binance to ensure that the appropriate restrictions are in place and are effective," Jung added.

Today’s Top Deal


AirPods Pro are finally back in stock at Amazon… at the lowest price of 2021!

Price: $197.00
You Save: $52.00 (21%)
Buy NowBitcoin and cryptocurrencies have had an amazing year so far. Various digital assets, including bitcoin and ethereum, reached new all-time highs, taking the entire market on a continued bull run since January. The renewed interest in bitcoin and blockchain tech came from both retail investors and institutions.

Tesla bought bitcoin, then sold electric cars for bitcoin for a few months before discontinuing the practice. PayPal embraced crypto trading last year and then allowed users to convert their crypto balance to fiat to pay for goods online. These events all pushed the prices higher and the sentiment around cryptocurrencies rose, just as more stimulus money poured into bank accounts, as countries continued to prop up their pandemic-bruised economies.

But governments have not relented when it comes to investigating blockchain companies and looking to devise or enforce regulations in an industry that's difficult to control due to the decentralized nature of blockchain.

Over the past few months alone:
The SEC sued Ripple.
The U.S. Commodity Futures Trading Commission (CFTC) started investigating Binance for giving Americans access to digital token derivatives.
The IRS looked into Kraken's US customers.
The Indian government started considering new laws that would make it harder for citizens to buy and sell cryptocurrencies.

Binance, which happens to be the world's largest crypto exchange, faces two additional probes on top of the CFTC's investigation from March. The Justice Department and the IRS are also looking into Binance's US-related operations, targeting different illicit activities that crypto trading might facilitate.

People familiar with the investigations have informed Bloomberg that the agencies have sought information about Binance's business. Money laundering and tax offenses are at the core of the probes.

The specifics of what the agencies are examining have not been determined, the paper notes. Also, not all such inquiries lead to allegations of wrongdoing. Bloomberg notes that the Justice Department's bank integrity unit and investigators from the US Attorney's Office in Seattle are involved. The separate IRS investigation goes back months, with the agency reviewing the conduct of Binance customers and employees. The CFTC's investigation concerns illegal trading that Binance might have made available to Americans — companies need to be registered with the CFTC before offering derivatives linked to digital tokens to American customers.

The probes follow a recent Chainalysis report that found most of the crime-linked digital tokens that it tracks ended up on Binance. Of the $2.8 billion worth of bitcoin that Chainalysis suspects it's connected to illegal activity moved to trading platforms in 2019. Some $756 million (or 27%) ended up on Binance.

Binance said in a statement to Bloomberg that it takes its legal obligations very seriously:
We take our legal obligations very seriously and engage with regulators and law enforcement in a collaborative fashion. We have worked hard to build a robust compliance program that incorporates anti-money laundering principles and tools used by financial institutions to detect and address suspicious activity.
Binance CEO Changpeng Zhao has said that the trading platform follows US rules closely, blocking Americans from its websites and using algorithms to flag transactions for money laundering and other illicit activities. Last year, the company warned US residents that they would have their accounts frozen if found to be trading. Binance launched Binance.US for American customers in September 2019.

Binance spokesperson Jessica Jung also addressed VPN use, which would allow Americans to circumvent restrictions. Binance never encouraged US residents to rely on VPNs, Jung said. Zhao tweeted in January that Binance's security systems can block American customers. "We have implemented strong access controls that have been tested via external audit and are under continuous review and evaluation by Binance to ensure that the appropriate restrictions are in place and are effective," Jung added.Binance, Bitcoin
Tech News at http://dWeb.News

The post World's largest crypto exchange under investigation in the US appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

Help Your Gut Helps Your Lungs: Probiotics associated with fewer respiratory symptoms in overweight and older people

Posted: 14 May 2021 02:47 PM PDT

dWeb.News Article from Daniel Webster

wood sign internet computer

Findings of probiotic study provide further evidence of relationship between the gut and lungs

pineapple next to bowl
Photo by Karley Saagi on Pexels.com

DIGESTIVE DISEASE WEEK

Bethesda, MD (May 14, 2021) — Daily probiotic use was associated with fewer lung upper respiratory symptoms in overweight and older people, according to a study that suggests a potential role for probiotics in preventing respiratory infections. Helping your gut helps your lungs. The study was selected for presentation at Digestive Disease Week® (DDW) 2021.

“This is not necessarily the most intuitive idea, that putting bacteria into your gut might reduce your risk of respiratory infection,” said Benjamin Mullish, MD, a lead researcher on the study and clinical lecturer in the Division of Digestive Diseases, Imperial College London, England, “but it’s further evidence that the gut microbiome has a complex relationship with our various organ systems. It doesn’t just affect how our gut works or how our liver works, it affects aspects of how our whole body works.”

Researchers re-analyzed detailed daily diaries of 220 patients who participated in an earlier double-blind placebo-controlled study on probiotics and weight loss. Reviewing the entries for common symptoms of upper respiratory infection, including cough, sore throat and wheezing, researchers found that participants who took probiotics during the six-month study had a 27 percent lower overall incidence of upper respiratory tract symptoms compared to the placebo group. The effect was largest among participants who were aged 45 years or older, as well as those with obesity.

People with obesity are at higher risk for respiratory infections. Previous research has shown that probiotics reduce upper respiratory infections in healthy adults and children, but little data exists on this vulnerable population of older, overweight and people with obesity.

