<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Akingate Consultancy</title>
	<atom:link href="https://www.akingate.com/category/security-uniformed-and-protective-services/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.akingate.com</link>
	<description>Technology, Creativity And Innovations</description>
	<lastBuildDate>Sat, 16 Sep 2023 11:25:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.akingate.com/wp-content/uploads/2025/01/cropped-AKINGATE-Logo.jpg?fit=32%2C32&#038;ssl=1</url>
	<title>Security &#8211; Akingate Consultancy</title>
	<link>https://www.akingate.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">201648423</site>	<item>
		<title>Akingate Tech News Digest 16 Sep 2023</title>
		<link>https://www.akingate.com/akingate-tech-news-digest-16-sep-2023/</link>
					<comments>https://www.akingate.com/akingate-tech-news-digest-16-sep-2023/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 11:25:53 +0000</pubDate>
				<category><![CDATA[Financial services]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[AltSchool]]></category>
		<category><![CDATA[fintech]]></category>
		<category><![CDATA[Flutterwave]]></category>
		<category><![CDATA[Itana]]></category>
		<category><![CDATA[Itot]]></category>
		<category><![CDATA[mPharma]]></category>
		<category><![CDATA[TECHGhana]]></category>
		<guid isPermaLink="false">https://www.akingate.com/?p=5432</guid>

					<description><![CDATA[A selection of tech news from Nigeria and Africa at large. TECHGhana’s mPharma downsizes &#124; Itana raises $2 million &#124; 40% fintech security issues &#124; AltSchool launches new schools &#124; DRC-based Itot learning services &#124; Flutterwave Expands to India   [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;">A selection of tech news from Nigeria and Africa at large.</p>
<p style="text-align: center;"><strong>TECHGhana’s mPharma downsizes | Itana raises $2 million | 40% fintech security issues | AltSchool launches new schools | DRC-based Itot learning services | Flutterwave Expands to India</strong></p>
<p><strong> </strong></p>
<p><strong>TECHGhana’s mPharma downsizes amid economic challenges &#8211; Ripples News</strong></p>
<p>Ghanaian healthtech platform mPharma, founded in 2014, has made a significant workforce reductions amid challenging economic conditions in Africa.</p>
<p>The startup, which raised around $90 million in funding, including $30 million in 2022, has announced the layoff of 150 employees due to macroeconomic conditions linked to the devaluation of the Naira.</p>
<p>This step is aimed at ensuring the continued service of over 200,000 patients who rely on mPharma’s Mutti service, the startup’s online pharmacy service.</p>
<p>The economic challenges faced by mPharma are not unique. Several startups across Africa have had to take drastic measures to adapt to the tough economic climate. <a href="https://www.ripplesnigeria.com/ghanas-mpharma-downsizes-amid-economic-challenges-2-other-stories-and-a-trivia/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<p><strong>Itana raises $2 million pre-seed to build Africa’s first digital free zone &#8211; Nairametrics</strong></p>
<p>Nigerian startup, Itana, formerly known as Talent City, has raised $2 million in a pre-seed that will power its dream of building Africa’s first digital free zone.</p>
<p>The pre-seed round was led by global venture capitalists LocalGlobe, Amplo, Pronomos Capital, and Future Africa. The deal brings together a powerhouse of deep industry expertise and technical know-how from partners that have backed model digital societies such as e-Estonia and are building products that scale.</p>
<p>Founded by CEO Luqman Edu, Iyinoluwa Aboyeji, and Coco Liu, Itana plans to enable global tech and service companies to situate their African operations from Nigeria, and also take advantage of globally competitive business policies and incentives. <a href="https://nairametrics.com/2023/09/06/itana-raises-2-million-pre-seed-to-build-africas-first-digital-free-zone/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p><strong> </strong></p>
<p><strong>40% of fintech apps in Nigeria have security issues – Nairametrics</strong></p>
<p>Mobile application security company, Appknox, has said that its analysis of fintech apps in Nigeria shows that 40% of the apps are vulnerable to high and critical impact issues.</p>
<p>The Chief Executive Officer/Co-Founder of Appknox, Harshit Agarwal, disclosed this during a round-table meeting organized by CED Technologies and Appknox with the theme, ‘How to think security first in a super-fast mobile economy – Act or React’.</p>
<p>Of the 40%, he said over 80% lack sufficient code obfuscation, 60% have broken/disabled SSL and certificate pinning, 35% are affected by network security misconfiguration and 25% indicate recording of audio and screen activity. <a href="https://nairametrics.com/2023/09/07/40-of-fintech-apps-in-nigeria-have-security-issues-appknox/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<p><strong>Nigeria’s AltSchool Africa launches new schools to upskill Africans in creative, business industries &#8211;  Disrupt Africa</strong></p>
<p>Nigerian skill-to-market platform AltSchool Africa has expanded its learning faculty to introduce creative economy and business schools, following an impressive 40 per cent completion rate in its first year.</p>
<p>Founded in 2021 by Adewale Yusuf and Sultan Akintade, who are also co-founders of another Nigerian ed-tech company TalentQL, AltSchool aims to equip Africans with in-demand tech and employability skills to help them launch their careers.</p>
<p>Taking a non-conventional approach to learning, the tech-enabled platform has traditionally offered courses directly related to in-code and no-code. Strengthening its push in the ed-tech sector, the startup has added content creation, sales, and music business – using Afrobeats as a case study – to its existing nine courses, with applications now open for the first cohort of these new streams.</p>
<p>The startup, which raised a US$1 million pre-seed round in February 2022, has in the last two years facilitated nearly three million hours of training for tech roles, including software engineering, data science, and product design. The new programmes are focused on non-traditional careers beyond the technology field, and are designed to provide a comprehensive and experiential upskilling platform for aspiring learners looking to forge careers in other growing sectors.  <a href="https://disrupt-africa.com/2023/09/08/nigerias-altschool-africa-launches-new-schools-to-upskill-africans-in-creative-business-industries/?amp=1" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<p><strong>How DRC-based Itot Africa is providing online learning services to upskill African youth &#8211; Disrupt Africa</strong></p>
<p>DRC-based startup Itot Africa is providing customised digital content, coding, programming, training and e-learning to businesses, SMEs and entrepreneurs in Africa and the United States.</p>
<p>Itot Africa, an ed-tech startup based in Lubumbashi and launched in 2017, recently received EUR54,000 (US$59,000) in matching funds from the Catalytic Africa initiative, supporting an investment made into the startup by DRC Impact Angels.</p>
<p>The startup’s flagship product Okademy is an online learning, on-demand training and career tracking platform. Meanwhile, with its network of affiliated and trained students, Itot Africa also supports the digitisation process of its clients by creating technology solutions.</p>
<p>“We cater to three primary categories of individuals – those seeking knowledge to fill a personal gap or follow technological trends, those aiming to meet recruitment requirements or find employment, and professionals looking to reinforce their skills,” co-founder Samy Mwamba told Disrupt Africa.</p>
<p>“Our comprehensive services extend beyond training to include recruitment and software development, supporting businesses in their digital transformation journey. We engage our alumni to provide apt solutions based on specific corporate demands. Additionally, companies seeking human resources turn to us for recruitment and placement services, benefiting from our robust database of skilled professionals.” <a href="https://disrupt-africa.com/2023/09/08/how-drc-based-itot-africa-is-providing-online-learning-services-to-upskill-african-youth/?amp=1" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<p><strong>Africa Payment Giant, Flutterwave, Expands to India &#8211; Techeconomy</strong></p>
<p>According to reports, African payments startup Flutterwave has partnered with IndusInd Bank to enter the Indian market. Olugbenga Agboola, Flutterwave Co-Founder and CEO asserts that this move makes Flutterwave the first African company to scale up remittances from India to Africa, easing the process for users.</p>
<p>Agboola, who is currently in India after receiving an invitation from Nigerian President Bola Ahmed Tinubu to attend the Nigeria-India Business Roundtable that took place on the fringes of the G-20 Summit, stated that Flutterwave will seek out more partners to expand its footprint in India.</p>
<p>A more intensive and clearly defined regulatory partnership between the two nations, he continued, may assist in advancing and encouraging information exchange and technology transfer as well as improving the Nigeria-India remittance corridor. <a href="https://techeconomy.ng/africa-payment-giant-flutterwave-expands-to-india/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: center;">__________________________________________________________</p>
<p>&nbsp;</p>
<p>Image Credit: Ripples Nigeria</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/akingate-tech-news-digest-16-sep-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5432</post-id>	</item>
		<item>
		<title>AI threatens to add to the growing wave of fraud but is also helping tackle it</title>
		<link>https://www.akingate.com/ai-threatens-to-add-to-the-growing-wave-of-fraud/</link>
					<comments>https://www.akingate.com/ai-threatens-to-add-to-the-growing-wave-of-fraud/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Thu, 31 Aug 2023 20:11:26 +0000</pubDate>
				<category><![CDATA[Computing and ICT]]></category>
		<category><![CDATA[G-Tech]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Artificial intelligence (AI)]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Cost of living]]></category>
		<category><![CDATA[Cost of living crisis]]></category>
		<category><![CDATA[COVID support]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[cyber-fraud]]></category>
		<category><![CDATA[Data analysis]]></category>
		<category><![CDATA[Data analytics]]></category>
		<category><![CDATA[Educate me]]></category>
		<category><![CDATA[Financial crime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Fraudsters]]></category>
		<category><![CDATA[Identity theft]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Online fraud]]></category>
		<category><![CDATA[Online scams]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[Scams]]></category>
		<category><![CDATA[UK crime]]></category>
		<category><![CDATA[UK government]]></category>
		<guid isPermaLink="false">https://www.akingate.com/?p=5428</guid>

					<description><![CDATA[There were 4.5 million reported incidents of fraud in the UK in 2021/22, up 25% on the year before. It is a growing problem which costs billions of pounds every year. The COVID pandemic and the cost of living crisis [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>There were <a href="https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/articles/natureoffraudandcomputermisuseinenglandandwales/yearendingmarch2022" target="_blank" rel="noopener">4.5 million</a> reported incidents of fraud in the UK in 2021/22, up 25% on the year before. It is a growing problem which costs billions of pounds every year.</p>
<p>The COVID pandemic and the cost of living crisis have created <a href="https://www.bbc.co.uk/news/business-55769991" target="_blank" rel="noopener">ideal conditions</a> for fraudsters to exploit the vulnerability and desperation of many households and businesses. And with the use of AI increasing in general, we will likely see a further increase in <a href="https://www2.deloitte.com/uk/en/blog/auditandassurance/2023/generative-ai-and-fraud-what-are-the-risks-that-firms-face.html" target="_blank" rel="noopener">new types of fraud</a> and is probably contributing to the increased frequency of fraud we are seeing today.</p>
<p>Already, the ability of AI to absorb personal data, such as emails, photographs, videos and <a href="https://www.cbsnews.com/news/scammers-ai-mimic-voices-loved-ones-in-distress/#:%7E:text=Artificial%20intelligence%20is%20making%20phone,mounting%20losses%20due%20to%20fraud." target="_blank" rel="noopener">voice recordings</a> to imitate people is proving to be a new and unprecedented challenge.</p>
