01 Nov '17, 3pm

Cybersecurity for Cyborgs: Keeping Connected Medical Devices Safe

Where should one draw the line between machine and human? “Cyborg” medical devices to save human lives, boost human health, or provide new ways for people to interact with their world have been used since ancient times. However, the pace of development of artificial intelligence and machine learning in the present day means that it’s key to look at how people interact with technology now. The Institute for Critical Infrastructure Technology (ICIT), a cybersecurity consortium, has put out a paper entitled “Hacking Cyborgs: By 2025, Non-Augmented Humans Will Be Obsolete. But There’s Bad News... ” It focuses on contemporary devices such as implanted near-field communication (NFC) tags and neural meshes, and investigates possible attack vectors and protection strategies for the cyborg present. The paper, written by ICIT Co-Founder & Sr. Fellow James Scott, is available here .

Full article: https://www.pddnet.com/news/2017/11/cybersecurity-cyborgs...

Tweets

Cybersecurity for Cyborgs: Keeping Connected Me...

pddnet.com 01 Nov '17, 7pm

Where should one draw the line between machine and human? “Cyborg” medical devices to save human lives, boost human health...

#Cybersecurity for Cyborgs: Keeping Connected M...

pddnet.com 02 Nov '17, 11pm

Where should one draw the line between machine and human? “Cyborg” medical devices to save human lives, boost human health...

When is it safe to go with a .CO, .ME or .IO and when is it foolish?

When is it safe to go with a .CO, .ME or .IO an...

morganlinton.com 01 Nov '17, 2pm

It’s a question my startup founders ask themselves – do I need to spend a bunch of money on the .COM or am I okay with a ....

Qatar – F-15QA Construction, Cybersecurity, and...

dsca.mil 01 Nov '17, 9pm

WASHINGTON, Nov 1, 2017 - The State Department has made a determination approving a possible Foreign Military Sale to Qata...

Mr. Goodman is back. Turns out he has a wife an...

statutes.agc.gov.sg 01 Nov '17, 3pm

—(1) In this Act, unless the context otherwise requires — “computer” means an electronic, magnetic, optical, electrochemic...

Call to Arms on Cybersecurity for Industrial Co...

eetimes.com 03 Nov '17, 4am

BOULDER CREEK, Calif. — Since last spring, U.S. Department of Homeland Security warnings to manufacturers and infrastructu...

#AI IT #Security

#AI IT #Security

breakingdefense.com 13 Nov '17, 9pm

That creates a strategic imperative for automation: software programs that can detect vulnerabilities and ideally even pat...