“These findings add to growing interest in the gut-lung axis — how the gut and the lungs communicate with each other,” Dr. Mullish said. “It’s not just the gut sending out signals that affect how the lungs work. It works in both directions. It adds to the story that changes in the gut microbiome can affect large aspects of our health.”

The researchers did not measure immune response, only respiratory symptoms. Future randomized clinical trials could help identify the mechanisms related to the reduction in respiratory symptoms and explore the possible impact of probiotics on the immune system, Dr. Mullish said.

The post Help Your Gut Helps Your Lungs: Probiotics associated with fewer respiratory symptoms in overweight and older people appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

This might be the secret behind the shrinking notch on the iPhone 13

Posted: 14 May 2021 02:39 PM PDT

dWeb.News Article from Jacob Siegal

We're still about four months out from the launch of the iPhone 13, but rumors and leaks have been popping up at a furious pace in recent months. According to those leaks, one of the most likely design changes coming to the iPhone 13 is a smaller notch, which many iPhone owners have been clamoring for since the iPhone X launched in 2017. This alteration seemed inevitable, and the only question was how the company was going to make it happen. Now, thanks to a new report from Digitimes, we might know the secret behind the shrinking notch.

Citing industry sources, Digitimes reports that Apple has figured out a way to reduce the size of the VCSEL (vertical-cavity surface-emitting laser) chips that are used in the Face ID sensors by 40-50% in new iPhone and iPad models set to roll out later this fall. Not only could this assist Apple in making the notch take up less room, but it should also help Apple cut production costs, as even fewer wafers will need to be produced for the chips.

Today’s Top Deal


Apple’s hot new AirTags are finally back in stock on Amazon – hurry before they sell out again!

Price: $29.00
Buy Now

Providing the leaks that we've seen over the past few weeks are accurate, we already know what to expect when it comes to the design of the iPhone 13. Back in April, leaked images of a purported screen protector for the iPhone 13 made it clear that the sensor housing will be significantly smaller this time around. That assertion has been backed up by subsequent leaks, including a video from Unbox Therapy showcasing an iPhone 13 Pro Max dummy model which had been built with the specifications of all the latest rumors and reports in mind.

Scaling down the chips is one way that Apple could achieve a smaller notch on the iPhone 13 lineup, but it's certainly not the only way. Other reports claim that Apple will push the earpiece speaker from the center of the notch to the top, where it will sit in the bezel that surrounds the display. This would let Apple pack all of the sensors within the housing closer together, eliminating the need for such a wide notch at the top of the screen.

The notch will likely be the design element that we'll all be tracking when Apple unveils the iPhone 13 in September, but it won't be the only element of the iPhone to get a makeover. KGI Securities analyst Ming-Chi Kuo has claimed the iPhone 13 Pro and iPhone 13 Pro Max will come with upgraded Ultra Wide cameras that have apertures of f/1.8 and autofocus instead of fixed focus. The camera modules of the dummy unit seemingly reflect that, and as a result, the lenses are noticeably larger than they were on the iPhone 12 series.

Today’s Top Deal


AirPods Pro are finally back in stock at Amazon… at the lowest price of 2021!

Price: $197.00
You Save: $52.00 (21%)
Buy NowWe’re still about four months out from the launch of the iPhone 13, but rumors and leaks have been popping up at a furious pace in recent months. According to those leaks, one of the most likely design changes coming to the iPhone 13 is a smaller notch, which many iPhone owners have been clamoring for since the iPhone X launched in 2017. This alteration seemed inevitable, and the only question was how the company was going to make it happen. Now, thanks to a new report from Digitimes, we might know the secret behind the shrinking notch.

Citing industry sources, Digitimes reports that Apple has figured out a way to reduce the size of the VCSEL (vertical-cavity surface-emitting laser) chips that are used in the Face ID sensors by 40-50% in new iPhone and iPad models set to roll out later this fall. Not only could this assist Apple in making the notch take up less room, but it should also help Apple cut production costs, as even fewer wafers will need to be produced for the chips.

Providing the leaks that we’ve seen over the past few weeks are accurate, we already know what to expect when it comes to the design of the iPhone 13. Back in April, leaked images of a purported screen protector for the iPhone 13 made it clear that the sensor housing will be significantly smaller this time around. That assertion has been backed up by subsequent leaks, including a video from Unbox Therapy showcasing an iPhone 13 Pro Max dummy model which had been built with the specifications of all the latest rumors and reports in mind.

Scaling down the chips is one way that Apple could achieve a smaller notch on the iPhone 13 lineup, but it’s certainly not the only way. Other reports claim that Apple will push the earpiece speaker from the center of the notch to the top, where it will sit in the bezel that surrounds the display. This would let Apple pack all of the sensors within the housing closer together, eliminating the need for such a wide notch at the top of the screen.

The notch will likely be the design element that we’ll all be tracking when Apple unveils the iPhone 13 in September, but it won’t be the only element of the iPhone to get a makeover. KGI Securities analyst Ming-Chi Kuo has claimed the iPhone 13 Pro and iPhone 13 Pro Max will come with upgraded Ultra Wide cameras that have apertures of f/1.8 and autofocus instead of fixed focus. The camera modules of the dummy unit seemingly reflect that, and as a result, the lenses are noticeably larger than they were on the iPhone 12 series.Apple, Face ID, iPhone 13
Tech News at http://dWeb.News

The post This might be the secret behind the shrinking notch on the iPhone 13 appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

20 Working from Home Security Tips for 2021 By Andrew Lopez

Posted: 14 May 2021 02:39 PM PDT

dWeb.News Article from jaydiaz2013

Working From Home in 2021

While the pandemic shifted numerous industries and the work force associated with them, working from home will be a trend that remains for the foreseeable future. As more companies work with employees to set up a home office, the question for businesses is how does the company keep a high level of cybersecurity for employees while working from home? Until now, most company associates would report to the office to work within their designated offices. The cybersecurity protocols installed at the office would handle all security aspects for the employees.

