TinyML as a Service and machine learning at the edge – Ericsson

This is the second post in a series about tiny machine learning (TinyML) at the deep IoT edge. Read our earlier introduction to TinyMl as-a-Service, to learn how it ranks in respect to traditional cloud-based machine learning or the embedded systems domain.

TinyML is an emerging concept (and community) to run ML inference on Ultra Low-Power (ULP ~1mW) microcontrollers. TinyML as a Service will democratize TinyML, allowing manufacturers to start their AI business with TinyML running on microcontrollers.

In this article, we introduce the challenges behind the applicability of ML concepts within the IoT embedded world. Furthermore, we emphasize how these challenges are not simply due to the constraints added by the limited capabilities of embedded devices but are also evident where the computation capabilities of ML-based IoT deployments are empowered by additional resources confined at the network edge.

To summarize the nature of these challenges, we can say:

Below, we take a closer look at each of these challenges.

Edge computing promises higher performing service provisioning, both from a computational and a connectivity point of view.

Edge nodes support the latency requirements of mission critical communications thanks to their proximity to the end-devices, and enhanced hardware and software capabilities allow execution of increasingly complex and resource-demanding services in the edge nodes. There is growing attention, investments and R&D to make execution of ML tasks at the network edge easier. In fact, there are already several ML-dedicated "edge" hardware examples (e.g. Edge TPU by Google, Jetson Nano by Nvidia, Movidius by Intel) which confirm this.

Therefore, the question we are asking is: what are the issues that the edge computing paradigm has not been able to completely solve yet? And how can these issues undermine the applicability of ML concepts in IoT and edge computing scenarios?

We intend to focus on and analyze five areas in particular: (Note: Some areas we describe below may have solutions through other emerging types of edge computing but are not yet commonly available).

Figure 1

The web and the embedded worlds feature very heterogeneous characteristics. Figure 1 (above) depicts how this high heterogeneity is characterized, by comparing qualitatively and quantitively the capacities of the two paradigms both from a hardware and software perspective. Web services can rely on powerful underlying CPU architectures with high memory and storage capabilities. From a software perspective, web technologies can be designed to choose and benefit from a multitude of sophisticated operating systems (OS) and complex software tools.

On the other hand, embedded systems can rely on the limited capacity of microcontroller units (MCUs) and CPUs that are much less powerful when compared with general-purpose and consumer CPUs. The same applies with memory and storage capabilities, where 500KB of SRAM and a few MBs of FLASH memory can already be considered a high resource. There have been several attempts to bring the flexibility of Linux-based systems in the embedded scenario (e.g. Yocto Project), but nevertheless most of 32bit MCU-based devices owns the capacity for running real-time operating systems and no more complex distribution.

In simple terms, when Linux can run, system deployment is made easier since software portability becomes straightforward. Furthermore, an even higher cross-platform software portability is also made possible thanks to the wide support and usage of lightweight virtualization technologies such as containers. With almost no effort, developers can basically ship the same software functionalities between entities operating under Linux distributions, as happens in the case of cloud and edge.

The impossibility of running Linux and container-based virtualization in MCUs represents one of the most limiting issue and bigger challenge for current deployments. In fact, it appears clear how in typical "cloud-edge-embedded devices" scenarios, cloud and edge services are developed and deployed with hardware and software technologies, which are fundamentally different and easier to be managed if compared to embedded technologies.

TinyML as-a-Service tries to tackle this issue by taking advantage of alternative (and lightweight) software solutions.

Figure 2

In the previous section, we considered on a high-level how the technological differences between web and embedded domains can implicitly and significantly affect the execution of ML tasks on IoT devices. Here, we analyze how a big technological gap exists also in the availability of ML-dedicated hardware and software web, edge, and embedded entities.

From a hardware perspective, during most of computing history there have been only a few types of processor, mostly available for general use. Recently, the relentless growth of artificial intelligence (AI) has led to the optimization of ML tasks for existing chip designs such as graphics processing units (GPUs), as well as the design of new dedicated hardware forms such as application specific integrated circuits (ASICs), which embed chips designed exclusively for the execution of specific ML operations. The common thread that connects all these new devices is their usage at the edge. In fact, these credit-card sized devices are designed with the idea of operating at the network edge.

At the beginning of this article we mentioned a few examples of this new family of devices (Edge TPU, Jetson Nano, Movidius). We foresee that in the near future even more big and small chip and hardware manufacturers will increasingly invest resources into the design and production of ML-dedicated hardware. However, it appears clear how, at least so far, there has not been the same effort in the embedded world.