<p>But there is also an upside. The government, banks and other financial organisations are now fighting back with increasingly sophisticated fraud-detection methods. AI and machine learning models could be a <a href="https://www.weforum.org/agenda/2023/04/as-generative-ai-gains-pace-industry-leaders-explain-how-to-make-it-a-force-for-good/" target="_blank" rel="noopener">part of the solution</a> to deal with the increasing complexity, sophistication and prevalence of such scams.</p>
<p>The rising gap between prices and people’s incomes appears to have made people more <a href="https://www.citizensadvice.org.uk/about-us/about-us1/media/press-releases/over-40-million-targeted-by-scammers-as-the-cost-of-living-crisis-bites/" target="_blank" rel="noopener">receptive</a> to scams which offer grants, rebates and support payments.</p>
<p>Fraudsters often target individuals by posing as genuine organisations. Examples include pretending to be your bank or posing as the government telling you that you are eligible for a lucrative scheme, in order to steal your identity details and then money.</p>
<p>This follows a dramatic rise in recent years of fraudulent applications to government and regional support packages, mainly implemented in response to the pandemic. Here fraudsters often pose as fake businesses to secure multiple loans or grants.</p>
<p>One of the <a href="https://www.manchestereveningnews.co.uk/news/greater-manchester-news/man-who-pretended-greggs-bakery-27251086" target="_blank" rel="noopener">most outlandish examples</a> of this was a Luton man who posed as a Greggs bakery to swindle three local authorities in England out of almost £200,000 worth of COVID small business grants.</p>
<p>The hurried roll out of such schemes for faster economic impact made it difficult for officials to effectively review applications. The UK government’s Department for Business and Trade now <a href="https://www.bbc.co.uk/news/business-59504943" target="_blank" rel="noopener">estimates</a> that 11% of such loans, roughly £5 billion, were fraudulent. By March 2022 only £762 million <a href="https://www.gov.uk/government/publications/hmrc-issue-briefing-tackling-error-and-fraud-in-the-covid-19-support-schemes/tackling-error-and-fraud-in-the-covid-19-support-schemes" target="_blank" rel="noopener">had been recovered</a>.</p>
<h2>Fraud detection</h2>
<p>Over the past few years, complex mathematical models combining traditional statistical techniques and machine learning analysis have shown promise in the <a href="https://onlinelibrary.wiley.com/doi/abs/10.1111/acfi.12742" target="_blank" rel="noopener">early detection</a> of financial statement fraud. This is when companies typically misrepresent or deceive investors into believing they are more profitable than they really are.</p>
<p>One of the breakthroughs has been the incorporation of both financial and non-financial information into data analysis systems. For example, the risk of fraud decreases if there is <a href="https://onlinelibrary.wiley.com/doi/abs/10.1111/acfi.12742" target="_blank" rel="noopener">better corporate governance</a> and a lower proportion of directors who are also executives.</p>
<p>In a small business context, we can think about this as promoting transparency and making sure that important positions do not have sole authority to make significant decisions.</p>
<p>Such data analytics models can be used to rank applications in terms of potential fraud risk, so that the riskiest applications get additional scrutiny by government officials. We are now starting to see implementations of such systems to tackle <a href="https://www.theguardian.com/society/2023/jul/11/use-of-artificial-intelligence-widened-to-assess-universal-credit-applications-and-tackle" target="_blank" rel="noopener">universal credit</a> fraud, for example.</p>
<p><a href="https://www.ft.com/content/0dca8946-05c8-11e8-9e12-af73e8db3c71" target="_blank" rel="noopener">Banks, financial services providers</a> and <a href="https://www.ft.com/content/d3bd46cb-75d4-40ff-a0cd-6d7f33d58d7f" target="_blank" rel="noopener">insurers</a> are developing machine-learning models to detect financial fraud too. A Bank of England survey published in October 2022 <a href="https://www.bankofengland.co.uk/report/2022/machine-learning-in-uk-financial-services" target="_blank" rel="noopener">revealed</a> that 72% of financial services firms are already testing and implementing them.</p>
<p>We are also seeing new collaborations in the industry, with the likes of Deutsche Bank partnering with chip maker Nvidia to <a href="https://www.db.com/news/detail/20221207-deutsche-bank-partners-with-nvidia-to-embed-ai-into-financial-services" target="_blank" rel="noopener">embed AI</a> into their fraud detection systems.</p>
<h2>Risks of AI systems</h2>
<p>However, the advent of new automated AI systems bring with it worries of potential unintended biases within them. In a <a href="https://www.bbc.co.uk/news/uk-politics-66133665" target="_blank" rel="noopener">recent trial</a> of a new AI fraud detection system by the Department of Work and Pensions, campaign groups were worried about potential biases.</p>
<p>A common issue that needs to be overcome with such systems is that they work for the majority of people, but are often biased against minority groups. This means if left unadjusted they are disproportionately more likely to flag applications from ethnic minorities as risky.</p>
<p>But AI systems should not be used as a fully automated process to detect and accuse fraud but rather <a href="https://www.ft.com/content/2df33fc5-981a-4952-8dc6-d4eee7343acc" target="_blank" rel="noopener">as a tool</a> to assist assessors. They can help auditors and civil servants, for example, to identify cases where greater scrutiny is required and to reduce processing time.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img data-recalc-dims="1" decoding="async" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://i0.wp.com/counter.theconversation.com/content/210663/count.gif?resize=1%2C1&#038;ssl=1" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>
<p>Authors: <a href="https://theconversation.com/profiles/laurence-jones-1438289" target="_blank" rel="noopener">Laurence Jones</a>, Lecturer in Finance, <em><a href="https://theconversation.com/institutions/bangor-university-1221" target="_blank" rel="noopener">Bangor University</a></em> and <a href="https://theconversation.com/profiles/adrian-gepp-1458340" target="_blank" rel="noopener">Adrian Gepp</a>, Professor of Data Analytics, <em><a href="https://theconversation.com/institutions/bangor-university-1221" target="_blank" rel="noopener">Bangor University</a></em></p>
<p>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license.</p>
<p>&nbsp;</p>
<p>Image Credit: <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/internet-fraud-darknet-data-thiefs-cybercrime-1716862513" target="_blank" rel="noopener">Maksim Shmeljov/Shutterstock</a></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/ai-threatens-to-add-to-the-growing-wave-of-fraud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5428</post-id>	</item>
		<item>
		<title>Akingate Tech News Digest 22 July 2023</title>
		<link>https://www.akingate.com/akingate-tech-news-digest-22-july-2023/</link>
					<comments>https://www.akingate.com/akingate-tech-news-digest-22-july-2023/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Sat, 22 Jul 2023 10:00:08 +0000</pubDate>
				<category><![CDATA[Computing and ICT]]></category>
		<category><![CDATA[Financial services]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Co-Creation Hub GIZ innovations]]></category>
		<category><![CDATA[cybersecurity laboratory]]></category>
		<category><![CDATA[FinTech collaboration]]></category>
		<category><![CDATA[Flex Finance]]></category>
		<category><![CDATA[Flutterwave Tuition]]></category>
		<category><![CDATA[insurtech MyCover.ai funding]]></category>
		<guid isPermaLink="false">https://www.akingate.com/?p=5400</guid>

					<description><![CDATA[A selection of tech news from Nigeria and Africa at large. Flutterwave Tuition &#124; cybersecurity laboratory &#124; FinTech collaboration &#124; insurtech MyCover.ai funding &#124; Flex Finance &#124; Co-Creation Hub GIZ innovations   Flutterwave introduces Tuition to help African students pay [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;">A selection of tech news from Nigeria and Africa at large.</p>
<p style="text-align: center;"><strong>Flutterwave Tuition | cybersecurity laboratory | FinTech collaboration | insurtech MyCover.ai funding | Flex Finance | Co-Creation Hub GIZ innovations</strong></p>
<p><strong> </strong></p>
<h4><strong>Flutterwave introduces Tuition to help African students pay fees for overseas education &#8211; Tech In Africa</strong></h4>
<p>The Nigerian fintech firm Flutterwave has launched a trailblazing product named ‘Tuition,’ aiming to address the difficulties parents, guardians, and sponsors face when funding their children’s overseas education. This product seeks to reshape the educational payment framework in Africa and beyond.</p>
<p>Tuition offers a user-friendly payment structure, facilitating parents, guardians, and sponsors to pay assorted fees smoothly to educational boadies within Africa and overseas in their local currencies. This includes an initial roll-out to about 40 institutions in the UK, and it’s anticipated to expand to more institutions across Africa, the UK, the U.S., Canada, France, and Germany as the product increasingly attracts attention. <a href="https://www.techinafrica.com/flutterwave-introduces-tuition-to-help-african-students-pay-fees-for-overseas-education/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<h4><strong>Nigeria to build cybersecurity laboratory in 2024 – Nairametrics </strong></h4>
<p>The National Information Technology Development Agency (NITDA) has said that the agency will be collaborating with the Chartered Institute of Forensic and Certified Fraud Investigator of Nigeria (CIFCFIN) to establish a cybersecurity laboratory next year.</p>
<p>The Director General of the agency, Mr. Kashifu Inuwa, disclosed this while receiving CIFCFIN’s President, Dr. Iliyasu Gashinbak, and his team at the NITDA headquarters.</p>
<p>According to him, the collaboration was necessary to promote digital forensics, reinvigorate the tech ecosystem, and mitigate cybercrimes in the digital space.</p>
<p>The Director-General said that perpetrators of cybercrimes invested well in research, information technology, and powerful tools to launch attacks, adding that taking proactive steps to counter them was non-negotiable. <a href="https://nairametrics.com/2023/07/17/nigeria-to-build-cybersecurity-laboratory-in-2024-nitda/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<h4><strong>CBN signs FinTech collaboration agreements with the Central Bank of Egypt &#8211; Nairametrics</strong></h4>
<p>The Central Bank of Nigeria, CBN, has signed a FinTech collaboration agreement with the Central Bank of Egypt. This announcement was disclosed via the official Twitter handle of the apex bank.</p>
<p>The Deputy Governor of CBN, Mrs Aishah Ahmad says the partnership would deepen cross-border regulatory collaboration, and information sharing, boost innovation and grow regional technology investments. This agreement was signed during the “Seamless North Africa 2023” conference at the Egypt International Exhibition Center in New Cairo, Egypt. The Seamless North Africa conference brings together the entire financial ecosystem to discuss, debate and evaluate the future of money.</p>
<p>She said: “We look forward to cultivating an innovative space for fintech startups and entrepreneurs in Egypt and Nigeria to accelerate financial inclusion, deepen our payment systems and drive economic growth across the African Continent.” <a href="https://nairametrics.com/2023/07/18/cbn-signs-fintech-collaboration-agreements-with-the-central-bank-of-egypt/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<h4><strong>Nigerian insurtech startup MyCover.ai secures $1.25m pre-seed funding &#8211; Disrupt Africa</strong></h4>
<p>Nigerian insurtech startup MyCover.ai has closed a US$1.25 million pre-seed funding round to bolster its in-house operations and tech talent, invest heavily in its proprietary technology, and strategically expand its operations into other African markets.</p>
<p>Founded in 2021, MyCover.ai is focused on addressing the pain points that exist in the African insurance market, such as the lack of access, inadequate coverage, the unaffordability of insurance products and the poor customer experience surrounding insurance processes.</p>
<p>By operating across three essential touchpoints, the company addresses these problems – underwriting and product development, distribution, and insurance claims, where the claims processes are streamlined for insurance companies and the end-users. The company provides an open insurance API that integrates with leading insurance companies, such as Hygeia, Leadway, Sovereign Trust, AIICO Insurance and Allianz, to offer over 30 personalised insurance products, allowing other businesses and innovators to embed these insurance products into their platforms. <a href="https://disrupt-africa.com/2023/07/20/nigerian-insurtech-startup-mycover-ai-secures-1-25m-pre-seed-funding/?amp=1" target="_blank" rel="noopener"><strong>Read more here:</strong></a></p>