The short answer is practicing good cybersecurity habits. Putting in an effort to educate and practice daily cybersecurity activities will pay dividends in the long run. We've compiled a list of 20 work from home security tips to help combat bad actors & educate work from home users.

1. Secure Your Home Office

The thought of securing a home office doesn't come to mind readily for home PC security. Generally speaking a home office will be set up in a spare bedroom, an open space area that becomes a makeshift office, or sitting on a comfy couch. With that said, how are you securing your home office? For starters, we recommend designating an area strictly for work related activities. If possible, convert a spare bedroom or area into an office to help maintain a secure area.

A lock on the home office door prevents unwelcome guests from accessing the room that has workstations and other work related hardware. In addition if you use a laptop and relocate outside of the house, be sure to bring the device in with you so no one gets any ideas of grabbing the laptop. Maintaining a consistent awareness of security is key to any proper cybersecurity hygiene.

Lastly, lock up the home office when you finish your work day. You would never leave an office without locking up behind you. Securing a home office may sound like overkill, but implementing these solutions will help keep devices secure while working from home.

2. Secure Your Home Modem / Router

Implementing a secure home office internet connection has exponentially increased within the last year. Before the pandemic most individuals didn't think twice about their home security. You would use home WiFi and the internet mostly for streaming, catching up on news, social media, and other personal activities.

Fast forward to present time, lots of folks are using their home internet connection for work purposes. What can you do to secure your home network? Glad you (virtually) asked. First, change the WiFi Service Set IDentifier (SSID), the name that broadcasts throughout the home, to a name of your choosing. Most Internet Service Providers (ISPs) configure modems/routers with default settings. Changing the default name will prevent outside forces of knowing what type of ISP your home uses.

Second, change the WiFi password to something more complex. Using a minimum of 12 – 14 characters (the more the better) to help fight malicious actors from accessing the network. While you're updating passwords be sure to update the router password. Again these devices come pre-configured with the exact same settings. If you and your neighbor have the same ISP and modem/router, chances are high both your modem/router have the same exact password.

Lastly, confirm with the ISP the WiFi connection remains secure and closed to the household. On occasion the modem/router the ISP provides may be non-secure and using an old WiFi technology named Wired Equivalent Privacy (WEP).

We won't dive too deep into WiFi security protocols, but in short all WiFi connections should be using WPA2. Call the ISP that provides internet to find out more.

3. Don't Delay Software Updates

Software updates are one of the most overlooked security measures for businesses and employees. A software update patches various bugs, security holes, and provides additional software features. For instance, when a Microsoft Office update becomes available, chances are the update is plugging up security vulnerabilities as well as adding new features to the suite. Any time a software prompt displays to perform an update, we highly recommend pushing the update through. Similarly if a business partners with a managed IT service provider the system administrators schedule a time to push these updates to the entire network.

Delaying software updates can become troublesome if not performed in a timely manner. Eventually the software will need to be updated. Don't delay and either perform the software update yourself or the manage IT service provider will set a plan to push the update during non-business hours.

4. Watch Out For Phishing Scams

The new normal of working from home became a reality during the early months of the pandemic. More and more businesses are helping employees settle into this new normal. However, because most people are working from home doesn't mean being more relaxed with company assets. For example, email phishing is a consistent hacking method bad actors use to obtain an individual's email password.

Email security awareness is a continued practice no matter where you're working. In other words remain vigilant when reading emails. Calling an individual who emailed you with a strange looking email is a good idea to receive secondary confirmation. Especially if the email doesn't look quite right. Never click on any links within an email if you're unsure of the source.

Scammers are looking for ways to target home workers now more than ever. Remain alert and always check with the sender if the email is legitimate.

5. Implement A Virtual Private Network (VPN)

A virtual private network (VPN) is by far an excellent security protocol to implement for any sized business. We discussed the benefits of implementing a VPN protocol in a separate blog post and provided a great overview.

A VPN provides an encrypted internet connection. To demonstrate how a VPN would work in the real world let's discuss an example. If you were to work in a Starbucks or other public area with a WiFi connection, chances are high the connection is not secure. Most free WiFi connections are far from secure and leave you open to malicious individuals who know how to infiltrate the wireless connection.

Say you have a VPN protocol set up for your business. When you connect to your VPN the connection becomes encrypted. In other words the connection to the Internet is unreadable by humans or computers. The encrypted connection keeps your data safe and secure. While this example is an oversimplification of VPN, understanding the importance of a VPN connection can help you make better technology decisions when away from your home network.

6. Increase Password Complexity

Passwords are one of the highest security vulnerabilities when it involves cybersecurity. Too many individuals use short or simple passwords that can be easily guessed. For example, using "password" as your password is never a good idea. Similarly, avoid using pet names, relatives, or any other closely related trait that are easily guessable associations with you or your family. We strive to enforce strong complex passwords to help mitigate potential issues down the road.