Such a lack of hardware availability undermines somehow a homogeneous and seamless ML "cloud-to-embedded" deployments. In many scenarios, the software can help compensate for hardware deficiencies. However, the same boundaries that we find in the hardware sphere apply for the development of software tools. Today, in the web domain, there are hundreds of ML-oriented application software. Such availability is registering a constant growth thanks also to the possibility given by the different open source initiatives that allow passionate developers all over the world to merge efforts. The result is more effective, refined, and niche applications. However, the portability of these applications into embedded devices is not so straightforward. The usage of high-level programming languages (e.g., Python), as well as the large sizes of the software runtime (intended as both runtime system and runtime program lifecycle phase) are just some of the reasons why the software portability is painful if not impossible.

The main rationale behind the TinyML as-a-Service approach is precisely the one to break the existing wall between cloud/edge and embedded entities. However, to expect exactly the same ML experience in the embedded domain as we have in the web and enterprise world would be unrealistic. It is still an irrefutable fact that size matters. The execution of ML inference is the only operation that we reasonably foresee to be executed in an IoT device. We are happy to leave all the other cumbersome ML tasks, such as data processing and training, to the more equipped and resourceful side of the scenario depicted in Figure 2.

In the next article, we will go through the different features which characterize TinyML as-a-Service and share the technological approach underlying the TinyML as-a-Service concept.

In the meantime, if you have not read it yet, we recommend reading our earlier introduction to TinyMl as-a-Service.

The IoT world needs a complete ML experience. TinyML as-a-service can be one possible solution for making this enhanced experience possible, as well as expanding potential technology opportunities. Stay tuned!

Continued here:

TinyML as a Service and machine learning at the edge - Ericsson

Another free web course to gain machine-learning skills (thanks, Finland), NIST probes ‘racist’ face-recog and more – The Register

Roundup As much of the Western world winds down for the Christmas period, here's a summary of this week's news from those machine-learning boffins who havent broken into the eggnog too early.

Finland, Finland, Finland: The Nordic country everyone thinks is part of Scandinavia but isnt has long punched above its weight on the technology front as the home of Nokia, the Linux kernel, and so on. Now the Suomi state is making a crash course in artificial intelligence free to all.

The Elements of AI series was originally meant to be just for Finns to get up to speed on the basics of AI theory and practice. Many Finns have already done so, but as a Christmas present, the Finnish government is now making it available for everyone to try.

The course takes about six weeks to complete, with six individual modules and is available in English, Swedish, Estonian, Finnish, and German. If you complete 90 per cent of the course and get 50 per cent of the answers right then the course managers will send you a nice certificate.

Meanwhile, don't forget there are many cool and useful free online courses on neural networks and the like, such as Fast.ai's excellent series and Stanford's top-tier lectures and notes.

Yep, AL still racist and sexist: A major study by the US National Institute of Standards and Technology, better known as NIST, has revealed major failings in today's facial-recognition systems.

The study examined 189 software algorithms from 99 developers, although interestingly Amazons Rekognition engine didnt take part, and the results arent pretty. When it came to recognizing Asian and African American faces, the algorithms were wildly inaccurate compared to matching Caucasian faces, especially with systems from US developers.

While it is usually incorrect to make statements across algorithms, we found empirical evidence for the existence of demographic differentials in the majority of the face recognition algorithms we studied, said Patrick Grother, a NIST computer scientist and the reports primary author.

While we do not explore what might cause these differentials, this data will be valuable to policymakers, developers and end users in thinking about the limitations and appropriate use of these algorithms.

For sale: baby shoes, never worn: As Hemmingway put it, the death of a child is one of the greatest tragedies that can occur, and Microsoft wants to do something about that using machine learning.

Redmond boffins worked with Tatiana Anderson and Jan-Marino Ramirez at Seattle Childrens Research Institute, in America, and Edwin Mitchell at the University of Auckland, New Zealand, to analyse Sudden Unexpected Infant Death (SUID) cases. Using a decades worth of data from the US Center for Disease Control (CDC), covering over 41 million births and 37,000 SUID deaths, the team sought to use specially prepared logistic-regression models to turn up some insights.

The results, published in the journal Pediatrics, were surprising: there was a clear difference between deaths that occurred in the first week after birth, dubbed SUEND, which stands for Sudden Unexpected Early Neonatal Death, and those that occurred between the first week and the end of a childs first year.

In the case of SUID, they found that rates were higher for unmarried, young mothers (between 15 and 24 years old), while this was not the case for SUEND cases. Instead, maternal smoking was highlighted as a major causative factor in SUEND situations, as were the length of pregnancy and birth weight.

The team are now using the model to look down other causative factors, be they genetic, environmental or something else. Hopefully such research will save many more lives in the future.