<p>&nbsp;</p>
<h4><strong>How Flex Finance helps African businesses save money with its spend management solution &#8211; Techpoint </strong></h4>
<p>As Internet and smartphone penetration has grown in many parts of Africa, a slew of startups have thrown their hats in the ring, eager to provide a reliable solution for the over 40 million businesses on the continent. Flex Finance, a spend management startup founded by Yemi Olulana, is one of such startups, and hopes to ease the process for African businesses, tapping into an estimated $4.2 trillion worth of B2B spending.</p>
<p>Why is spend management a big deal?</p>
<p>One of the most important benefits of spend management is cash flow management. By accurately tracking a business&#8217; finances, entrepreneurs can avoid unnecessary or unproductive spending and possibly improve profitability in the long run. Spend management can also help businesses decide how to allocate their budget, negotiate better terms with suppliers, and plan effectively.</p>
<p>For many African businesses, the use of manual solutions means they struggle with properly managing their finances. For them, Flex Finance provides an all-in-one solution. <a href="https://techpoint.africa/2023/07/20/flex-finance-spend-management/" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<h4><strong>CcHub, GIZ launch to help African universities foster student-led innovations &#8211; Disrupt Africa</strong></h4>
<p>Co-Creation Hub (CcHub) has announced a new co-funded initiative to support innovation within African universities, in partnership with the Make-IT in Africa project implemented by Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH on behalf of the German Federal Ministry for Economic Cooperation and Development (BMZ).</p>
<p>Called the UNI:NNOVATORS Startups-in-Residence Programme, the new initiative will see CcHub support 30 student-led innovations in Nigeria, Namibia, and Kenya in an effort to strengthen and accelerate the participation of academic institutions in the emerging innovation ecosystem across Africa.</p>
<p>The selected startup teams will participate in a design sprint to improve on their research-based innovations and build prototypes focused on greentech and smart city solutions in specific sectors – agriculture, energy, circular economy, water and healthcare. <a href="https://disrupt-africa.com/2023/07/21/cchub-giz-launch-to-help-african-universities-foster-student-led-innovations/?amp=1" target="_blank" rel="noopener"><strong>Read more here: </strong></a></p>
<p>&nbsp;</p>
<p style="text-align: center;">__________________________________________________________</p>
<p>&nbsp;</p>
<p>Image Credit: Techinafrica.com</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/akingate-tech-news-digest-22-july-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5400</post-id>	</item>
		<item>
		<title>Facial recognition technology could soon be everywhere – here’s how to make it safer</title>
		<link>https://www.akingate.com/facial-recognition-technology-could-soon-be-everywhere/</link>
					<comments>https://www.akingate.com/facial-recognition-technology-could-soon-be-everywhere/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 19:23:57 +0000</pubDate>
				<category><![CDATA[G-Tech]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Coronation]]></category>
		<category><![CDATA[Face recognition]]></category>
		<category><![CDATA[facial]]></category>
		<category><![CDATA[King Charles III]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.akingate.com/?p=5396</guid>

					<description><![CDATA[The recent coronation of King Charles III was a high-profile example of when facial recognition technology has been used to monitor a crowd, but there are plenty of others. The technology is used by law enforcement all over the UK [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The recent coronation of <a href="https://www.theguardian.com/uk-news/2023/may/03/metropolitan-police-live-facial-recognition-in-crowds-at-king-charles-coronation" target="_blank" rel="noopener">King Charles III</a> was a high-profile example of when facial recognition technology has been used to monitor a crowd, but there are plenty of others. The technology is <a href="https://www.met.police.uk/advice/advice-and-information/fr/facial-recognition-technology/" target="_blank" rel="noopener">used by law enforcement</a> all over the UK and <a href="https://www.comparitech.com/blog/vpn-privacy/facial-recognition-statistics/" target="_blank" rel="noopener">other countries</a>.</p>
<p>It’s now <a href="https://www.forbes.com/sites/willmcgough/2023/01/06/controversial-facial-recognition-software-has-been-implemented-at-airports-across-americahow-will-travelers-respond" target="_blank" rel="noopener">common in US airports</a>. It’s being used to monitor refugees and identify dead bodies <a href="https://theconversation.com/facial-recognition-technology-how-its-being-used-in-ukraine-and-why-its-still-so-controversial-183171" target="_blank" rel="noopener">in Ukraine</a>. Even Beyoncé fans have been <a href="https://news.sky.com/story/police-to-use-live-facial-recognition-in-cardiff-city-centre-for-start-of-beyonces-uk-tour-12882283" target="_blank" rel="noopener">subjected to it</a>.</p>
<p>And there’s more to come. The UK government is <a href="https://www.telegraph.co.uk/news/2023/05/17/facial-recognition-police-body-cameras-chris-philip/" target="_blank" rel="noopener">reportedly planning</a> to add facial recognition to the police’s body-worn devices, drones and numberplate cameras. It may soon be very difficult to leave your house without having your face scanned.</p>
<p>There are serious questions about whether the benefits of this technology outweigh such concerns. But steps could be taken to address the issues people are worried about.</p>
<h2>Uses and limits</h2>
<p>Facial recognition can be used by police to scan many faces in a crowd and compare them with a “watch list” of known criminals. This “live facial recognition” is used with the aim of <a href="https://www.pewresearch.org/internet/2022/03/17/ai-and-human-enhancement-americans-openness-is-tempered-by-a-range-of-concerns/ps_2022-03-17_ai-he_02-04/" target="_blank" rel="noopener">reducing crime</a>. It can also be used retroactively on recorded CCTV footage.</p>
<p>In the UK, <a href="https://www.gov.uk/government/publications/update-to-surveillance-camera-code/amended-surveillance-camera-code-of-practice-accessible-version" target="_blank" rel="noopener">the Protection of Freedoms Act 2012</a> provides a legal basis for the use of surveillance camera systems in a public place.</p>
<p>And according to the government’s <a href="https://www.gov.uk/government/consultations/surveillance-camera-code-of-practice" target="_blank" rel="noopener">surveillance camera code of practice</a>, it’s justifiable to use facial recognition systems in decisions that could negatively affect people, such as whether to arrest them, so long as there is a human in the loop to supervise and make decisions.</p>
<p>So the use of facial recognition systems, or those for other types of biometric information, cannot be used for autonomous decision making, such as automatically tracking a suspect across multiple camera feeds.</p>
<h2>Problems with facial recognition</h2>
<p>But why should this be of concern to law-abiding citizens? <a href="https://www.libertyhumanrights.org.uk/issue/what-is-police-facial-recognition-and-how-do-we-stop-it" target="_blank" rel="noopener">Civil liberties groups argue</a> facial recognition use in public places affects our privacy and freedom, particularly in terms of its ability to track individuals at mass gatherings and to potentially engage in racial profiling.</p>
<p>Security cameras have long captured us as we went about our daily lives. However, authorities easily being able to put a name to a face in the video footage is something we’re not so used to.</p>
<p>The technology creates a situation where many more people could get caught in the sights of the authorities than before. A person’s casual indiscretions or errors of judgement can now be easily tracked and linked to a name and address.</p>
<p>Those with a criminal record could be targeted in public based on their past, regardless of whether they intend to carry out any illegal activity. The technology could provide new opportunities <a href="https://www.brookings.edu/articles/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color/" target="_blank" rel="noopener">for racial profiling</a>, where authorities track or suspect people based on their background, rather than because of specific information about them.</p>
<p>Facial recognition could also be used against people with no criminal past or plans to commit a crime but who the police simply want to stop, such as protesters. The Metropolitan Police may have announced that facial recognition would <a href="https://www.theguardian.com/uk-news/2023/may/03/metropolitan-police-live-facial-recognition-in-crowds-at-king-charles-coronation" target="_blank" rel="noopener">not be used to target activists</a> at the coronation, but they also provoked outrage for arresting anti-monarchy demonstrators who were later <a href="https://www.theguardian.com/uk-news/2023/may/08/arrests-coronation-protesters-premeditated-republic-chief-police" target="_blank" rel="noopener">released without charge</a>.</p>
<p>It’s also important to recognise facial recognition technology still suffers from inaccuracies, which can result in <a href="https://thebulletin.org/2021/11/its-time-to-address-facial-recognition-the-most-troubling-law-enforcement-ai-tool/#:%7E:text=False%20positives%2C%20on%20the%20other,with%20that%20of%20a%20criminal." target="_blank" rel="noopener">false positive matches</a> where an innocent person is mistaken for a known criminal.</p>
<p>With facial recognition posing such perceived threats, it could have a <a href="https://journals.sagepub.com/doi/10.1177/20539517211065368" target="_blank" rel="noopener">chilling effect on free speech and demonstrations</a></p>
<h2>What can be done?</h2>
<p>However, there are ways that the technology could be used more safely. Law enforcement teams could perform two preliminary steps – <a href="https://en.wikipedia.org/wiki/Activity_recognition" target="_blank" rel="noopener">activity recognition</a> or <a href="https://link.springer.com/article/10.1007/s11042-021-11864-2" target="_blank" rel="noopener">event detection</a> – before they resort to face recognition. This approach can help minimise the potential for privacy violations and false positive matches.</p>
<p>Activity recognition refers to the process of identifying and categorising human activities or actions based on <a href="https://www.akingate.com/technology-solutions-for-tackling-nigerias-security-challenges/">CCTV</a> or other sensors. It aims to understand and recognise the activities of individuals or groups, which can include standard activities such as running, sitting or eating.</p>
<p>On the other hand, event detection focuses on identifying specific events or occurrences of interest within a given context. Events can range from simple events like a car passing by or a person entering a room to more complex events like accidents, fights, or more unusual behaviour. Event detection algorithms typically analyse CCTV and other sensors to detect and locate events.</p>
<p>Hence, activity recognition or event detection should be the first step before applying facial recognition to a surveillance camera feed.</p>
<p><a href="https://ieeexplore.ieee.org/abstract/document/9983830" target="_blank" rel="noopener">Ensuring the data from cameras remains anonymous</a> can also enable police to study the activities of people in the crowd while preserving their privacy. Conducting regular <a href="https://ieeexplore.ieee.org/abstract/document/9166491" target="_blank" rel="noopener">audits</a> and reviews can ensure that the collected data is handled responsibly and in compliance with <a href="https://ieeexplore.ieee.org/abstract/document/8793058" target="_blank" rel="noopener">UK data privacy regulations</a>.</p>
<p>This can also help to address some of the concerns related to transparency and accuracy. By using activity recognition or event detection as a first step, it may be possible to give people more clarity – through signage, for example – about what exactly is going on during police surveillance in a public place.</p>