Use a minimum of 14 characters with a combination of upper and lowercase letters, special characters, and numbers. Additionally, implement and practice using complex passwords throughout other login touch points. In fact, if passwords for software, web logins, etc. remain easy to guess or don't have a password at all, we highly recommend adding and updating the password with more complex characters.

It is important to realize that passwords are the gatekeepers to access specific devices and services. The more complex the password, the harder to guess and prevent a brute force entry into said device or service. Collaborate with IT to keep all accounts secure with complex passwords.

7. Incorporate MFA For All Web Services

In addition to increasing password complexity, incorporating an extra layer of security when signing into a website is a great idea. Multi factor authentication (MFA), sometimes referred to as two-factor authentication (2FA), is defined as a security enhancement that allows you to present two pieces of evidence when logging in to an account. For instance, when logging into an email account like Gmail or Yahoo, you receive a notification to confirm it is you logging in. You will receive a code or prompt on your mobile device, which you can use to confirm your login.

Any time company employees are accessing sensitive data, implementing MFA would be an ideal security protocol. Single sign on would be easily accessible if the password were to become public knowledge. Without the second layer of security the malicious individual would be able to sign in without a second verification step. Using a smartphone, email, or other secondary device, will become the second verification method for accessing the email account, thus adding an extra layer of security to your sensitive material.

Installing an additional layer of cybersecurity will help prevent hijacking of sensitive account data. Work with your IT provider to activate MFA if you don't have the protocol implemented already.

8. Keep Personal & Work Devices Separate

The temptation of combining both a work and personal device into one is intriguing and convenient. However, work devices should be that; only related to work. To clarify, no work device should be tied to any personal information. First, all personal data will need to live on their own devices. You don't want personal data mixing with business data. Second, business data is sensitive. You have customer information, credit card numbers, and other highly classified data that will need to be separate from a personal device. Lastly, keep the company provided device in a separate location from the personal device. In fact, lock the room or store the device somewhere only you have access to.

Mixing devices can hinder security for employees, especially if data has been shared between devices. Personal and work data need to remain on their own devices. For example, you don't want a virus attacking a personal device that contains an important report or document. Imagine if that virus wiped away all of your personal and work data.

Keep personal and work devices separate at all times. You'll be happy you did.

9. Avoid Working At A Public WiFi Location

Free WiFi is a convenient connection to have when in a pinch. Did you know that most free WiFi locations have insecure connections? In fact, the reason free WiFi is readily available in coffee shops, airports, or other lounge areas is how easy it is to install a free WiFi hotspot. Although free, these connections are not safe by any stretch of the imagination. You'll be happy to know there are methods to help avoid free WiFi and insecure connections.

For starters, we recommend using a smartphone as a hotspot to tether the connection from phone to laptop. A smartphone is a more secure method in a variety of ways. First, you're the only person with the connection credentials. Second, the phone is using a cellular connection instead of an insecure WiFi connection. And lastly, that cellular connection is much more difficult to infiltrate than a free, non-secure WiFi connection.

Most smartphone service providers are offering unlimited data, which you as a traveler can take advantage of. Always use personal devices like a smartphone for internet access. Use the free WiFi sparingly for finishing time sensitive tasks if no other option is available.

10. Encrypt Data As Much As Possible

Encryption became a buzzword around the time the Internet was leaning into increased security. Encryption is a way of scrambling data so that only authorized parties can understand the information. In other words encryption takes readable data and changes it so that it appears unreadable by humans or computers.

Discussing the type of data that should be encrypted can vary. For instance, email is always a good topic when discussing what data needs to be encrypted. Modern email clients like Microsoft Outlook can provide encryption. In addition, other 3rd party tools like Hightail and ShareFile are solid options when sharing sensitive data.

Encrypting data is a must for specific industries. Financial sectors need higher data integrity standards which requires encryption of specific data. For example, any social security numbers or other personally identifiable information are encryption data candidates to deter any espionage. Similarly while performing encryption, you're also protecting the business from any liability. The more secure protocols implemented the higher the difficultly to obtain shared data.

11. Backing Up Data

The first rule of backing up is talking about actually backing up data. For example, setting a continuous schedule to back up data will be a win for any business. Similarly a backup strategy is more than simply backing up data on a computer. In fact, implementing a backup strategy entails discussing numerous topics about the company data. For instance, what data needs to be backed up? How often do we need to keep backups? How quickly do you need to retrieve lost data?

While backing up all important data will be relevant to the discussion, determining what data is crucial is another task in itself. A business will determine what data is relevant to keep the company moving forward. Take a moment to think about the impact the business would incur if a certain set of documents or data were gone. What data would paralyze the business if said data would go missing forever?

Work with IT on setting up a backup strategy. A typical backup strategy will cover all important network devices, such as servers, desktops, and network attached storage (NAS). A managed IT service provider can work with you on a plan that fits the company budget and on how fast data will need to be recovered in case of an emergency. Don't wait too long to get a backup strategy in place. The sooner the backups are running the better sleep you can get at night.

12. Use Company Provided Thumb Drives

Small flash or thumb drives are hardware devices that allow users to store data. If you're anything like me you have a handful of these lying around the house in a junk drawer. We're here to champion using company provided thumb drives to improve your overall cybersecurity. A managed IT service provider can set specific parameters on thumb drives unique to you. For example, adding a password to the thumb drive will prevent easily accessing the data on the drive. A home used thumb drive may have personal data and work data.