AI cracking calculus: Calculus, the bane of many schoolchildrens lives, appears to be right up AIs street.

A team of Facebook eggheads built a natural-language processing engine to understand and solve calculus problems, and compared the output with Wolfram Mathematica's output. The results were pretty stark: for basic equations, the AI solved them with 98 per cent accuracy, compared to 85 per cent for Mathematica.

With more complex calculations, however, the AIs accuracy drops off. It scored 81 per cent for a harder differential equation and just 40 per cent for more complex calculations.

These results are surprising given the difficulty of neural models to perform simpler tasks like integer addition or multiplication, the team said in a paper [PDF] on Arxiv. These results suggest that in the future, standard mathematical frameworks may benefit from integrating neural components in their solvers.

Deep-fake crackdown: Speaking of Facebook: today, the antisocial network put out an announcement that it had shut down two sets of fake accounts pushing propaganda. One campaign, originating in the country of Georgia, had 39 Facebook accounts, 344 Pages, 13 Groups, and 22 Instagram accounts, now all shut down. The network was linked to the nation's Panda advertising agency, and was pushing pro-Georgian-government material.

What's the AI angle? Here it is: the other campaign was based in Vietnam, and was devoted to influencing US voters using Western-looking avatars generated by deep-fake software a la thispersondoesnotexist.com.

Some 610 accounts, 89 Pages, 156 Groups and 72 Instagram accounts were shut down. The effort was traced to a group calling itself Beauty of Life (BL), which Facebook linked to the Epoch Media Group, a stateside biz that's very fond of President Trump and spent $9.5m in Facebook advertising to push its messages.

"The BL-focused network repeatedly violated a number of our policies, including our policies against coordinated inauthentic behavior, spam and misrepresentation, to name just a few," said Nathaniel Gleicher, Head of Security Policy at Facebook.

"The BL is now banned from Facebook. We are continuing to investigate all linked networks, and will take action as appropriate if we determine they are engaged in deceptive behavior."

Facebook acknowledged that it took the action as a result of its own investigation and "benefited from open source reporting." This almost certainly refers to bullshit-busting website Snopes, which uncovered the BL network last month.

Sponsored: What next after Netezza?

Follow this link:

Another free web course to gain machine-learning skills (thanks, Finland), NIST probes 'racist' face-recog and more - The Register

Want to dive into the lucrative world of deep learning? Take this $29 class. – Mashable

Just to let you know, if you buy something featured here, Mashable might earn an affiliate commission.From AI to sentiment analysis, the Ultimate Deep Learning class covers it all.

Image: pexels

By StackCommerceMashable Shopping2019-12-24 10:00:00 UTC

TL;DR: Become a machine learning expert with The Ultimate Deep Learning and NLP Certification Bundle for $29, a 97% savings.

Artificial intelligence and deep learning might bring to mind pictures of Will Smith's misadventures in I, Robot, but in reality, these are the technologies behind tomorrow's world. In fact, by 2030, PwC predicts nearly 40 percent of all U.S. jobs could be replaced by AI and automation.

That's a bit frightening, but if you're one of the pros who understands the technology behind these next-generation concepts, you'll be in good shape. And luckily, this Ultimate Deep Learning and NLP Certification Bundle is on sale and a great place to start.

This bundle provides six premium courses and over 300 lessons introducing you to machine learning, neural networks, and core tools like Keras, TensorFlow, and Python. You'll get a core understanding of deep learning from a practical viewpoint and deal with issues that newcomers to the field face all for just $29.

Once you get the gist of neural networks, you'll dive deeper into NLP, which helps computers understand, analyze, and manipulate human language. And eventually, you'll build your own applications for problems like text classification, neural machine translation, and stock prediction.

Usually retailing for $1,200, this learning bundle is currently on sale for just $29. And don't worry; you can complete all of the lessons on your own time and with lifetime access, you can return to it anytime you need to.

View post:

Want to dive into the lucrative world of deep learning? Take this $29 class. - Mashable

Scientists in Scotland help develop worlds first encryption system that is unbreakable by hackers – The Independent

The worlds first uncrackable security system has been developed by researchers in Scotland, it has been claimed.

Computer scientists have long feared the arrival of quantum computing would allow encrypted data to be easily decoded by hackers.

But a global team,including scientists from the University of St Andrews, say they have achieved perfect secrecy by creating a chip which effectively generates a one-time-only key every time data is sent through it.

Sharing the full story, not just the headlines

Its the equivalent of standing talking to someone using two paper-cups attached by string, said Professor Andrea Di Falco of the School of Physics and Astronomy at the university. If you scrunched up the cups when speaking it would mask the sound, but each time it would be scrunched differently so it could never be hacked.