<p>It is the responsibility of the state to ensure the privacy and security of its citizens in order to foster a healthy society. But if facial recognition is implemented in a way that a significant proportion of citizens feel <a href="https://www.adalovelaceinstitute.org/report/beyond-face-value-public-attitudes-to-facial-recognition-technology/" target="_blank" rel="noopener">infringes their rights</a>, it could create a culture of suspicion and a society where few people feel safe expressing themselves publicly.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img data-recalc-dims="1" decoding="async" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://i0.wp.com/counter.theconversation.com/content/205040/count.gif?resize=1%2C1&#038;ssl=1" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>
<p>Author: <a href="https://theconversation.com/profiles/nadia-kanwal-1437214" target="_blank" rel="noopener">Nadia Kanwal</a>, Senior Lecturer, Computer Science, <em><a href="https://theconversation.com/institutions/keele-university-1012" target="_blank" rel="noopener">Keele University</a></em></p>
<p>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license.</p>
<p>Image Credit: <a href="https://www.freepik.com/free-photo/facial-recognition-software_36305559.htm#query=facial%20recognition%20biometrics%20landscape&amp;position=15&amp;from_view=search&amp;track=ais" target="_blank" rel="noopener">Image by pikisuperstar</a> on Freepik</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/facial-recognition-technology-could-soon-be-everywhere/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5396</post-id>	</item>
		<item>
		<title>Four ways criminals could use AI to target more victims</title>
		<link>https://www.akingate.com/four-ways-criminals-could-use-ai-to-target-more-victims/</link>
					<comments>https://www.akingate.com/four-ways-criminals-could-use-ai-to-target-more-victims/#comments</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Sat, 01 Jul 2023 09:33:41 +0000</pubDate>
				<category><![CDATA[Computing and ICT]]></category>
		<category><![CDATA[G-Tech]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial intelligence (AI)]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Educate me]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.akingate.com/?p=5384</guid>

					<description><![CDATA[Warnings about artificial intelligence (AI) are ubiquitous right now. They have included fearful messages about AI’s potential to cause the extinction of humans, invoking images of the Terminator movies. The UK Prime Minister Rishi Sunak has even set up a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Warnings about artificial intelligence (AI) are ubiquitous right now. They have included <a href="https://www.safe.ai/statement-on-ai-risk" target="_blank" rel="noopener">fearful messages</a> about AI’s potential to cause the extinction of humans, invoking images of the Terminator movies. The UK Prime Minister Rishi Sunak has even <a href="https://www.gov.uk/government/news/pm-urges-tech-leaders-to-grasp-generational-opportunities-and-challenges-of-ai" target="_blank" rel="noopener">set up a summit to discuss AI safety</a>.</p>
<p>However, we have been using <a href="https://www.akingate.com/how-ai-is-shaping-the-cybersecurity-arms-race/">AI</a> tools for a long time – from the algorithms used to <a href="https://online.york.ac.uk/ai-search-and-recommendation-algorithms/" target="_blank" rel="noopener">recommend relevant products</a> on shopping websites, to cars with technology that <a href="https://en.wikipedia.org/wiki/Traffic-sign_recognition" target="_blank" rel="noopener">recognises traffic signs</a> and <a href="https://journals.sagepub.com/doi/full/10.1177/17298814211002974" target="_blank" rel="noopener">provides lane positioning</a>. AI is a tool to increase efficiency, process and sort large volumes of data, and offload decision making.</p>
<p>Nevertheless, these tools are open to everyone, including criminals. And we’re already seeing the early stage adoption of AI by criminals. Deepfake technology has been used to <a href="https://www.bbc.co.uk/news/entertainment-arts-65854112" target="_blank" rel="noopener">generate revenge pornography</a>, for example.</p>
<p>Technology <a href="https://www.europol.europa.eu/crime-areas-and-statistics/crime-areas/cybercrime" target="_blank" rel="noopener">enhances the efficiency of criminal activity</a>. It allows lawbreakers to target a greater number of people and helps them be more plausible. Observing how criminals have adapted to, and adopted, technological advances in the past, can provide some clues as to how they might use AI.</p>
<h2>1. A better phishing hook</h2>
<p>AI tools like <a href="https://openai.com/blog/chatgpt" target="_blank" rel="noopener">ChatGPT</a> and <a href="https://bard.google.com" target="_blank" rel="noopener">Google’s Bard</a> provide writing support, allowing inexperienced writers to craft effective marketing messages, for example. However, this technology could also help criminals sound more believable when contacting potential victims.</p>
<p>Think about all those spam phishing emails and texts that are badly written and easily detected. Being plausible is key to being able to elicit information from a victim.</p>
<figure class="align-center "><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/images.theconversation.com/files/532909/original/file-20230620-15-in15vt.jpg?ssl=1" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/532909/original/file-20230620-15-in15vt.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/532909/original/file-20230620-15-in15vt.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/532909/original/file-20230620-15-in15vt.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/532909/original/file-20230620-15-in15vt.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/532909/original/file-20230620-15-in15vt.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/532909/original/file-20230620-15-in15vt.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=3 2262w" alt="Woman holding a smartphone." /><figcaption><span class="caption">Criminals could create a deepfake version of you who could interact with family members over the phone, text and email.</span><br />
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/hands-woman-holding-smartphone-using-online-2062352315" target="_blank" rel="noopener">Fizkes / Shutterstock</a></span></figcaption></figure>
<p>Phishing is a numbers game: an <a href="https://www.securitymagazine.com/articles/90345-more-than-three-billion-fake-emails-are-sent-worldwide-every-day" target="_blank" rel="noopener">estimated 3.4 billion spam emails</a> are sent every day. My own calculations show that if criminals were able to improve their messages so that as little as 0.000005% of them now convinced someone to reveal information, it would result in 6.2 million more phishing victims each year.</p>
<h2>2. Automated interactions</h2>
<p>One of the early uses for AI tools was to automate interactions between customers and services over text, chat messages and the phone. This enabled a faster response to customers and optimised business efficiency. Your first contact with an organisation is likely to be with an AI system, before you get to speak to a human.</p>
<p>Criminals can use the same tools to create automated interactions with large numbers of potential victims, <a href="https://www.scmagazine.com/news/emerging-technology/attackers-using-ai-to-enhance-conversational-scams-over-mobile-devices" target="_blank" rel="noopener">at a scale not possible</a> if it were just carried out by humans. They can impersonate legitimate services like banks over the phone and on email, in an attempt to elicit information that would allow them to steal your money.</p>
<h2>3. Deepfakes</h2>
<p>AI is really good at generating mathematical models that can be “trained” on large amounts of real-world data, making those models better at a given task. Deepfake technology in video and audio is an example of this. A deepfake act called <a href="https://blogs.nvidia.com/blog/2022/09/13/metaphysic-ai-avatars-americas-got-talent/" target="_blank" rel="noopener">Metaphysic</a>, recently demonstrated the technology’s potential when they unveiled a video of <a href="https://www.youtube.com/watch?v=mJeE9BNEa-o" target="_blank" rel="noopener">Simon Cowell singing opera on the television show America’s Got Talent</a>.</p>
<p>This technology is beyond the reach of most criminals, but the ability to use AI to mimic the way a person would respond to texts, write emails, leave voice notes or make phone calls is freely available using AI. So is the data to train it, which can be gathered from videos on social media, for example.</p>
<figure><iframe src="https://www.youtube.com/embed/mJeE9BNEa-o?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">The deepfake act Metaphysic perform on America’s Got Talent.</span></figcaption></figure>
<p>Social media has always been a rich seam for criminals mining information on potential targets. There is now the potential for AI to be used to create a deepfake version of you. This deepfake can be exploited to interact with friends and family, convincing them to hand criminals information on you. Gaining a <a href="https://dl.acm.org/doi/abs/10.1145/3372297.3417892" target="_blank" rel="noopener">better insight into your life</a> makes it <a href="https://www.itpro.com/security/34616/the-top-password-cracking-techniques-used-by-hackers" target="_blank" rel="noopener">easier to guess</a> passwords or pins.</p>
<h2>4. Brute forcing</h2>
<p>Another technique used by criminals called “brute forcing” could also benefit from AI. This is where many combinations of characters and symbols are tried in turn to see if they match your passwords.</p>
<p>That’s why long, complex passwords are safer; they are harder to<br />
guess by this method. Brute forcing is resource intensive, but it’s easier if you know something about the person. For example, this allows lists of potential passwords to be ordered according to priority – increasing the efficiency of the process. For instance, they could start off with combinations that relate to the names of family members or pets.</p>
<p>Algorithms trained on your data could be used to help build these prioritised lists more accurately and target many people at once – so fewer resources are needed. Specific AI tools could be developed that harvest your online data, then analyse it all to build a profile of you.</p>
<p>If, for example, you frequently posted on social media about Taylor Swift, manually going through your posts for password clues would be hard work. Automated tools do this quickly and efficiently. All of this information would go into making the profile, making it easier to guess passwords and pins.</p>
<h2>Healthy scepticism</h2>
<p>We should not be frightened of AI, as it could bring real benefits to society. But as with any new technology, society needs to adapt to and understand it. Although we take smart phones for granted now, society had to adjust to having them in our lives. They have largely been beneficial, but uncertainties remain, such as a good amount of screen time for children.</p>
<p>As individuals, we should be proactive in our attempts to understand AI, not complacent. We should develop our own approaches to it, maintaining a healthy sense of scepticism. We will need to consider how we verify the validity of what we are reading, hearing or seeing.</p>
<p>These simple acts will help society reap the benefits of AI while ensuring we can protect ourselves from potential harms.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img data-recalc-dims="1" loading="lazy" decoding="async" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://i0.wp.com/counter.theconversation.com/content/207944/count.gif?resize=1%2C1&#038;ssl=1" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>
<p>Author: <a href="https://theconversation.com/profiles/daniel-prince-104771" target="_blank" rel="noopener">Daniel Prince</a>, Professor of Cyber Security, <em><a href="https://theconversation.com/institutions/lancaster-university-1176" target="_blank" rel="noopener">Lancaster University</a></em></p>
<p>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/four-ways-criminals-could-use-ai-to-target-more-victims-207944" target="_blank" rel="noopener">original article</a>.</p>
<p>&nbsp;</p>
<p>Image Credit: <a href="https://www.freepik.com/free-photo/female-scientist-white_4103194.htm#page=2&amp;query=AI%20cybersecurity&amp;position=16&amp;from_view=search&amp;track=ais" target="_blank" rel="noopener">Image by rawpixel.com</a> on Freepik</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/four-ways-criminals-could-use-ai-to-target-more-victims/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5384</post-id>	</item>
		<item>
		<title>Akingate Tech News Digest 01 Apr 2023</title>
		<link>https://www.akingate.com/akingate-tech-news-digest-01-apr-2023/</link>
					<comments>https://www.akingate.com/akingate-tech-news-digest-01-apr-2023/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Sat, 01 Apr 2023 13:04:37 +0000</pubDate>
