Implementing Delegated Administration with the ForgeRock 5.5 Platform – ForgeRock Forum and Blog
— Read on forum.forgerock.com/2018/02/implementing-delegated-administration-forgerock-5-5-platform/
An Australian woman practicing her golf game at a local course came upon an unusual hazard on the fifth green — a kangaroo boxing with the flag.
— Read on www.upi.com/Odd_News/2018/03/22/Golfer-catches-kangaroo-fighting-flag-on-fifth-green/4391521738489/
Interesting, but not arranged by food groups. Unless you’re one of those people who consider pecans a food group. Lol. #ScratchingMyHead at how pecans get their own category and get listed in the first position.
Nice step in closing gaps between ML training, usage, feedback, and retraining. Hopefully it will also evolve into a service that independent app developers can use.
Apple, IBM add machine learning to partnership with Watson-Core ML coupling | TechCrunch
— Read on techcrunch.com/2018/03/19/apple-ibm-extend-partnership-with-watson-core-ml-coupling/
In macOS, the Dock provides convenient one-click access to your most frequently used Mac applications. The simplest way to organize docked apps is to…
— Read on www.macrumors.com/how-to/group-app-icons-macos-dock/
ML requires training a model to recognize inputs. It’s impossible to create one ML Model to recognize all possible real world situations, so it’s necessary to continue collecting data, “retrain” the model, and redeploy the updated model.
For anyone who’d rather not ship all of their information to someone else’s cloud, we’re still years away from real ML capabilities for our own devices.
If anyone knows of an available ML solution that can perform continuous training/learning on a local device, I’d love to hear about it.
ByTheWay… you don’t have to own one of these devices to have your privacy violated… simply being in range of someone else’s camera opens the door to abusive companies.
If you’ve updated to MacOS High Sierra (OSX 10.13), this is not good news. Although Apple released a bug fix, it should really give security conscious users some pause.
There are some good overviews of how to harden MacOS/OSX, but I haven’t seen an updated guide that specifically addresses this latest problem (researchers just haven’t had time to investigate the underlying problems and the full extent of what Apple changed and what is affected. Despite that gap, reviewing a hardening guide and applying relevant procedures is still a good practice. Here’s a couple references to get you started.
Additionally, here’s a link to a good description of the root account security bug and a manual procedure which hardens the system against this problem. Conversations in the SecKC community and other security community confirmed the vulnerability and confirmed this manual config appears to address the problem.
Unfortunately this manual approach probably isn’t for most home/casual consumer users. It requires using the Terminal and some advanced features most users never interact with. And it introduces a security configuration which would probably complicate future updates and changes for many people.
Bottom line. Apple really messed up.
So what should you do? If you’re a security conscious person with system administrator skills, you should spend the time it takes to harden your system (and test that hardening). If your not a sys admin, update update update. And keep checking for more updates over the next days and weeks.
Does your cyber security program address doppelgänger domains, typo squatting, and counterfeit apps?Organizational impersonation (brand hijacking) uses your reputation to dupe a victim. These attacks never hit your firewalls.
Let that sink in. A brand impersonation/hijacking attack is unlikely to touch any of you apps, websites, networks, firewalls, or logs. It occurs completely outside of and independent of any resources under your organizational control.
Fortunately, basic defenses against these kind of risks can be implemented with rather simple tools; yet, this topic is overlooked by many organizations and security teams. Yet, it yields a two for one benefit… the same practices that reduce risks of brand hijacking are also applicable to verify the apps and services your organization consumes from others are legitimate and secure.