WHY IT MATTERS: Digital Transformation
214.2K views | +0 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Automobile', 'Security'. Clear
Scooped by Farid Mheir
Scoop.it!

Facial Recognition Is Already Here: These Are The 30+ US Companies Testing The Technology via @CBInsights

Facial Recognition Is Already Here: These Are The 30+ US Companies Testing The Technology via @CBInsights | WHY IT MATTERS: Digital Transformation | Scoop.it

US corporates are currently using facial recognition for everything from fast food orders to trying on makeup to issuing life insurance policies, and more.

Farid Mheir's insight:

WHY IT MATTER: facial recognition used to be a very difficult thing to do but AI and machine learning specifically has blown this out the water opening the way for a slew of real world useful applications. 

The Media Lab's curator insight, June 12, 2019 8:48 AM
A great concept!
ECMFAD's curator insight, June 13, 2019 1:24 PM
Share your insight
Scooped by Farid Mheir
Scoop.it!

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots | WHY IT MATTERS: Digital Transformation | Scoop.it

Exclusive research by us at LDV Capital is the first publicly shared, in-depth analysis which estimates how many cameras will be in the world in 2022. Key Findings include:

  • Most of the pictures captured will never be seen by a human eye.
  • A paradigm shift will take place in the meaning and use of a camera.
  • Over the next five years there will be a proliferation of cameras integrated into products across industries and markets.
  • Where there is growth in cameras there will be tremendous business opportunities in the capture, analysis and interpretation of visual data.
  • Depth capture will double the number of cameras in handheld cameras.
  • By 2022, the number of cameras will be nearly 12X the 2012 figures.
  • Your smartphone will have between 4 and 10 cameras by 2022.
  • The Internet of Eyes will be larger than the Internet of Things.
  • In the next five years, robotics will have 20X more integrated cameras.
  • By 2022, all new vehicles will be equipped with more than 25 cameras and this does not include Lidar or Radar.
Farid Mheir's insight:

WHY IT MATTERS: cameras will become ubiquitous and AI systems will analyze those images to provide business services but also track our every move. This reports presents trends in this area.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

19 Security Hacks That Target physical devices

19 Security Hacks That Target physical devices | WHY IT MATTERS: Digital Transformation | Scoop.it
With Blackhat USA behind us and Defcon in its full throes, there seems to be a trend away from purely digital hacks and toward physical devices. In that spirit, here are nineteen amazing hacks that cross the physical divide.
Farid Mheir's insight:

A review of 19 security hacks on physical devices Compromise Cars, Pacemakers, Mobile Phones, and ATMs.


WHY THIS  IS IMPORTANT

As more devices become digital, more hacks become possible. Get used to it!

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How to hack a Tesla model S? DEFCON Hacking Conference

How to hack a Tesla model S? DEFCON Hacking Conference | WHY IT MATTERS: Digital Transformation | Scoop.it

The Tesla Model S is the most connected car in the world. It might surprise you to hear that it is also one of the most secure. In this talk we will walk you through the architecture of a Tesla Model S noting things that Tesla got right as well as identifying those that they got wrong. From this talk you will get an intimate understanding of how the many interconnected systems in a Tesla model S work and most importantly how they can be hacked. You will also get a good understanding of the data that this connected car collects and what Tesla does with this telemetry. We will also be releasing a tool that will enable Tesla Model S owners to view and analyse that telemetry in real time. Finally we will also be releasing several 0day vulnerabilities that will allow you to hack a Tesla Model S yourself - both locally and remotely. Note - only one of the 6 vulnerabilities we will discuss and release has been fixed. Disclaimer: With great access comes great responsibility - In other words we are not responsible for any Tesla Model S bricked by over enthusiastic attendees of this talk :)

Farid Mheir's insight:

I love August because it is the month where hacking conferences are held. And they always have their share of flamboyant hacks like this one. Looking forward to see what this year's crop will bring...


Also read the short piece in the WSJ about the hack and what it does.

http://blogs.wsj.com/digits/2015/08/06/hackers-take-control-of-a-tesla-sort-of/ 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Hackers Remotely Kill a Jeep on the Highway—With Me in It

Hackers Remotely Kill a Jeep on the Highway—With Me in It | WHY IT MATTERS: Digital Transformation | Scoop.it
I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold.
Farid Mheir's insight:

A team of engineers remotely gain control over a Jeep and demonstrate vulnerabilities in its computer systems.


WHY THIS IS IMPORTANT

I wrote about this before as a reminder that digital transformation enables great new opportunities as well as new security and privacy issues.


More about this here http://www.scoop.it/t/digital-transformation-of-businesses/?tag=carJacking 

Rob Joyce's curator insight, July 23, 2015 7:16 AM

Hackers Remotely

Scooped by Farid Mheir
Scoop.it!

Great #IoT example: Tesla cars Over-the-Air Repairs Are the Way Forward via MIT @TechReview

Great #IoT example: Tesla cars Over-the-Air Repairs Are the Way Forward via MIT @TechReview | WHY IT MATTERS: Digital Transformation | Scoop.it
Tesla and GM have both issued fire-related recalls, but Tesla’s fix doesn’t require owners to bring their cars in.
Farid Mheir's insight:

Benefits of having an Internet connected device - here a car - is that it can be remotely updated to fix issues or tune performance. Convenience and fast improvements.


Remember that this means it can also be remotely monitored, both for good and bad reasons, which may also raise security and privacy concerns.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

A world where everything is hackable via @Strata @acroll

A world where everything is hackable via @Strata @acroll | WHY IT MATTERS: Digital Transformation | Scoop.it

Let’s say you fancy a fast car. Flavio Garcia, a University of Birmingham computer scientist, discovered the algorithim that verifies the ignition key for luxury cars like Porsches, Audis, Bentleys, and Lamborghinis. He was slapped with an injunction to ban him from disclosing his findings at the Usenix Security Symposium in order to prevent sophisticated criminal gangs from having the analytics tools for widespread car theft.

You might need Garcia’s algorithm to steal a car, but soon, with an entirely different algorithm, you may be able to crash one into a tree or disable its brakes from a distance. Or maybe it’s a fast boat you’re after. Mess with its GPS, and you can steer it where you want without the crew noticing.

Farid Mheir's insight:

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 


Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.


Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.



Farid Mheir's curator insight, November 13, 2016 1:59 PM

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 

 

Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.

 

WHY THIS IS IMPORTANT

Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.

Felix Cheang's curator insight, November 13, 2016 7:36 PM

As long as there is a chip inside, anything is hackable....

Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

A world where everything is hackable via @Strata @acroll

A world where everything is hackable via @Strata @acroll | WHY IT MATTERS: Digital Transformation | Scoop.it

Let’s say you fancy a fast car. Flavio Garcia, a University of Birmingham computer scientist, discovered the algorithm that verifies the ignition key for luxury cars like Porsches, Audis, Bentleys, and Lamborghinis. He was slapped with an injunction to ban him from disclosing his findings at the Usenix Security Symposium in order to prevent sophisticated criminal gangs from having the analytics tools for widespread car theft.

You might need Garcia’s algorithm to steal a car, but soon, with an entirely different algorithm, you may be able to crash one into a tree or disable its brakes from a distance. Or maybe it’s a fast boat you’re after. Mess with its GPS, and you can steer it where you want without the crew noticing.

Farid Mheir's insight:

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 

 

Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.

 

WHY THIS IS IMPORTANT

Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.

Farid Mheir's curator insight, August 30, 2013 10:01 AM

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 


Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.


Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.



Felix Cheang's curator insight, November 13, 2016 7:36 PM

As long as there is a chip inside, anything is hackable....

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/