We highly recommend that you not use any personal or random thumb drives found at the home office or a friend's house. Unknowingly using a thumb drive can cause disaster to a computer. First, an unmanaged thumb drive may be storing personal information. This is information that you do not want on your company provided laptop. Second the thumb drive may have old, outdated software that potentially leaves the drive vulnerable and cause further damage to the computer. Lastly, using a random thumb drive without knowing what's on the drive is another cybersecurity mistake.

Work with the IT team to secure the thumb drive as much as possible. One last tip, if sending a thumb drive via mail, be sure to password protect the drive. You can call the recipient with the password once the thumb drive arrives. You can never be too careful when sending data via mail or email for that matter. Always err on the side of caution to prevent any major cyber issues down the road.

13. Keep Your Operating System Up To Date

The operating system runs the entire computer's internal system. Windows 10 and macOS Big Sur are two examples of an operating system. Stressing the point of how important updating the PC's operating system cannot be said enough. For instance, when an operating system update is available, we highly recommend installing the update towards the end of day. In fact, installing the updates at the end of the work day will prevent any stoppage. Similarly, a second option is to install the updates over the weekend, which will allow the PC to reboot as many times as needed to install the new operating system.

Lastly, partnering with a MSP will free you up of any updates moving forward. When you partner with a MSP, you can work with the provider to install updates during non-business hours and on your behalf. The MSP accommodates the company's work schedule and installs the patches during off hours. Installing operating system updates remains a smart and sound decision. While not the most exciting task to perform on a PC, running operating system updates is critical to the health of the PC and squashing any security vulnerabilities.

14. Set A Schedule With IT To Run Company Device Updates

One of the many perks of partnering with a managed IT service provider is a service called remote monitoring & management. Numerous tasks are performed remotely and running device updates is one of them. In the previous section we discussed how an entrepreneur will be able to perform security updates on their own. However, most users will ignore the prompts to update the software or OS update and instead push off at a later time. Here's how a MSP can help save you time & clicks.

For starters, a MSP will perform the updates on your behalf. In other words, the IT team will have remote support agents on company devices and will be able to perform the security updates on behalf of the end users. In addition, IT will work with the company's point of contact to determine what times are optimal for security updates. For example, when the MSP performs security patches on the second weekend of the month, the IT team downloads the updates, and installs them during non-business hours. The goal is to prevent any disruption, while maintaining full cybersecurity protocols for the entire business.

Instead of ignoring or determining the optimal time to run security updates, farm out the security updates to a MSP. You'll save time, energy, and resources.

15. Ensure Automatic Locking Is Enabled

Automatic locking will lock your device after a certain amount of time of inactivity. System administrators have come to an agreement that a device should automatically lock after 15 minutes of inactivity. In fact, implementing a device's automatic lock policy can help maintain a secure network. Many company policies require that PC lock settings are in place to meet financial or investment guidelines. In addition implementing an automatic locking policy helps keep computers from being accessed by uninvited internal guests. This allows company data to remain secure and locked away.

We encourage all businesses, no matter how big or small, to lock devices on a regular basis. Here's a fun tip: For Windows users, if you hit the Windows Key + L keys simultaneously, the screen will lock. For macOS users, tap on the keys CTRL + CMD + Q.

16. Confirm Antivirus Is Running On Device

Every workstation will need to have an antivirus (AV) software running. This point bears repeating: Every workstation will need to have an AV software running. The importance of installing and maintaining an AV app cannot be overstated. While other security tools live on the network and firewall, an AV app runs locally on the PC. A solid AV will run on a continual basis and schedule full scans outside of peak business hours. The AV does not take breaks and will run 24/7/365.

Smart AV software is able to detect whether a threat is viable and can quarantine said virus. Look for AV software that will automate and look for nefarious files or unwelcome digital guests. Confirm with your managed IT service provider and determine if an AV is installed on all business devices. The more devices with AV installed the more secure a PC will be.

17. Enable Find My Device & Remote Wipe

All Windows and macOS computers come with a "find my device" feature. The feature allows end users to wipe the computer if stolen, lost, or unrecoverable; therefore preventing data from being accessed by malicious entities. Most managed IT service providers incorporate remote wipe type features to safeguard a mobile workstation. For instance, BitLocker is an encryption feature built into computers running Windows 10 Pro. In short, BitLocker encrypts the computer's hard drive and secures your data by scrambling it so it can't be read without authenticated decrypting using a recovery key.

For macOS users, Find My Mac is a similar solution to Windows BitLocker. For instance, if a MacBook become stolen, you're able to lock your Mac or erase the Mac from another Apple device. In addition, you'll be able to pinpoint the device using an Apple iPhone and determine where the device is. In the event that the Mac device remains powered off or offline, you can still use Find My Mac to request a notification when it's located, or lock or erase it remotely.

Travel will soon be opening up and individuals will be carrying laptops, smartphones, and tablets with them for work. Make sure each device has a remote wipe capability to protect sensitive company data.

18. Work With IT On Wiping Any Non-used Devices

Data sanitization refers to wiping a hard drive once the computer no longer needs to be commissioned. A MSP works with a customer to ensure all data and personally identifiable information (PII) remains off the hard drive. Ensuring data is erased from a hard drive helps protect sensitive and company data. With that said, what is your business' protocols to wipe hard drives?

The first step requires working with the IT staff to prioritize wiping and erasing the hard drive's data. A solid method to wipe the hard drive uses the DoD 3-pass standard. In short, using the DoD data sanitization method will prevent all software-based file recovery methods — as well as hardware-based recovery methods — from recovering meaningful data from the drive. The second step signals a successful hard drive wipe. The last step determines whether the hard drive is an e-waste candidate or can be used again for another end user.