				<category><![CDATA[Financial services]]></category>
		<category><![CDATA[Real Estate]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Access Bank]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[AfriGOPay]]></category>
		<category><![CDATA[Alcineo]]></category>
		<category><![CDATA[CBN]]></category>
		<category><![CDATA[CSIRT]]></category>
		<category><![CDATA[Fez Delivery]]></category>
		<category><![CDATA[fintech]]></category>
		<category><![CDATA[funding]]></category>
		<category><![CDATA[HouseAfrica]]></category>
		<category><![CDATA[Logistics startup]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[NCC]]></category>
		<category><![CDATA[Prop-tech]]></category>
		<category><![CDATA[SoftPoS]]></category>
		<category><![CDATA[startups]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Verve]]></category>
		<category><![CDATA[YouTube]]></category>
		<guid isPermaLink="false">https://www.akingate.com/?p=5326</guid>

					<description><![CDATA[A selection of tech news from Nigeria and Africa at large. Verve partners Alcineo for SoftPoS &#124; Logistics startup, Fez Delivery, secure funding &#124; Funding for Prop-tech startup HouseAfrica &#124; Pirated YouTube software malware Alerts &#124; Access Bank Partners AfriGOPay [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;">A selection of tech news from Nigeria and Africa at large.</p>
<p style="text-align: center;"><strong>Verve partners Alcineo for SoftPoS | Logistics startup, Fez Delivery, secure funding | Funding for Prop-tech startup HouseAfrica | Pirated YouTube software malware Alerts | Access Bank Partners AfriGOPay on Card Development</strong></p>
<p>&nbsp;</p>
<h4><strong>Firms promote mobile contactless payment &#8211; Punch News</strong></h4>
<p>Verve has partnered with Alcineo to deploy a software point-of-sale SDK solution. According to the firms, the solution would enable merchants to use mobile phones or mobile devices to accept contactless payments from customers, without the need for additional hardware.</p>
<p>They stated that software solution will leverage Verve’s secure payments platform and Alcineo’s expertise in payment software development. In a statement, the firms said, “The solution is expected to be particularly beneficial to small and medium-sized enterprises (SMEs) often faced with the challenges of accessing traditional point-of-sale systems.</p>
<p>The SoftPOS deployment in Nigeria is expected to further strengthen and contribute to the growth of digital payments in the country, across Africa and other regions where the Verve card is accepted.”</p>
<p>The Managing Director of Verve International, Vincent Ogbunude, said, “We are excited to partner with Alcineo to deploy this innovative SoftPOS solution in Nigeria. Alcineo’s expertise in payment software development will be instrumental in ensuring that the solution is secure, reliable, and easy to use for both merchants and customers. <a href="https://punchng.com/firms-promote-mobile-contactless-payment/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<h4><strong>Lagos-based startup, Fez Delivery, secures $1M funding &#8211; Ripples News</strong></h4>
<p>Ventures Platform, a pan-African investor, led the $1 million funding round for Fez Delivery, a last-mile logistics firm with locations throughout Nigeria. Founder and CEO, Seun Alley, confirmed the funding in a statement on Tuesday.</p>
<p>The company said it plans to use the seed investment to deepen its work in Nigeria while it considers expansion into other African markets, including Ghana, Kenya, and South Africa. The funding also saw participation from Voltron Capital, Acasia Ventures, and other angel investors.</p>
<p>“So I like to refer to Fez as running a hybrid model. We have the technology and still own 30% of the assets on our platform. “What that does is that if third-party partners don’t show up for any reason, we have backup and can complete our deliveries by ourselves,” the CEO explained of his company. <a href="https://www.ripplesnigeria.com/lagos-based-startup-fez-delivery-secures-1m-funding-2-other-stories-and-a-trivia/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<h4><strong>Nigerian prop-tech startup HouseAfrica raises $400k funding round &#8211; Disrupt Africa</strong></h4>
<p>Nigeria’s HouseAfrica, a <a href="https://www.akingate.com/how-is-technology-advancing-the-real-estate-sector/">prop-tech</a> startup providing real estate digitalisation and transparency tools to property developers and their customers, has raised US$400,000 in funding. Founded in 2019 by Nnamdi Uba and Ndifreke Ikpoku, HouseAfrica aims to enhance the real estate industry’s efficiency and trust by leveraging innovative technologies.</p>
<p>Its flagship product Sytemap.com leverages proprietary blockchain and map technology to create a private land registry, digitising real estate project sitemaps and enabling instant land transaction authentication while growing sales for real estate companies. Sytemap simplifies buying and paying for properties, enabling more people to become digital realtors effortlessly, and is already used by more than 100 real estate companies.</p>
<p>The US$400,000 funding round will be used to deepen the startup’s technology, increase adoption, and grow its team. HouseAfrica is backed by investors such as Future Africa, SSE Angel Network (SSEAN), ARM Labs, CV VC, Startupbootcamp AfriTech, Niche Capital, and Rebel Seed Capital. <a href="https://disrupt-africa.com/2023/03/28/nigerian-prop-tech-startup-houseafrica-raises-400k-funding-round/" target="_blank" rel="noopener"><strong>Read more here</strong>  </a></p>
<p>&nbsp;</p>
<h4><strong>NCC-CSIRT alerts Nigerians to pirated YouTube software malware &#8211; TheGuardian News</strong></h4>
<p>Commission renews commitment to industry collaboration, inclusiveness.</p>
<p>The Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) has warned those looking to acquire pirated software and resources that they risk becoming victims of cybercriminal gangs that are using AI-generated YouTube videos to distribute malware.</p>
<p>NCC-CSIRT further warned in its advisory that the consequences of falling victim can be significant for individuals and organisations, resulting in critical damage like data theft, financial loss, identity theft, system damage, and reputation damage.</p>
<p>It said unsuspecting victims, who watch these AI-generated tutorial videos will be duped into clicking on one of the links in the video description, which usually results in the download of data-stealing malware. NCC said the number of YouTube videos containing such links has increased by 200 per cent to 300 per cent month-on-month since November 2022. <a href="https://guardian.ng/technology/ncc-csirt-alerts-nigerians-to-pirated-youtube-software-malware/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<h4><strong>Access Bank Partners AfriGOPay to Provide First National Domestic Card Developed by CBN &#8211; Legit News</strong></h4>
<p>Access Bank is partnering with AfriGOPay, a financial services company aligned with the Nigeria Inter-Bank Settlement System (NIBBS) to launch Nigeria&#8217;s first National Domestic Card, created to meet the payment needs of Nigerians. The project initiated by the Central Bank of Nigeria (CBN) and the NIBBS will provide creative solutions to users of financial institutions in Nigeria, Africa and across the world.</p>
<p>Access Bank launches National Domestic Card Credit: Access Bank&#8217;s Deputy Managing Director of Retail Banking, Victor Etuokwu said the bank is the first financial institution in Nigeria to issue the first live card of the National Domestic Card in partnership with AfriGo. He said: &#8220;The launch of AfriGO is another milestone in developing a vibrant and rapidly expanding payments industry. Consumers demand value in real-time, not just transactions. With AfriGO, we can provide valuable card benefits, robust loyalty rewards, and a compelling incentive to utilize electronic payments rather than cash. &#8220;The AfriGO Card has additional benefits because it is designed to facilitate the growth of Nigeria&#8217;s payment ecosystem, thereby supporting more tailored payment services. It will strengthen payment security, expand financial participation, guarantee data sovereignty, eliminate FX dependency, and provide Nigerians several other benefits. Cardholders will enjoy increased affordability and more flexible payment options.&#8221; Senior Retail Advisor of Access Bank, Robert Giles said the card operates locally and is designed for Nigeria&#8217;s specific needs. The bank has recorded successful purchases of PoS and ATMs beginning from March 14, 2023. <a href="https://www.legit.ng/business-economy/technology/1528095-access-bank-partners-afrigopay-provide-national-domestic-card-developed-by-cbn/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p><strong> </strong></p>
<p style="text-align: center;">__________________________________________________________</p>
<p>&nbsp;</p>
<p>Image Credit: <a href="https://www.freepik.com/free-vector/vector-illustration-realistic-style-concept-mobile-payments-using-application-your-smartphone_1215794.htm#query=mobile%20card%20payment&amp;position=22&amp;from_view=search&amp;track=ais" target="_blank" rel="noopener">Image by vectorpocket</a> on Freepik</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/akingate-tech-news-digest-01-apr-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5326</post-id>	</item>
		<item>
		<title>Akingate Tech News Digest 25 Feb 2023</title>
		<link>https://www.akingate.com/akingate-tech-news-digest-18-feb-2023-2/</link>
					<comments>https://www.akingate.com/akingate-tech-news-digest-18-feb-2023-2/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Sat, 25 Feb 2023 14:35:17 +0000</pubDate>
				<category><![CDATA[Agriculture]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Telecommunication]]></category>
		<category><![CDATA[5G Technology]]></category>
		<category><![CDATA[Accelerator Program]]></category>
		<category><![CDATA[Agfunder]]></category>
		<category><![CDATA[agritech]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Edtech]]></category>
		<category><![CDATA[funding]]></category>
		<category><![CDATA[Healthtech]]></category>
		<category><![CDATA[Investment #startups]]></category>
		<category><![CDATA[Nigeria]]></category>
		<category><![CDATA[PUNCH]]></category>
		<category><![CDATA[Ripples News]]></category>
		<category><![CDATA[South Africa]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tech Gist Africa]]></category>
		<category><![CDATA[Tech in Africa]]></category>
		<category><![CDATA[The Guardian]]></category>
		<guid isPermaLink="false">https://akingate.com/?p=5258</guid>

					<description><![CDATA[A selection of tech news from Nigeria and Africa at large. Firms Partner To Reduce Cyberattacks &#124; Edtech Accelerator Program &#124; Opportunities In 5G Technology &#124; Agfunder Inviting Agritech Startups &#124; Healthtech Startup Raises $1.65M Investment &#160; Firms partner to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;">A selection of tech news from Nigeria and Africa at large.</p>
<p style="text-align: center;"><strong>Firms Partner To Reduce Cyberattacks | Edtech Accelerator Program | Opportunities In 5G Technology | Agfunder Inviting Agritech Startups | Healthtech Startup Raises $1.65M Investment</strong></p>
<p>&nbsp;</p>
<h4><strong>Firms partner to reduce cyberattacks &#8211; Punch News</strong></h4>
<p>Mastercard has partnered with NowNow, a Nigerian digital payment startup to help small and medium-size enterprises to reduce the risk of cyberattacks. According to the firm, there has been a leap in cybercrimes recently.</p>
<p>It stated that SMEs were the main target for cybercriminals since they do not have the resources to help themselves defend against breaches. It said as part of its Start Path Global Programme, it would provide NowNow with operational support, commercial engagement, and the opportunity for strategic investment.</p>
<p>The Executive Vice President, Product Optimisation and Customer Advancement, Cyber and Intelligence at Mastercard, Paul Trueman, said, “As Mastercard brings the next billion people into the digital economy, it is vital that business owners feel as secure and safe from cybercrime as possible. “Our partnership with NowNow is key to achieving this. Whether large or small, businesses deserve the peace of mind to operate knowing that they are being kept safe.” <a href="https://punchng.com/firms-partner-to-reduce-cyberattacks/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<h4><strong>CcHUB launches a $15M edtech accelerator program to support startups &#8211; TechinAfrica</strong></h4>
<p>LAfrica’s biggest innovation hub, Co-Creation Hub (CcHUB), has started “The Edtech Fellowship Program,” a $15 million accelerator program. A statement from the company says that it will back and help 72 startups in Nigeria and Kenya for the next three years.</p>