This new technique is absolutely unbreakable.

Southampton's Jack Stephens scores their second goal against Aston Villa

Reuters

The coffin arrives for the funeral of London Bridge terror attack victim Jack Merritt at Great St Mary's Church in Cambridge

PA

Queen Elizabeth II and her son Prince Charles walk behind the Imperial State Crown as they proccess through the Royal Gallery, before the Queen's Speech, during the State Opening of Parliament

AFP via Getty

Luke Jerram's art installation 'Gaia', a replica of planet earth created using detailed Nasa imagery of the Earth's surface, hangs on display at the Eden Project in St Austell, Cornwall

PA

A surfer gets into the festive spirit at the inland surfing lagoon at The Wave, near Bristol

PA

Snowy conditions near Deepdale in the Yorkshire Dales National Park as snow hits parts of the UK

PA

Oisin Carson, 5, picks a Christmas tree at Wicklow Way Christmas tree farm in Roundwood

PA

First Minister, Nicola Sturgeon, takes a selfie as she joins the SNPs newly elected MPs for a group photo outside the V&A Museum in Dundee, Scotland

Getty Images

Prime Minister Boris Johnson and Carrie Symonds arrive back at Downing Street after the results for the general election were announced. The Conservative Party won with an overall majority

EPA

A dog outside a polling station during the general election in Northumberland

Reuters

Liberal Democrat leader Jo Swinson stands between a Stop Brexit sign as she attends a general election campaign event at Esher Rugby Club, south west London. Britain will go to the polls tomorrow to vote

AFP via Getty

A surfer off the North East coast at Tynemouth

PA

Leah Rossiter (left) and Ceara Carney, dressed as mermaids, join members of the Irish Wildlife Trust and Extinction Rebellion Ireland protesting outside Leinster House in Dublin, against overfishing in Irish Waters

PA

Labour party leader Jeremy Corbyn poses for selfies with supporters at a general election rally in Colwyn Bay, north Wales

AFP via Getty

Speedo Mick outside the stadium before the Premier League match between Everton and Chelsea at Goodison Park

Action Images via Reuters

A climate activist wearing a mask and holding a placard reading 'Fossil fuel era is over' outside Millbank Studios in London

AP

SNP leader Nicola Sturgeon with the SNP campaign bus in front of the Queensferry Crossing, while on the General Election campaign trail in Scotland

PA

The Christmas tree in Trafalgar Square, which is given every year by the city of Oslo as a token of Norwegian gratitude to the people of London for their assistance during the Second World War

PA

Protesters against the visit of US President Trump during a demonstration near Buckingham Palace on the first day of the Nato Summit in London

EPA

England captain Joe Root celebrates reaching his double century during day 4 of the second Test match against New Zealand at Seddon Park in Hamilton, New Zealand

Getty

A hard frost is seen on the first day of the meteorological winter in Pitlochry, Scotland

Reuters

A police officer looks at flowers left at London Bridge in central London, after a terrorist wearing a fake suicide vest who went on a knife rampage killing two people, and was shot dead by police

PA

School children and students take part in the Youth Strike for Climate in London as part of the Fridays for Future Global Climate Strike

Angela Christofilou/The Independent

Cyclists make their way up a tree lined hill near to Moor Crichel in Dorset. November's dismal weather will finally change, with drier and colder conditions coming for the start of December, forecasters have said

PA

The moment a swan flew over a flock of 60,000 starlings as dusk fell on Whixall Moss Nature Reserve in Shropshire

Andrew Fusek Peters / SWNS

SNP leader Nicola Sturgeon plays with local children during a visit to the Jelly Tots & Cookies Play Cafe in Uddingston, South Lanarkshire

PA

Prime Minister Boris Johnson poses with sheep as he visits the Royal Welsh Showground, in Llanelwedd, Builth Wells, whilst on the General Election campaign trail

PA

Cush Jumbo attends the 65th Evening Standard Theatre Awards at London Coliseum

Getty Images

Labour Party leader Jeremy Corbyn meets a supporter on a train on his return from a visit to Sheffield

PA

Gallery assistants adjust 'The Ancient Town of Uglich' by Konstantin Yuon, 1913, estimated at 600,000 to 800,000, during a press preview of the sale of works by some of the most pre-eminent creators of Russian art at Sotheby's in London

PA

A mother seal appears to hug her pup as grey seals return to Donna Nook National Nature Reserve in Lincolnshire, where they come every year in late autumn and winter to give birth

PA

After Mauricio Pochettino's sacking the eveninfg before newly appointed Tottenham head coach, Jose Mourinho, takes his first training session in charge