Erasing the hard drive's data practices good cybersecurity hygiene. Work with your managed IT service provider to determine the best course of action for your business.

19. Increase Cybersecurity Awareness Training

Cybersecurity awareness training became an essential part of businesses prior to the pandemic. Fast forward to 2021 and more businesses have become targets for phishing attacks under the guise of COVID-19 topics. Now is a crucial time to implement or update your cybersecurity training. Maintaining a consistent training regimen not only provides solid PC education, but the program will also help to keep employees up to date on the latest threats. For instance, running a faux phishing campaign can help increase awareness of who's paying attention to email and who needs additional cybersecurity awareness training.

The objective isn't to call someone out or publicly shame an individual, but rather the goal is to teach and coach the individual on what they missed on the phishing training session. Work with IT on providing cybersecurity training to all end users. The more educated the company on digital threats, the better off the business will be.

20. User Access Control

The philosophical IT discussion of allowing end users to have admin rights has been pontificated on numerous occasions. Although allowing individuals to have admin rights is a slippery slope we do not recommend. For example, when a user has admin rights enabled for their profile, the chances that the end user may end up accidentally downloading or installing a malicious application increase. In addition, the computer may become infected and you may be unable to access company data. We highly encourage businesses to restrict any user from having administrative rights.

The system administrators recommend limiting or completely removing admin rights from all users. If administrator rights are a must for a business, we create and assign a separate account to act as an admin for software installations or other PC needs. Keeping end users away from admin rights helps prevent ransomware, data breaches, and other catastrophic events that can lead to malicious digital guests. While it may be convenient to have admin rights, cybersecurity for the entire company should always outweigh convenience.

via Technology & Innovation Articles on Business 2 Community https://bit.ly/3oiVddL

Working From Home in 2021 While the pandemic shifted numerous industries and the work force associated with them, working from home will be a trend that remains for the foreseeable future. As more companies work with employees to set up a home office, the question for businesses is how does the company keep a highideas, innovation, management, technology, Technology & Innovation Articles on Business 2 Community

The post 20 Working from Home Security Tips for 2021 By Andrew Lopez appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

A paralyzed man is challenging Neuralink’s monkey to a match of mind Pong

Posted: 14 May 2021 01:39 PM PDT

dWeb.News Article from Antonio Regalado

A man with a brain implant that allows him to control computers via mental signals says he is ready to challenge Elon Musk's neuroscience company Neuralink in a head-to-head game of Pong—with a monkey.

Neuralink is developing advanced wireless brain implants so humans can connect directly to computer networks. In April, researchers working with the company showed off videos of a rhesus monkey named Pager who can play the classic paddle game using thought signals. The company's monkey MindPong video won raves from Musk acolytes, who acclaimed it as the billionaire's latest mind-blowing deed.

"As soon as I saw it I said, 'I wonder if I could beat that monkey,'" says Nathan Copeland, who six years ago received a different type of implant that he regularly uses to play video games.  

Copeland was hurt in car accident and now can't walk or move his fingers. He does retain movement in his shoulder, and he can operate a computer and trackpad by typing with the side of his fist. That means he's not totally reliant on his brain interface. "I do enjoy playing with my mind, though," he says.

Copeland says he is now ready to challenge the monkey to the first "interspecies battle" in Pong.

"We are preparing and training already," says Copeland, who played his first games of thought Pong this week.

Game on!

A man vs. monkey mind match would do little to advance scientific understanding. What it would underscore is the promise of brain-machine interfaces to give severely paralyzed people freer access to computers and the internet for whatever purposes they need or want.

The Pong match could be held online and broadcast on Twitch, the streaming service for gamers, where Copeland has a profile and daydreams of becoming a star with thousands of followers.

Neuralink's initial goal for its implants, as explained in a blog post last month, is "to give people with paralysis their digital freedom back" by letting them "communicate more easily via text, to follow their curiosity on the web, to express their creativity through photography and art, and, yes, to play video games."

Copeland already uses mental commands to play video games including Sega classics like Sonic the Hedgehog. He admits it was a "tough" question whether to challenge Musk's monkey or not. "I could get my ass beat," he says. "But yeah, I would play."

Copeland issued the challenge in an interview and on today's episode of the national public radio program Science Friday, where he appeared to discuss brain interfaces.

Neuralink, a secretive company established by Musk in 2016, did not respond to our attempts to relay the Pong challenge.

Nathan Copeland using a neural implant to play Pong with his mind this week at the University of Pittsburgh.

COURTESY OF NATHAN COPELAND

Playing at home

Brain interfaces work by recording the electrical firing of neurons in the motor cortex, the part of the brain which controls movement. Each neuron's firing rate contains information about movements a subject is making or merely imagining. A "decoder" program then translates the signals into a command that can be conveyed to a computer cursor.

Copeland is one of a handful of humans with an older style of implant, called a Utah array, which he uses in experiments at the University of Pittsburgh to do things including moving robotic arms. Before Copeland performs a task, he begins with a 10-minute training session so an algorithm can map firing signals from his neurons to specific movements. After such a session, Copeland says, he can think a computer cursor left or right, forward or back. Thinking of closing his hand causes a mouse click.

