TensorBoard: Embedding Visualization for Tensorflow

Embeddings are ubiquitous in machine learning, appearing in recommender systems, NLP, and many other applications. Indeed, in the context of TensorFlow, it’s natural to view tensors (or slices of tensors) as points in space, so almost any TensorFlow system will naturally give rise to various embeddings. To learn more about embeddings and how to train Read more about TensorBoard: Embedding Visualization for Tensorflow[…]

Open-sourcing DeepMind Lab

DeepMind Lab is a fully 3D game-like platform tailored for agent-based AI research. It is observed from a first-person viewpoint, through the eyes of the simulated agent. Scenes are rendered with rich science fiction-style visuals. The available actions allow agents to look around and move in 3D. The agent’s “body” is a floating orb. It Read more about Open-sourcing DeepMind Lab[…]

OpenAI Universe allows your AI to train on games, browsers by looking at screen pixels. Uses Gym (also OSS) for algo devs

We’re releasing Universe, a software platform for measuring and training an AI’s general intelligence across the world’s supply of games, websites and other applications. Universe allows an AI agent to use a computer like a human does: by looking at screen pixels and operating a virtual keyboard and mouse. We must train AI systems on Read more about OpenAI Universe allows your AI to train on games, browsers by looking at screen pixels. Uses Gym (also OSS) for algo devs[…]

Guessing valid credit card numbers in six seconds? Priceless

Fraudsters can guess credit card numbers in as little as six seconds per attempt thanks to security gaps in Visa’s network, academics say. The brute force attacks allow criminals to bombard Visa with card payment requests across multiple sites with each attempt narrowing the possible combinations until a valid card number and expiry date are Read more about Guessing valid credit card numbers in six seconds? Priceless[…]

Vulnerability Note VU#582384 – Multiple Netgear routers are vulnerable to arbitrary command injection

Netgear R7000, firmware version 1.0.7.2_1.1.93 and possibly earlier, and R6400, firmware version 1.0.1.12_1.0.11 and possibly earlier, contain an arbitrary command injection vulnerability. By convincing a user to visit a specially crafted web site, a remote unauthenticated attacker may execute arbitrary commands with root privileges on affected routers. A LAN-based attacker may do the same by Read more about Vulnerability Note VU#582384 – Multiple Netgear routers are vulnerable to arbitrary command injection[…]

How IBM Watson saved the life of a woman dying from cancer, exec says – Business Insider

“There’s a 60-year-old woman in Tokyo. She was at the University of Tokyo. She had been diagnosed with leukemia six years ago. She was living, but not healthy. So the University of Tokyo ran her genomic sequence through Watson and it was able to ascertain that they were off by one thing. Actually, she had Read more about How IBM Watson saved the life of a woman dying from cancer, exec says – Business Insider[…]

Full Disclosure: [ESNC-2041217] Critical Security Vulnerability in PwC ACE Software for SAP Security

An attacker can misuse PwC ACE security vulnerability in order to: – make changes to the production systems and their settings including manipulating or corrupting ABAP programs shipped by SAP and making the system and data inoperable; – plant an SAP backdoor for accessing the system and sensitive data later; and – shut down the Read more about Full Disclosure: [ESNC-2041217] Critical Security Vulnerability in PwC ACE Software for SAP Security[…]

AMD Introduces Radeon Instinct Machine Intelligence And Deep Learning Accelerators

AMD is announcing a new series of Radeon-branded products today, targeted at machine intelligence (AI) and deep learning enterprise applications, called Radeon Instinct. As its name suggests, the new Radeon Instinct line of products are comprised of GPU-based solutions for deep learning, inference, and training. The new GPUs are also complemented by a free, open-source library Read more about AMD Introduces Radeon Instinct Machine Intelligence And Deep Learning Accelerators[…]

Hardcoded root accounts found in 80 Sony IP security camera models

Researchers from SEC Consult have found two backdoor accounts that exist in 80 models of professional Sony security cameras, mainly used by companies and government agencies given their high price. One set of hard-coded credentials is in the Web interface and allows a remote attacker to send requests that would enable the Telnet service on Read more about Hardcoded root accounts found in 80 Sony IP security camera models[…]

Chicago Face Database

The Chicago Face Database was developed at the University of Chicago by Debbie S. Ma, Joshua Correll, and Bernd Wittenbrink. The CFD is intended for use in scientific research. It provides high-resolution, standardized photographs of male and female faces of varying ethnicity between the ages of 17-65. Extensive norming data are available for each individual Read more about Chicago Face Database[…]

PowerShell security threats greater than ever, researchers warn

In March 2016, security experts warned that PowerShell had been fully weaponised. In the following month, a report confirmed that PowerShell was used to launch 38% of cyber attacks seen by security firm Carbon Black and its partners in 2015. Now more than 95% of PowerShell scripts analysed by Symantec researchers have been found to Read more about PowerShell security threats greater than ever, researchers warn[…]

Holding Shift + F10 During Windows 10 Updates Opens Root CLI, Bypasses BitLocker – Slashdot

This CLI debugging interface grants the attacker full access to the computer’s hard drive, despite the presence of BitLocker. The reason is that during the Windows 10 update procedure, the OS disables BitLocker while the Windows PE (Preinstallation Environment) installs a new image of the main Windows 10 operating system. Source: Holding Shift + F10 Read more about Holding Shift + F10 During Windows 10 Updates Opens Root CLI, Bypasses BitLocker – Slashdot[…]

Uber begins collection of rider location data – whether using the app or not

The app update (it’s 3.222.4, for those keeping track) changes the way Uber collects location data from its users. Previously, Uber only collected location information while a user had the app open – now, Uber asks users to always share their location with the ride-hailing company. Uber says that, even though it can harvest your Read more about Uber begins collection of rider location data – whether using the app or not[…]

The FBI Just Got Disturbing New Hacking Powers

Under the old version of “Rule 41,” agencies like the FBI needed to apply for a warrant in the right jurisdiction to hack a computer, presenting difficulties when investigating crimes involving suspects who had anonymized their locations or machines in multiple places. Under the new version, a federal judge can approve a single search warrant Read more about The FBI Just Got Disturbing New Hacking Powers[…]