Tottenham Hotspur FC via Getty

Prime Minister Boris Johnson during a visit to Jimmy Egan's Boxing Academy at Wythenshawe, while on the campaign trail ahead of the General Election

PA

Mist over Buttermere lake in the Lake District

PA

Stefanos Tsitsipas lifts the winners trophy after beating Dominic Thiem at the ATP World Tour Finals tennis tournament in London

EPA

Duke of York, speaking for the first time about his links to Jeffrey Epstein in an interview with BBC Newsnight's Emily Maitlis

BBC/PA

Brazilian indigenous leader, Kreta Kaingang from the Kaingang People, holds a petition letter with over 200,000 signatures asking the UK government to suspend trade talks with Brazil until the Amazon and its people are protected, as he poses outside 10 Downing Street

AFP via Getty

Spanning all four spaces and the corridor of the White Cube Bermondsey gallery Anselm Kiefer's new exhibition encompasses large-scale painting and installation

Rex Features

Labour leader Jeremy Corbyn wears a pair of mittens that say 'Pick Pam', referring to Labour MP Pam Duncan-Glancy (not pictured) as he visits the Heart of Scotstoun Community Centre in Glasgow

Getty

Head glass conservator Sam Kelly inspects the Angeli Laudantes and Angeli Ministrantes stained glass windows at Salisbury Cathedral as restoration work to clean, conserve and restore the windows, installed in 1879, gets underway

PA

Flooding in the village of Fishlake near Doncaster after a month's worth of rain fell in 24 hours

PA

World War II Supermarine Spitfire fighter performs a flyover over White Cliffs of Dover during Remembrance Sunday celebrations

Reuters

Snow falling in Glyn Ceiriog near Llangollen in Denbighshire

Steffan Williams/PA

Scottish National Party candidates, including SNP Westminster leader Ian Blackford (centre left) and Nicola Sturgeon (centre), with a Brexit message at the party's General Election campaign launch in Edinburgh

PA

Delivery lorry stuck in flood water at Coston Ford, Leicestershire after heavy rainfall in the area

PA

British Prime Minister Boris Johnson makes a statement to announce the general election at Downing Street in London, Britain

Reuters

Liberal Democrat leader Jo Swinson speaking at the launch of their general election campaign at the Institute of Civil Engineers in London

PA

View original post here:
Scientists in Scotland help develop worlds first encryption system that is unbreakable by hackers - The Independent

What’s that? Encryption’s OK now? UK politicos Brexit from Whatsapp to Signal – The Register

It's not just the European Union the UK's ruling party wishes to leave. According to the Guardian, the recently victorious Conservative party is switching from WhatsApp to Signal, in order to accommodate its new influx of MPs.

Unlike WhatsApp, which has a hard limit of 256 members for a group, Signal supports an unlimited number of participants.

The switch to Signal will also allow the Conservative party to stem the flow of leaks emerging from its inner circle.

Earlier this year, Buzzfeed published internal WhatsApp conversations that showed trepidation among Tory parliamentarians that members in marginal seats may lose to the Labour party. Other leaked messages highlighted division within the party, particularly over the fundamental issue of Brexit.

For its part, Labour relied on closed WhatsApp groups to disseminate its general election messages widely, with controversial org Momentum using it to issue "WhatsApp cascades" on polling day, shared on with an estimated 400,000 "young people", amongst other allegations about secret WhatsApp groups.

Like WhatsApp, Signal has end-to-end encryption baked in, preventing a foreign power or individual from accessing sensitive conversations. In addition, it also includes settings, which, when enabled, self-destructs messages after a period of time.

Unfortunately, Signal doesn't allow group moderators to block individuals from taking screenshots, which would frustrate the process of leaking a conversation to the press.

There is a tinge of irony in politicians adopting an encrypted messaging system like Signal.

British government officials have for years called upon tech firms to break encryption to facilitate the access of conversations to law enforcement most notably former Home Sec and PM Theresa May, and later former Home Sec Amber Rudd but more lately current UK Home Secretary Priti Patel.

Erstwhile Prime Minister David Cameron even proposed banning online messaging applications that support end-to-end encryption.

That notwithstanding, Signal is increasingly used in governmental spheres. In 2017, the US Senate Sergeant at Arms approved the app as a communications tool for staffers and legislators alike.

The app has also been endorsed by Edward Snowden, the fugitive former CIA employee, who disclosed the depth of US government surveillance against the general public.

Sponsored: What next after Netezza?