<p>The program’s goal is to increase the impact of edtech startups and help founders who use technology to improve learning in an education sector with many problems.</p>
<p>This report says that about 98 million children and young people don’t attend school in the sub-Saharan region. This is where most children don’t go to school. Even for people in school, the quality of education is terrible. This makes teaching a good place for edtech startups to grow in the region.</p>
<p>The fellowship program will focus on startups in Nigeria and Kenya, two of the continent’s biggest edtech markets. It will pay for solutions beyond tutorial apps and platforms focusing on rote learning. The program will also give startups access to $100,000 in startup capital to use during the program.</p>
<p>The company wants to help edtech startups by giving them access to shared resources like a product development team, government relations team, pedagogy and learning science team, portfolio management team, communication team, instructional design team, and community building team. <a href="https://www.techinafrica.com/cchub-launches-a-15m-edtech-accelerator-program-to-support-startups/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<h4><strong>Exploring opportunities in 5G technology &#8211;  TheGuardian</strong></h4>
<p>With higher multi-Gbps maximum data speeds of up to 10 Gbps, ultra-low latency, increased reliability, massive network capacity, and increased availability, 5G will drive innovation across every sector, industry and transform everything, as we know it. What does this mean for Nigerians and how will it impact our lives, from the software developer based in Lagos to the grandma in the depths of Makurdi.</p>
<p>According to the World Bank, Nigeria has the highest number of out-of-school children in the world.  5G is able to accelerate the democratisation of inclusive and affordable access to quality education, thus leveling the playing field between children in remote villages and children in cities. 5G can help transform education in Nigeria, as students will be able to download learning materials faster and collaborate in real-time. Medical students are not excluded from this educational experience. They can use augmented reality (AR) to dissect cadavers and diagnose illnesses, among other things. Indeed, 5G technology will advance the educational sector in Nigeria by bringing abstracts to life and introducing a new way of seeing the world. <a href="https://guardian.ng/technology/exploring-opportunities-in-5g-technology/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<h4><strong>GROW Impact Accelerator invites applications from African agritech startups &#8211; Tech Gist Africa</strong></h4>
<p>The GROW Impact Accelerator is currently accepting applications from agri-tech startups based in Africa. New foodtech and agtech firms that are attempting to solve some of the world’s most pressing sustainability issues are being given a huge boost by the GROW Impact Accelerator, which is funded by AgFunder. The accelerator program intends to hasten the development of several solutions for the manner in which we produce, process, package, transport, eat, and discard our food.</p>
<p>GROW believes that founders should receive comprehensive support; businesses succeed when their founders have the commercial, technical, and professional assistance they require to prosper. Founders can tailor their experience within the program’s cohort-based framework by choosing from a variety of thematic “streams.”</p>
<p>The GROW framework questions your value proposition and business model to make sure they are robust, customer-focused, and scalable. <a href="https://www.techgistafrica.com/accelerator/grow-impact-accelerator-invites-applications-from-african-agritech-startups/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<h4><strong>Healthtech startup, Envisionit Deep AI, raises $1.65M investment &#8211; Ripples News</strong></h4>
<p>Female-led <a href="https://akingate.com/medical-technologies-transforming-disease-prevention-diagnosis-and-treatment/" target="_blank" rel="noopener">healthtech</a> startup, Envisionit Deep AI, has raised a $1.65 million investment from New GX Ventures. The female founder, Dr. Jaishree Naidoo, who was in charge of pediatric radiology at a South African hospital, confirmed the funding in a statement on Friday.</p>
<p>The funding follows closely after the startup emerged as the Southern Africa regional winner at the African Startup Awards. New GX Ventures SA is a joint venture between New GX Capital, RMB Ventures, and GIIG Africa. <a href="https://www.ripplesnigeria.com/healthtech-startup-envisionit-deep-ai-raises-1-65m-investment-2-other-stories-and-a-trivia/" target="_blank" rel="noopener"><strong>Read more here</strong></a></p>
<p>&nbsp;</p>
<p style="text-align: center;">__________________________________________________________</p>
<p>&nbsp;</p>
<p>Image Credit: <a href="https://www.freepik.com/free-photo/doctor-touching-modern-virtual-screen-interface-medical-technology_15559153.htm#page=2&amp;query=healthtech%20africa&amp;position=22&amp;from_view=search&amp;track=ais" target="_blank" rel="noopener">Image by rawpixel.com</a> on Freepik</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/akingate-tech-news-digest-18-feb-2023-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5258</post-id>	</item>
		<item>
		<title>Technological Advances In Biometric Security</title>
		<link>https://www.akingate.com/technological-advances-in-biometric-security/</link>
					<comments>https://www.akingate.com/technological-advances-in-biometric-security/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Fri, 23 Dec 2022 11:15:48 +0000</pubDate>
				<category><![CDATA[G-Tech]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Biometric]]></category>
		<category><![CDATA[Biometric Keys]]></category>
		<category><![CDATA[Capacitive Touchscreen]]></category>
		<category><![CDATA[Face recognition]]></category>
		<category><![CDATA[Fingerprint]]></category>
		<category><![CDATA[Iris scanning]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Video Glasses]]></category>
		<category><![CDATA[Virtual reality]]></category>
		<category><![CDATA[Voice recognition]]></category>
		<guid isPermaLink="false">https://akingate.com/?p=5079</guid>

					<description><![CDATA[Biometric security involves using biometric software to recognise people based on their behavioural or biological characteristics. The future of security is using personal data as digital keys. This is more secure than passwords and pins because you don&#8217;t have to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Biometric security involves using biometric software to recognise people based on their behavioural or biological characteristics. The future of security is using personal data as digital keys. This is more secure than passwords and pins because you don&#8217;t have to remember anything and can use this for home automation, car access, etc. In this article, we are reflecting on some biometric identifiers, including the five most common: fingerprints, facial, voice, iris, and palm or finger vein patterns.</p>
<p>&nbsp;</p>
<h4><strong>Fingerprint recognition</strong></h4>
<p>Fingerprint recognition is a biometric technology that uses the unique pattern found in your fingerprint to identify you. It has been used for decades but has recently become popular in smartphones. Most smartphones have a fingerprint scanner built into the home button, and it’s often used to unlock your phone or authorise purchases from apps like Apple Pay or Samsung Pay (depending on which brand of phone you have).</p>
<p>There are two main types of scanners: optical scanners detect patterns by shining infrared light at a person&#8217;s finger, and capacitive scanners use tiny electrical charges measured against an array of electrodes on the glass surface of the screen or glass panel itself.</p>
<p>&nbsp;</p>
<h4><strong>Face recognition</strong></h4>
<p>Face recognition is automatically identifying or verifying a person from a digital image or a video frame from a video source. It is one of the most popular biometrics used in security systems.</p>
<p>Face recognition has been studied and researched for decades, but only recently has it become more advanced with advances in machine learning algorithms. These days, facial recognition is not limited to humans; it can be done on animals too!</p>
<p>&nbsp;</p>
<h4><strong>Voice recognition</strong></h4>
<p>Voice recognition is the ability of a computer to understand human speech. It uses computer algorithms to recognise the words spoken by a person and can be used in phones, computers and other devices.</p>
<p>Voice recognition can unlock phones or control devices like TVs or computers. It can also be used for dictation: you speak into your phone, and the words appear on the screen as you say them. Voice recognition software is accessible online, and it’s easy to set up with apps like Google Voice Typing (for Android) or Dragon Dictation (for iOS).</p>
<div id="attachment_5083" style="width: 970px" class="wp-caption aligncenter"><img data-recalc-dims="1" loading="lazy" decoding="async" aria-describedby="caption-attachment-5083" class="wp-image-5083 size-full" src="https://i0.wp.com/akingate.com/wp-content/uploads/2022/12/AKINGATE-Biometrics-2-960by640.jpg?resize=960%2C640&#038;ssl=1" alt="AKINGATE Biometrics 2" width="960" height="640" /><p id="caption-attachment-5083" class="wp-caption-text">AKINGATE Biometrics 2</p></div>
<h4><strong>Iris scanning</strong></h4>
<p>Iris scanning is an accurate form of biometric identification that uses the unique pattern of your iris to verify your identity. It can be used in airports and other high-security areas when you&#8217;re passing through security checkpoints, as it can reduce wait times significantly.</p>
<p>It&#8217;s also possible to use iris scanning in conjunction with other forms of biometric identification—like facial recognition or fingerprinting—to confirm someone&#8217;s identity without requiring them to stop what they&#8217;re doing or even look up from their phone. Suppose a person has been identified via iris scan, but their face isn&#8217;t visible due to poor lighting conditions or some other circumstance that makes facial recognition difficult. Their fingerprints may become visible on the device screen as they press harder on their surface area (which triggers an optical sensor). This could help identify individuals who have been previously scanned but where there was no confirmation available at the time due to poor lighting conditions etc.</p>
<p>Iris scanning is also being integrated into automobiles and smartphones so that drivers can unlock their vehicles simply by standing near them; passengers will need only hold up their hands towards car windshields before being able to unlock doors using gestures made using fingers rather than keys!</p>
<p>&nbsp;</p>
<h4><strong>Capacitive Touchscreen</strong></h4>
<p>A capacitive touchscreen is a type of touchscreen that is sensitive to the presence of a finger or stylus. It is a control display that uses the conductive touch of a human finger or a specialised input device for input and control. It works by sensing the electrical properties of the human body rather than by optical methods such as infrared cameras. Capacitive screens are made up of glass, plastic or ceramic and have an electrode layer sensitive to touch.</p>
<p>Capacitive screens are commonly found in smartphones and tablets because they offer more durability than other screen technologies like resistive touchscreens (which require pressure) or surface acoustic wave (SAW) panels (which can only be built into thin devices).</p>
<p>&nbsp;</p>
<h4><strong>Video Glasses and Virtual Reality</strong></h4>
<p>Biometrics in virtual reality is an expanding technology space being utilised in several interesting areas, including for health and medical uses.</p>
<p>VR uses a headset to immerse you fully into a digital environment. Doing this tricks your brain into thinking that what you see is real—even if it isn&#8217;t. To make the experience even more realistic, some headsets utilise motion controls to interact with the digital world just like you would in real life. Virtual reality can be used for security by creating highly detailed simulations of different environments or situations and training people to react when facing such scenarios.</p>
<p>Virtual reality has already been implemented in several areas, like healthcare and education. More recently, it saw its first use in law enforcement training by providing officers with hands-on experiences during active shooter drills where they could practice their response without putting others at risk.</p>
<p>As technology improves over time, we will see an increase in adoption rates among consumers who want access to these technologies at home because they can bring them back from work or school daily!</p>