Beginning last March, the Pittsburgh team arranged for Copeland to use his brain implant on his own, at home, to operate a tablet computer. He's used it to surf the web and draw pictures of a cat with a painting program. Last spring, he was using it six hours a day. "It got me through the pandemic," he says.

This picture of a cat was drawn by Nathan Copeland, who is paralyzed but uses a brain-computer interface to control a computer. The image is for sale as a non-fungible token.

NATHAN COPELAND

The tablet is not particularly powerful, though. And he can only use it with batteries. He's not supposed to plug his brain into any device directly connected to the electrical grid, since no one knows what effect a power surge could have. "I have encouraged him to be careful what software he puts on it," says Jeffrey Weiss, a Pittsburgh researcher who works with Copeland. "I don't have restrictions other than not to break the thing, and don't get malware on it. It's just a Windows machine."

Copeland's interface was installed by a neurosurgeon six years ago. He has four silicon implants in all. The two on his motor cortex allow him to control a robotic arm used in experiments or a computer cursor. Another two, in the somatosensory part of his brain, allow scientists to send signals into his mind, which he registers as sensations of pressure or tingling on his fingers.

The monkey's advantage

If a mind match occurs, Neuralink's primate would have the advantage of a next-generation interface, which the company calls "the Link." While Copeland has to attach cables to two ports on his skull, Neuralink's implant is about the size of a soda bottle cap and is embedded entirely in the skull. It transmits the brain recordings wirelessly, via Bluetooth.

"It's a very promising device, but it's new, and there are many questions about it," Weiss says. "No one outside Neuralink has been able to get a look at it." The company has said it hopes to recruit human subjects, but that will depend on how the implant holds up in animals, including pigs, which Neuralink is performing tests on. "No one knows if it's going to last six months or six years," says Weiss.

The Neuralink implant also records from more neurons at one time than previous devices. The model in the monkey's brain employs around 1,000 fine-wire electrodes, whereas those in Copeland's motor cortex are recording from about 160 motor neurons at once.

Weiss says he's not sure who would win the Pong match and that it's unclear whether recording from more neurons would improve control over the two-dimensional movements of a Pong paddle. "Monkeys are probably not better, but what they have is a lot of time to practice," he says.

But Pong is as much a mind game as one of physical dexterity. As a human, Copeland would have the advantage of ingenuity: some Pong games allow the player to hit the ball at sharper angles, using risky maneuvers such as swiftly moving the paddle to intercept the ball, or striking with a corner.

Copeland began practicing this week in the Pittsburgh lab, accessing the online game Project:Pong. He hopes he can find a sponsor to back him and maybe raise funds for a new computer. After playing, he was reminded that Pong is not as easy as it looks: "I would definitely need to practice more," he says.

A man with a brain implant that allows him to control computers via mental signals says he is ready to challenge Elon Musk's neuroscience company Neuralink in a head-to-head game of Pong—with a monkey. Neuralink is developing advanced wireless brain implants so humans can connect directly to computer networks. In April, researchers working with the…Brain-computer interface, Humans and technology, biotechnology, neural networks

The post A paralyzed man is challenging Neuralink's monkey to a match of mind Pong appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

How to Develop a Cybersecurity Strategy for Your Online Business

Posted: 14 May 2021 01:39 PM PDT

dWeb.News Article from Hasan Saleem

Since the onset of the COVID-19 pandemic, and with the subsequent shift to work and life online, cybercrime has been booming, forming a serious threat to the digital security of businesses. 

According to a recent cybersecurity report, cyberattacks are the fastest-growing crime segment in the United States. For 2022, experts predict $6 trillion in global losses – almost 60 times higher than in 2015.  

How to Develop a Cybersecurity Strategy for Your Online Business   

Consequently, cybersecurity has become more important than ever across the board – whether in education or investment banking. The same is true for your online business. 

However, to sustainably and effectively implement cybersecurity measures, you need a strategy – no matter whether you are a solo freelancer or run a virtual team. 

To help you, here is an actionable step-by-step guide for developing a cybersecurity strategy for your online business.  

1 – Understand the Risks and Raise Awareness in your Team

To begin with, you need to educate yourself on cybersecurity challenges in your industry. 

Freelancers or small core teams run many online businesses, and digital safety is often an afterthought. After all – only cyberattacks on large corporations end up in the news. Small businesses, it seems, are not attractive targets.  

This is simply untrue. Out of 2020's successful data breaches, 28% – almost a third! – affected small businesses, according to Verizon.

Similarly, CNBC reports that 43% of cyberattacks target small businesses. Moreover, the consequences of a breach can be devastating. On average, they cost businesses $200,000. Unsurprisingly, 60% of small businesses that suffered breaches find themselves unable to cope and go out of business within 6 months. 

From the attacker's point of view, targeting these businesses makes sense. While less lucrative than larger victims, they're often low-hanging fruit. Breaching a small online business or a single freelancer and siphoning off all their clients – data is often trivial.

In creating your cybersecurity strategy, you need to be aware of these facts. More importantly, you also need to raise awareness of cybersecurity issues in your team. This includes other freelancers you might work with. 

The world's best cybersecurity strategy will fail to protect your business if your team won't follow it – or if a less careful partner of yours is breached. 

In fact, the World Economic Forum calls the lack of cybersecurity expertise and awareness in teams one of the top digital safety challenges for businesses in 2021. 

For all these reasons, the first step in developing your cybersecurity strategy is researching current digital threats, both in general and especially those prevalent in your industry. Once you have a grounded idea of what you are facing, you can start work to secure your business.