The rest is here:
What's that? Encryption's OK now? UK politicos Brexit from Whatsapp to Signal - The Register

What Is Snatch Ransomware and How to Remove It – Guiding Tech

It seems like crimeware developers never sleep as defenses rise. They're always on the lookout for different ways of honing their weapons of attack. One of the most recent techniques is a ransomware strain that can force a Windows device to reboot into Safe Mode right before encryption begins, intending to get around endpoint protection.

This particular strain is known as Snatch owing to its authors, who refer to themselves as the Snatch Team. It was discovered by Sophos Labs researchers, who outlined their discovery together with insights into how such gangs break into enterprises and other entities on their hit list.

Were going to explain what Snatch ransomware is, how it works, and how you can remove it from your devices.

Snatch is a fresh ransomware variant whose executable forces Windows devices to reboot to Safe Mode even before the encryption process begins in a bid to bypass endpoint protection that often doesnt run in this mode.

Discovered by SophosLabs researchers and Sophos Managed Threat Response team, the snatch ransomware is among multiple malware constellation components being used in an ongoing series of carefully orchestrated attacks featuring extensive data collection.

The new strain of the ransomware uses a unique infection method that applies sophisticated AES encryption so that users whose machines are infected cant access their files.

Snatch ransomware was first noticeably active in April 2019, but it was released end of 2018. However, the spike in encrypted files and ransom notes led to its discovery and follow up by the team of researchers at Sophos.

Its crypto-virus form attacks high profile targets, but this new strain, created using Google Go program, comprises a collection of tools including a data stealer and ransomware feature. Plus, it has a Cobalt Strike reverse-shell and other tools used by penetration testers and system administrators.

Note: The variant Sophos discovered is only able to run on Windows in 32-bit and 64-bit editions from version 7 through 10.

As a file locking virus, Snatch ransomware has no connections with other strains. Still, its developers released nine variants of the threat, which append different extensions after data is encrypted with AES cipher.

The trick is to reboot machines into Safe Mode, and then the ransomware restricts access to your data by encrypting your files. After that, the hackers try to extort money from you by soliciting ransoms in the form of Bitcoin in exchange for unlocking your files and giving back data access.

Theres a reason why their trick works. Some antivirus software dont start in Safe Mode, and the developers discovered they could easily modify a Windows registry key and just boot your machine into Safe Mode. Thus the ransomware runs undetected by your security software.

The first time its installed on your device, it comes through SuperBackupMan, a Windows service, and sets up right before your computer starts rebooting so you cant stop it in time.

Once installed, the attackers use admin access to run BCDEDIT, a Windows command-line tool, to force your computer to reboot in Safe Mode immediately.

It then creates a random named executable in your %AppData% or %LocalAppData% folder, which will be launched and starts scanning your computers drive letters for files to encrypt.

There are specific file extensions it encrypts, including .doc, .docx, .pdf, .xls, and many others, which it infects and changes their extensions to Snatch so you cant open them again.

The ransomware leaves a Readme_Restore_Files.txt text file note, demanding anything between one and five Bitcoin in exchange for a decryption key, with information on how to communicate with the hackers to get your data files back.

After the ransomware scans your computer completely, it uses vssadmin.exe, a Windows command to delete all Shadow Volume Copies on it so you cant recover and use them to restore encrypted data files. The final step is to encrypt any data files on your hard drive.

Currently, infected files arent decryptable owing to the sophisticated nature of the AES encryption used. However, you still have a lifeline if your computer is infected by restoring your files from the most recent backup.

Snatch ransomware has been targeting regular users via spam emails. But today, the main targets are corporations. By paying such criminals, you not only lose money and have no guarantee that theyll send the decryption key to you, but it also encourages them to continue with their cyber criminality.

If you dont have an updated backup, theres not much else you can do other than wait until security experts come up with a Snatch ransomware decrypter. That could take a long time, but there are other ways you can protect yourself from such attacks.

One of the best ways to remove Snatch ransomware and other malware is to install good antivirus security software such as Malwarebytes or SpyHunter that can scan, detect, and eliminate the threat. Not all antivirus engines can catch it because its an entirely new malware, so its good to scan using several programs.

You can protect yourself and your devices against ransomware attacks by taking simple steps such as downloading software from trusted sources, and avoid opening email attachments from untrusted sources.

Other ways you can protect yourself and your organization from Snatch and other types of ransomware include:

Snatch ransomware may sound almost life-threatening in how it works to paralyze your files and devices. Before you think of paying that ransom, try the steps above to remove the threat and always take preventive measures to ensure this and such threats don't show up on your computer or network.

Next up: If you suspect your phone is infected with ransomware, check our next article to find out how to detect that and remove it.