<p>&nbsp;</p>
<h4><strong>Biometric Keys for Cars</strong></h4>
<p>Biometric keys for cars are a real thing. You may have heard about biometric locks, which use your fingerprint or other biological information to unlock a door or secure area. Biometric car keys work the same way, except they unlock your car instead of just a room or building.</p>
<p>These types of keys offer several advantages over traditional car keys:</p>
<ul>
<li>They&#8217;re more secure than traditional keys since they rely on your unique body features rather than easily stealable materials like metal and plastic. It&#8217;s pretty hard to get someone else&#8217;s finger into the lock! (under normal circumstances, we hasten to add).</li>
<li>They can also be more convenient than using traditional car keys because you don&#8217;t need to worry about losing them (or having them stolen). All you&#8217;ll need is yourself—and perhaps some patience while you wait for the scanner on your vehicle&#8217;s dashboard that reads your biometric print before it unlocks its doors!</li>
</ul>
<p>&nbsp;</p>
<h4><strong>Conclusion</strong></h4>
<p><a href="https://akingate.com/surveillance-technology-is-turning-back-the-management-clock/" target="_blank" rel="noopener">Security</a> is constantly evolving, and there will always be more to learn. We must keep an open mind about how our adversaries change and grow their tactics. We can better protect ourselves from harm by keeping an eye on what’s happening around us.</p>
<p>Security is constantly changing and developing. The best way to keep up with new threats is by connecting with others who can share information with you about threats they&#8217;ve seen or dealt with recently.</p>
<p class="Normal1"><span lang="EN" style="font-size: 12.0pt; line-height: 115%;">.</span></p>
<p>&nbsp;</p>
<p style="text-align: center;"><em> </em>_____________________________________________________________</p>
<p>Copyright © Akingate. All Rights Reserved.</p>
<p>See our <a href="https://akingate.com/copyright-notice/" target="_blank" rel="noopener">copyright notice</a>.</p>
<p>&nbsp;</p>
<p>Image Credit: <a href="https://www.freepik.com/free-photo/identification-scanning-system_4103012.htm#query=biometric%20identification&amp;position=3&amp;from_view=search&amp;track=sph#page=1&amp;query=b&amp;from_query=undefined&amp;position=1&amp;from_view=search&amp;track=sph" target="_blank" rel="noopener">Image by rawpixel.com</a> on Freepik  |  <a href="https://www.freepik.com/free-photo/biometrics-digital-transformation-with-futuristic-microchip-remixed-media_16016833.htm#query=biometric&amp;position=24&amp;from_view=search&amp;track=sph" target="_blank" rel="noopener">Image by rawpixel.com</a> on Freepik</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/technological-advances-in-biometric-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5079</post-id>	</item>
		<item>
		<title>Surveillance technology enabling managers to keep tabs on what workers are up to</title>
		<link>https://www.akingate.com/surveillance-technology-is-turning-back-the-management-clock/</link>
					<comments>https://www.akingate.com/surveillance-technology-is-turning-back-the-management-clock/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Fri, 28 Oct 2022 12:52:17 +0000</pubDate>
				<category><![CDATA[Computing and ICT]]></category>
		<category><![CDATA[G-Tech]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Industrial relations]]></category>
		<category><![CDATA[Online surveillance]]></category>
		<category><![CDATA[Performance management]]></category>
		<category><![CDATA[Social trust]]></category>
		<category><![CDATA[Worker productivity]]></category>
		<guid isPermaLink="false">https://akingate.com/?p=4963</guid>

					<description><![CDATA[If you’re reading this during work hours, there’s a chance your boss knows about it. The market for “bossware” – digital tools that enable managers to keep tabs on what workers are up to – is reportedly booming. News reports [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>If you’re reading this during work hours, there’s a chance your boss knows about it. The market for “bossware” – digital tools that enable managers to keep tabs on what workers are up to – is <a href="https://www.theguardian.com/technology/2022/apr/27/remote-work-software-home-surveillance-computer-monitoring-pandemic" target="_blank" rel="noopener">reportedly booming</a>.</p>
<p>News reports recount tales of health-care workers being ranked “idle” for not typing while counselling drug patients, and hospice chaplains losing “productivity points” for spending too long with the bereaved or dying.</p>
<p>In the United States <a href="https://www.gartner.com/en/articles/the-right-way-to-monitor-your-employee-productivity" target="_blank" rel="noopener">60% of employers</a> with more than 200 workers now use “employee productivity monitoring technologies”, according to market research firm Gartner.</p>
<p>Once loaded on your computer, these tools (with names such as <a href="https://clevercontrol.com/" target="_blank" rel="noopener">Clever Control</a>, <a href="https://www.timedoctor.com/" target="_blank" rel="noopener">Time Doctor</a>, <a href="https://www.staffcop.com/" target="_blank" rel="noopener">Staffcop</a> and <a href="https://www.workexaminer.com/" target="_blank" rel="noopener">Work Examiner</a>) can track a dizzying array of data – key strokes, how often you move your mouse, if you are using messaging apps, your search queries and the websites you visit.</p>
<p>They can view your screen and record video from your webcam. Work Examiner boasts it can “record every second of an employee’s screen activity”.</p>
<p>They then turn this into easily digestable data on a dashboard (for your manager), highlighting your active hours and “idle time”, awarding you a productivity score, and ranking you against your colleagues.</p>
<hr />
<figure class="align-center "><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/images.theconversation.com/files/484470/original/file-20220914-4780-bbzt6f.png?ssl=1" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/484470/original/file-20220914-4780-bbzt6f.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=296&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/484470/original/file-20220914-4780-bbzt6f.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=296&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/484470/original/file-20220914-4780-bbzt6f.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=296&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/484470/original/file-20220914-4780-bbzt6f.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=371&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/484470/original/file-20220914-4780-bbzt6f.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=371&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/484470/original/file-20220914-4780-bbzt6f.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=371&amp;fit=crop&amp;dpr=3 2262w" alt="" /><figcaption><span class="caption">This demo dashboard from Work Examiner shows the ‘productivity’ of an individual worker.</span><br />
<span class="attribution"><a class="source" href="https://www.workexaminer.com/" target="_blank" rel="noopener">Work Examiner</a></span></figcaption></figure>
<hr />
<p>This may be happening <a href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers" target="_blank" rel="noopener">without you even realising</a>. Even if you are informed, it’s done without your input. Too few mouse clicks? There may be a very good reason, but the software doesn’t care.</p>
<p>These <a href="https://akingate.com/cyber-security-uniformed-and-protective-services/" target="_blank" rel="noopener">technologies</a> are relatively new but the thinking behind them – that productivity can be reduced to simple measurements, and that workers must be constantly surveilled and managed for maximum efficiency – is relatively old.</p>
<p>More than a century ago techniques to observe and control workers movements intensively were developed into a theory of “scientific management” by US engineer Frederick Winslow Taylor. Tracking mouse clicks remotely is a high-tech version of the same game.</p>
<p>The promises of bossware – of better performance and more control – are tempting to management. But they are also profoundly wrong.</p>
<h2>Inventing ‘scientific management’</h2>
<p>Taylor, who was born in 1856, developed his management ideas while working at the Midvale Steel Works in Philadelphia, Pennsylvania, where he rose through the ranks to become chief engineer.</p>
<figure class="align-center "><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/images.theconversation.com/files/483946/original/file-20220912-12-kq1du7.jpg?ssl=1" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/483946/original/file-20220912-12-kq1du7.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=436&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/483946/original/file-20220912-12-kq1du7.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=436&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/483946/original/file-20220912-12-kq1du7.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=436&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/483946/original/file-20220912-12-kq1du7.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=548&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/483946/original/file-20220912-12-kq1du7.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=548&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/483946/original/file-20220912-12-kq1du7.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=548&amp;fit=crop&amp;dpr=3 2262w" alt="" /><figcaption><span class="caption">‘Testing Engineer at Work’: this photo taken at the Midvale Steel Company in Philadelphia, Pennsylvania circa 1885 is believed to be show Frederick Winslow Taylor observing an engineer at work.</span><br />
<span class="attribution"><a class="source" href="https://www.flickr.com/photos/kheelcenter/5279194177/in/photostream/" target="_blank" rel="noopener">The Kheel Center for Labor-Management Documentation and Archives, Cornell University</a>, <a class="license" href="http://creativecommons.org/licenses/by/4.0/" target="_blank" rel="noopener">CC BY</a></span></figcaption></figure>
<p>His book <a href="https://www.gutenberg.org/ebooks/6435" target="_blank" rel="noopener">Principles of Scientific Management</a> was published in 1911. The fundamental “science” of management involved intensive surveillance of workers’ activities, breaking them down into constituent parts, and determining the most efficient way everything should be done.</p>
<p>If workers went about drilling holes in different ways, for example, the scientific manager should time each method and then require everyone do it the fastest way. Even if the manager had never handled a drill, the stopwatch enabled them to judge what was most efficient.</p>
<p>Taylor’s book went on to become one of the most influential management books of the 20th century. But it has also <a href="https://strivetoengage.wordpress.com/2015/09/20/guest-post-book-review-donkins-the-history-of-work/" target="_blank" rel="noopener">been blamed for</a> a “ghastly sublimation of the human spirit”.</p>
<h2>Three problems with surveillance</h2>
<p>So what’s wrong with excessive managerial surveillance?</p>
<p>First, it can be harmful to health – both mental and physical. This has been well-documented by research on <a href="https://doi.org/10.1023/A:1015194108376" target="_blank" rel="noopener">call centres</a>, which pioneered many of the white-collar surveillance techniques now spreading to other workplaces.</p>
<p>Second, measurement techniques create misleading accounts of what workers do. We have reviewed <a href="https://doi.org/10.1111/ijmr.12177" target="_blank" rel="noopener">100 years of performance management research</a> and found that performance management systems are far from “scientific”.</p>
<p>Measurement is not just observation. It requires reducing work to elements that can be categorised and compared.</p>
<p>A “productivity score” based on measuring keystrokes and mouse clicks illustrates this starkly. It involves a misleading simplification. A stopwatch cannot tell whether a hole was drilled with precision or not. Neither can a mouse tracker capture a worker’s thoughtfulness and experience.</p>
<p>Third, intensive surveillance can actually decrease outcomes. This has been shown in multiple studies. For example, a <a href="https://doi.org/10.1177/0018726716628971" target="_blank" rel="noopener">2016 study</a> found intensive surveillance of cleaners prevented them cleaning rooms well. With just three minutes allowed per room, some resorted to scrubbing school floors and bleaching toilets for free on their weekends.</p>