2 – Take Stock of Your Current Setup, Data, and Digital Security  

To develop your strategy, you need to assess your current virtual business setup. This includes 4 major components: people, hardware, software, and data. 

First, you need to verify who has access to what accounts, tools, and platforms. Even for freelancers, this might not be as simple a question to answer as you may believe. Consider, for instance, the web designer who built your site, collaborating creatives on any of your cloud drives, or apps you've given permission

Even something as simple as your family members using your devices can be a security risk in the long run. At this stage, also verify whether the people who can access your assets have themselves shared the credentials with anyone else. 

Second, create an IT inventory. Besides computers, tablets and phones, this includes routers and external storage devices. Perform a network scan of your home and office network to see if you actually recognize all the devices that are connected. Also, check and list the technical specs and operating system (OS) versions of each device. The older the device and OS, the more vulnerable they generally are.  

Third, compile a list of all the software solutions you use for your business, whether they are local apps, SaaS cloud solutions or plugins. Get an overview of the account, billing information, and access the information you use for each. For locally installed software, also note the version you are currently running. 

Finally, you will need an inventory of all the data your business handles – and where that data is stored. Note which local drives, external drives, and online storage solutions you have. When doing this, be sure to highlight which data is particularly sensitive and needs to be prioritized in terms of digital security. For example, client payment information and account credentials are in this category.

3 – Protect Your Virtual Assets

As a next step, address the weak points in your current setup to protect your virtual assets. 

To start with, evaluate and strengthen the passwords identified in the previous step and define who gets access to what. 

This might seem menial, but weak passwords and account sharing have brought even large enterprises low.

Also, change all default credentials on your accounts and devices. Especially when it comes to your routers, there are several precautions you can take to increase security, from changing the network name and admin credentials to disabling WPS and Remote Access. 

If you don't have one yet, get a reputable password manager. This is invaluable in keeping track of all your passwords – and generating secure ones when you open a new account. 

Secure your password resets, too: Set up customer service pins if you can, and don't use real information for security questions. Where possible, enable two-factor authentication (2FA) or multi-factor authentication (MFA). 

Next, go through all your devices, update the operating systems, and enable encryption and theft protection features. Updating your devices regularly is an essential element of maintaining your digital safety. The majority of technical data breaches don't exploit new vulnerabilities, but developers have already fixed known ones. To benefit from these fixes, though, users need to actually install updates and patches

In terms of network security, get a high-quality VPN if you ever use anybody else's or even public Wi-Fi. A more reliable (but also more expensive) alternative would be to get a mobile router.

Finally, also to think about digital security training – both for yourself and your team members. At the very least, make a cybersecurity briefing part of the onboarding procedure for new team members and freelancers.  

4 – Detect Threats, Invest in Digital Security Solutions 

Once you have put measures in place to protect your assets as well as possible, move on to installing safeguards that detect incoming threats. 

Most obviously, you need to have antivirus software installed. Given the potential cost of a cyber breach, consider investing in a paid plan by a reputable, well-established antivirus provider (see: techradar dotcom — best antivirus). Examples include Bitdefender, Norton, or Kaspersky. Make sure to stick to a fixed schedule for installing updates on your antivirus and perform scans regularly. 

When comparing solutions, comprehensive options have advantages over combining stand-alone services by different providers. Many vendors offer bundles that are simple to set up, yet combine VPNs, encryption solutions, backups, and various kinds of real-time protection. 

Going even further, some services such as Aura provide all-encompassing digital security solutions that go beyond your system. They combine technical aspects like Wi-Fi protection, VPN, and antivirus with credit monitoring, reputation monitoring, and identity theft insurance. 

5 – Set up a Response Plan to Round off Your Cybersecurity Strategy 

The final part of your strategy to protect yourself from breaches is setting up a plan for how to respond to them. 

Clearly define a procedure for worst-case scenarios, such as identity theft, a successful phish, or a ransomware attack. Layout all the steps you would have to take in each case – from wiping affected devices to requesting credit freezes. 

Also, keep a list of those who need to be notified if your business is compromised, and who could help you if a breach does happen. 

Having this information at your fingertips is invaluable if worse comes to worst. Responding swiftly to a suspected breach is critical to minimize the damage to your business and reputation. 

The Bottom Line 

Setting up a cybersecurity strategy to protect your online business is essential to operating in the virtual sphere in 2021. The cost of a data breach in your business is potentially devastating both in terms of reputation and finances. 

By following the steps outlined in this article, you'll be able to develop an actionable strategy to minimize the risk of breaches. And to swiftly respond in case they do happen. Ultimately, this will help you operate more safely. And you'll be able to rest assured that both your own and your client's data is as secure as it can be. 

The post How to Develop a Cybersecurity Strategy for Your Online Business appeared first on ReadWrite.

Since the onset of the COVID-19 pandemic, and with the subsequent shift to work and life online, cybercrime has been booming, forming a serious threat to the digital security of businesses.  According to a recent cybersecurity report, cyberattacks are the fastest-growing crime segment in the United States. For 2022, experts predict $6 trillion in global
The post How to Develop a Cybersecurity Strategy for Your Online Business appeared first on ReadWrite.Data and Security, Small Business, cybersecurity, digital security

The post How to Develop a Cybersecurity Strategy for Your Online Business appeared first on dWeb.News Daniel Webster dWeb Internet Cowboy

No comments:

Post a Comment