Last updated on 18 Dec, 2019

See the article here:
What Is Snatch Ransomware and How to Remove It - Guiding Tech

Volunteer firefighters, EMTs worry they wont have NYPD radio access to help public – amNY

As the city continues to stay mum on the plan to encrypt tens of thousands of police radios in New York City, yet another group is expressing concerns that they will also be shut out of the NYPD feed volunteer firefighters and ambulance companies.

Dozens of volunteer ambulance groups currently respond to help New Yorkers around the city, and they monitor police radios to provide assistance.

Those radios will likely go silent should the NYPD proceed with its plan to encrypt all police radios in 2020, as reported Wednesday in amNewYork.

The NYPD, while not explicitly denying the amNewYork report, said in a statement Tuesday that the department is undergoing a systems upgrade that is underway for the next 3-5 years.

Part of that upgrade includes ensuring radios can support either encrypted or non-encrypted use, said Sergeant Jessica McCrory, a spokesperson for the NYPD Deputy Commissioner of Public Information. The Department constantly evaluates technology capabilities and safety measures, and once upgrades are complete, will determine encryption best practices based on safety needs of the city and law enforcement best practices.

Some companies also have access to the FDNY radio feed. The Fire Departments radios are capable for encryption, but officials there say they have no plans to do that. Even so, the NYPD and FDNY commanders would still need radios capable of communicating with each other.

All news organizations would potentially be locked out if the encryption plan goes forward. Many get their early tips of breaking news from listening to police radio scanners or following services which have such access.

Many advocacy groups have weighed in after amNewYorks report, including the Committee to Protect Journalists, which issued the following statement: CPJ is looking into this, and we have also shared it with the US Press Freedom Tracker.

When Police Officers Rafael Ramos and Wenjian Liu were shot to death in 2015, the Bedford-Stuyvesant Volunteer Ambulance Corps was able to quickly respond to the scene because they heard emergency calls on the police radio.

Thats how we responded so rapidly to them, said Antoine Robinson, commanding officer and CEO of the Bed Stuy Volunteer Ambulance. Thats how we get our jobs, but you know the police have to do what is best for the public and police department. No matter what they do, we still have to answer our call and obtain information we need.

Robinson said he plans to speak to the NYPD to see what can be done to maintain communications.

We used to sign out radios, but they stopped doing that, so may be something else can be worked out, Robinson said.

The Central Park Medical Unit, an all-volunteer ambulance unit serving Central Park and the surrounding streets, was able to save the life of a man injured by a home-made bomb in 2016. They were able to get to him quickly because they heard the call on NYPD radio.

Volunteer rescuers have been concerned about losing radio access for some time amid rumors about encryption.

Danny Cavanaugh, president of the Volunteer Firemans Association of New York, said volunteer companies around the city have expressed their concerns previously, but received little response from the NYPD.

We want to maintain the relationship we have always had, and we look forward to continuing it, Cavanaugh said. We always come to the aid of the police and hope we can continue to do that.

Travis Kessel, chairperson of District 4 New York State Volunteer Ambulance and Rescue Association, said it is essential that volunteer units closely with the police department and render aid in a timely manner.

Kessel, who works with the Glendale and Ridgewood Volunteer Ambulance Corps, said he has a close relationship with the NYPD, but losing the radio would make it difficult for the corps to respond to police emergencies.

Since weve existed, weve been part of every large scale event in city every blizzard, heat emergencies to obviously larger events like 9-11. Those open lines of communication to assist, then NYPD and FDNY and other agencies losing that line would be devastating, Kessel said. Our ability to help in a moments notice, by monitoring those radio frequencies and through media channels, allows us to bring aid quicker allows us to have that inside knowledge that knowing what type of resources are needed.

Councilman Donovan Richards, chair of the Public Safety Committee, said he and all other elected officials were taken aback by the radio encryption plans but hes not shocked to hear the NYPD doing this in secret.

Anything that goes backward and kills transparency in this city with the NYPD is not good for the public, Richards said. We are very interested in hearing from the NYPD this is not good for democracy.

Despite Mayor Bill de Blasio saying he would speak with Commissioner Dermot Shea about the radio encryption and loss of transparency, his office has yet to reply for comment.

Read the original post:
Volunteer firefighters, EMTs worry they wont have NYPD radio access to help public - amNY

Facebook , Apple being threatened by US senators over data encryption – Gizmo Posts 24

According to a recent study, US senators threatened the most renowned companies such as facebook and apple. A meeting was held on the 10th of December. The main vision behind the meeting is to get rid of the obstacles they have been facing in finding abusers.

Why are they being threatened?

The senator says that data encryption is coming in the way of finding evidence. Also, the senator does not want to provide a safer place for the child abusers over this reason of not being able to catch the abusers. Both the technology representatives marked their presence in the meeting.

It seems like a serious issue prevailing in the country. Also, Facebook is facing many governments recently. Can you guess the reason why? The reason behind this is extending end to end encryption of WhatsApp messages.

Companies trying to save themselves

Facebook also tried explaining to the senator that it did not develop any particular operating system or a device. It says that it is open for any scanning of illegal copies. Similarly, the head of privacy issues in Apple says that there are no particular forums through which strangers can connect to each other.The user profile is not base on the materials of the user, says Apple

The track record of Apple and facebook are tremendous across the world. Taking their innovation over time and protection of data against third parties, it is very difficult for the companies to give up on data encryption.

A drawback for these major companies:

Amidst all these circumstances, the tech giant Cupertino has allowed law enforcement to access a locked phone to find a suspect of a mass shooting. This has put additional pressure on the heads of these renowned companies from the senator. The regulations that will be imposed on both of these companies are still ambiguous.

Read the original:
Facebook , Apple being threatened by US senators over data encryption - Gizmo Posts 24

What We Learned About the Technology That Times Journalists Use – The New York Times

Several years ago, some colleagues and I were chatting about what was missing from tech journalism. Plenty of news media outlets had written breathlessly about hot new gadgets and apps. But what were people really doing with that tech?

That question spawned Tech Were Using, a weekly feature that documented how New York Times journalists used tech to cover a wide variety of topics, including politics, sports, wars, natural disasters, food and art.

With the decade coming to a close, we decided to also wrap up the column after interviews with more than 130 Times reporters, editors and photographers. Here were our biggest takeaways.

Unsurprisingly, the smartphone was the most vital work tool among journalists. Many reporters relied on smartphones for recording interviews and turned to A.I.-powered apps like Trint and Rev to automatically transcribe interviews into notes.

Most Times reporters now also rely on some form of encrypted communication, particularly messaging apps like Signal and WhatsApp or the emailing service ProtonMail, to keep their sources and conversations confidential.

That is a remarkable shift. Encryption technologies became popular only a few years ago, after the former government security contractor Edward Snowden revealed the extent of what the United States government was doing to surveil its own citizens.

Another indispensable tool underlined a type of tech that has not improved much: batteries. Many reporters, especially national correspondents who live out of a suitcase, desperately needed phones with longer-lasting batteries, so battery packs were a staple in their arsenal of tools.

Many photographers were also early adopters of new tech. One key example: drones. Those were constantly getting smaller, and their cameras were improving, which created possibilities for new types of photography, like overhead shots of houses damaged in a fire.

In contrast, many tech reporters tried to minimize the amount of tech they used. That could be, in part, a symptom of knowing too much about the companies they covered and the wide swaths of data those companies collected.

Many editors and reporters also talked about how tech had transformed the industries they cover.

In the world of dining, digital photography and platforms like Instagram have become the main method that restaurants use to communicate with patrons. Rocket launches are now live-streamed online, which let our space reporter watch from his phone instead of heading to the space station. And in the entertainment world, video streaming has opened doors to a wealth of new content so much that reporting on movies and TV shows has become an art of curation.

Whats ahead? If tech has invaded everything, the answer is: even more transformation.

Here is the original post:
What We Learned About the Technology That Times Journalists Use - The New York Times

Hugging Face Raises $15 million to Expand its Open Source Software on Conversational AI – IBL News

IBL News | New York

New York-based Hugging Face, a startup known byan app launched in 2017 that allows you to chat with an artificial digital friend,recently open-sourced its library for natural language processing (NLP) framework, calledTransformers. It hadmassive success asthere are over a million downloads and 1,000 companies using it, including Microsofts Bing.

Transformers can be leveraged for text classification, information extraction, summarization, text generation, and conversational artificial intelligence.

On Tuesday, Hugging Face, with just 15 employees, announced theclose of a $15 million series, a funding round that adds to a previous amount of $5 million.

The round, intended totriple Hugging Faces headcount in New York and Paris and the release of new software libraries,was ledby Lux Capital, with participation from Salesforce chief scientist, Richard Socher, and OpenAI CTO Greg Brockman, as well as Betaworks and A.Capital.

Tech giants are not taking a truly open-source approach on NLP, and their research and engineering teams are totally disconnected,Hugging Face CEO, Clment Delangue, said on VentureBeat.

On one hand, they provide black-box NLP APIs like Amazon Comprehend or Google APIs that are neither state-of-the-art nor flexible enough. On the other hand, they release science open source repositories that are extremely hard to use and not maintained (BERTs last release is from May and only counts 27 contributors).

See the original post here:
Hugging Face Raises $15 million to Expand its Open Source Software on Conversational AI - IBL News