<figure class="align-center "><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/images.theconversation.com/files/484988/original/file-20220916-18-p2bwez.jpg?ssl=1" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/484988/original/file-20220916-18-p2bwez.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/484988/original/file-20220916-18-p2bwez.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/484988/original/file-20220916-18-p2bwez.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/484988/original/file-20220916-18-p2bwez.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/484988/original/file-20220916-18-p2bwez.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/484988/original/file-20220916-18-p2bwez.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=3 2262w" alt="Excessive emphasis on single 'productivity' measures such as time can harm work quality." /><figcaption><span class="caption">Excessive emphasis on single ‘productivity’ measures such as time can harm work quality.</span><br />
<span class="attribution"><span class="source">Shutterstock</span></span></figcaption></figure>
<p>A <a href="https://onlinelibrary.wiley.com/doi/abs/10.1111/ntwe.12087" target="_blank" rel="noopener">2107 study of electronic monitoring of nurses</a> providing home care to the elderly and disabled found a similar loss of work quality.</p>
<p>If they want to improve productivity, managers need to talk with workers. E-surveillance and performance dashboards that allow judgement from a distance, without context, undermine this relationship.</p>
<h2>Measuring less, understanding more</h2>
<p>The resurgence of <a href="https://protect-au.mimecast.com/s/bM2wC3QNl1S65mp1sgJr0z?domain=nytimes.com" target="_blank" rel="noopener">management surveillance</a> is a worrying trend.<br />
But the fundamental problem is not the technology. It is managers’ desire – which technology enables – to know more than they can and to trust workers less than they should. Bossware promises managers that illusion.</p>
<p>A different path would be to accept that <a href="https://doi.org/10.1177%2F0018726716628971" target="_blank" rel="noopener">most people want to work well</a>, and generally know best how to do so. Managers might then measure less, but understand more.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img data-recalc-dims="1" loading="lazy" decoding="async" style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://i0.wp.com/counter.theconversation.com/content/189070/count.gif?resize=1%2C1&#038;ssl=1" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p>
<p>Authors: <a href="https://theconversation.com/profiles/dale-tweedie-115994" target="_blank" rel="noopener">Dale Tweedie</a>, Senior lecturer, <em><a href="https://theconversation.com/institutions/macquarie-university-1174" target="_blank" rel="noopener">Macquarie University</a></em> and <a href="https://theconversation.com/profiles/david-wild-180936" target="_blank" rel="noopener">David Wild</a>, Senior Research Assistant, <em><a href="https://theconversation.com/institutions/macquarie-university-1174" target="_blank" rel="noopener">Macquarie University</a></em></p>
<p>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license.</p>
<p>&nbsp;</p>
<p style="text-align: center;"> ___________________________________</p>
<p>&nbsp;</p>
<p>Image Credit: <a href="https://www.freepik.com/free-vector/security-control-cctv-room-interior-with-multiple-monitors-displaying-video-from-surveillance-cameras_4997768.htm#query=cctv%20control%20room&amp;position=13&amp;from_view=search&amp;track=sph" target="_blank" rel="noopener">Image by vectorpouch</a> on Freepik</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/surveillance-technology-is-turning-back-the-management-clock/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4963</post-id>	</item>
		<item>
		<title>The same app can pose a bigger security and privacy threat depending on the country where you download it, study finds</title>
		<link>https://www.akingate.com/the-same-app-can-pose-a-bigger-security/</link>
					<comments>https://www.akingate.com/the-same-app-can-pose-a-bigger-security/#respond</comments>
		
		<dc:creator><![CDATA[Akingate]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 12:56:50 +0000</pubDate>
				<category><![CDATA[Computing and ICT]]></category>
		<category><![CDATA[G-Tech]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[European Union (EU)]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Geoblocking]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Mobile Apps]]></category>
		<category><![CDATA[Mobile phones]]></category>
		<category><![CDATA[Phones]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[VPNs]]></category>
		<guid isPermaLink="false">https://akingate.com/?p=4887</guid>

					<description><![CDATA[Google and Apple have removed hundreds of apps from their app stores at the request of governments around the world, creating regional disparities in access to mobile apps at a time when many economies are becoming increasingly dependent on them. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Google and Apple have removed hundreds of apps from their app stores at the request of governments around the world, creating regional disparities in access to mobile apps at a time when many <a href="https://www.statista.com/statistics/267209/global-app-economy/" target="_blank" rel="noopener">economies are becoming increasingly dependent on them</a>.</p>
<p>The mobile phone giants have removed over <a href="https://www.indiatoday.in/technology/news/story/garena-free-fire-to-tiktok-all-the-273-chinese-apps-that-indian-govt-banned-so-far-1913141-2022-02-15" target="_blank" rel="noopener">200 Chinese apps</a>, including widely downloaded apps like TikTok, at the Indian government’s request in recent years. Similarly, the companies removed LinkedIn, an essential app for professional networking, from Russian app stores <a href="https://fortune.com/2017/01/08/russia-linkedin-google-apple/" target="_blank" rel="noopener">at the Russian government’s request</a>.</p>
<p>However, access to apps is just one concern. <a href="https://support.google.com/googleplay/android-developer/answer/7550024?hl=en" target="_blank" rel="noopener">Developers also regionalize apps</a>, meaning they produce different versions for different countries. This raises the question of whether these apps differ in their security and privacy capabilities based on region.</p>
<blockquote><p>In a perfect world, access to apps and app security and privacy capabilities would be consistent everywhere. Popular mobile apps <a href="https://iapp.org/news/a/the-case-for-a-global-data-privacy-adequacy-standard/" target="_blank" rel="noopener">should be available without increasing the risk</a> that users are spied on or tracked based on what country they’re in, especially given that not every country has strong data protection regulations.</p></blockquote>
<p>My colleagues and <a href="https://scholar.google.com/citations?hl=en&amp;user=mWT_pCcAAAAJ&amp;view_op=list_works&amp;sortby=pubdate" target="_blank" rel="noopener">I</a> recently studied the <a href="https://www.usenix.org/conference/usenixsecurity22/presentation/kumar" target="_blank" rel="noopener">availability and privacy policies</a> of thousands of globally popular apps on <a href="https://play.google.com/about/howplayworks/" target="_blank" rel="noopener">Google Play</a>, the <a href="https://www.lifewire.com/what-is-google-play-1616720" target="_blank" rel="noopener">app store for Android devices</a>, in 26 countries. We found differences in app availability, security and privacy.</p>
<p>While our study corroborates reports of takedowns due to government requests, we also found many differences introduced by app developers. We found instances of apps with settings and disclosures that expose users to higher or lower security and privacy risks depending on the country in which they’re downloaded.</p>
<h2>Geoblocked apps</h2>
<p>The countries and one special administrative region in our study are diverse in location, population and gross domestic product. They include the U.S., Germany, Hungary, Ukraine, Russia, South Korea, Turkey, Hong Kong and India. We also included countries like Iran, Zimbabwe and Tunisia, where it was difficult to collect data. We studied 5,684 globally popular apps, each with over 1 million installs, from the top 22 <a href="https://support.google.com/googleplay/android-developer/answer/9859673?hl=en#zippy=%2Capps" target="_blank" rel="noopener">app categories</a>, including Books and Reference, Education, Medical, and News and Magazines.</p>
<p>Our study showed high amounts of geoblocking, with 3,672 of 5,684 globally popular apps blocked in at least one of our 26 countries. Blocking by developers was significantly higher than takedowns requested by governments in all our countries and app categories. We found that Iran and Tunisia have the highest blocking rates, with apps like Microsoft Office, Adobe Reader, Flipboard and Google Books all unavailable for download.</p>
<figure class="align-center zoomable"><a href="https://i0.wp.com/images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ssl=1" target="_blank" rel="noopener"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ssl=1" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=468&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=468&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=468&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=589&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=589&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/486347/original/file-20220923-214-6f3tzz.JPG?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=589&amp;fit=crop&amp;dpr=3 2262w" alt="three text boxes stacked vertically" /></a><figcaption><span class="caption">Attempting to download the LinkedIn app in the Google Play app store is a different experience in, from top to bottom, the U.S., Iran and Russia.</span><br />
<span class="attribution"><a class="source" href="https://www.usenix.org/system/files/sec22-kumar.pdf" target="_blank" rel="noopener">Kumar et al.</a>, <a class="license" href="http://creativecommons.org/licenses/by-nd/4.0/" target="_blank" rel="noopener">CC BY-ND</a></span></figcaption></figure>
<p>We found regional overlap in the apps that are geoblocked. In European countries in our study – Germany, Hungary, Ireland and the U.K. – 479 of the same apps were geoblocked. Eight of those, including Blued and USA Today News, were blocked only in the European Union, possibly because of the region’s <a href="https://gdpr-info.eu/" target="_blank" rel="noopener">General Data Protection Regulation</a>. Turkey, Ukraine and Russia also show similar blocking patterns, with high blocking of virtual private network apps in Turkey and Russia, which is consistent with the recent upsurge of <a href="https://www.hrw.org/news/2020/06/18/russia-growing-internet-isolation-control-censorship" target="_blank" rel="noopener">surveillance</a> laws.</p>
<p>Of the 61 country-specific takedowns by Google, 36 were unique to South Korea, including 17 gambling and gaming apps taken down in accordance with the <a href="https://www.hapskorea.com/south-koreas-complex-relationship-with-gambling/" target="_blank" rel="noopener">national prohibition on online gambling</a>. While the Indian government’s takedown of Chinese apps happened with full public disclosure, surprisingly most of the takedowns we observed occurred without much public awareness or debate.</p>
<h2>Differences in security and privacy</h2>
<p>The apps we downloaded from Google Play also showed differences based on country in their security and privacy capabilities. One hundred twenty-seven apps varied in what the apps were allowed to access on users’ mobile phones, 49 of which had additional permissions deemed “dangerous” by Google. Apps in Bahrain, Tunisia and Canada requested the most additional dangerous permissions.</p>
<p>Three VPN apps enable clear text communication in some countries, which allows unauthorized access to users’ communications. One hundred and eighteen apps varied in the number of ad trackers included in an app in some countries, with the categories Games, Entertainment and Social, with Iran and Ukraine having the most increases in the number of ad trackers compared to the baseline number common to all countries.</p>
<p>One hundred and three apps have differences based on country in their privacy policies. Users in countries not covered by data protection regulations, such as GDPR in the EU and the California Consumer Privacy Act in the U.S., are at higher privacy risk. For instance, 71 apps available from Google Play have clauses to comply with GDPR only in the EU and CCPA only in the U.S. Twenty-eight apps that use dangerous permissions make no mention of it, despite <a href="https://support.google.com/googleplay/android-developer/answer/10144311?visit_id=637995492293465522-1318183419&amp;rd=1" target="_blank" rel="noopener">Google’s policy</a> requiring them to do so.</p>
<h2>The role of app stores</h2>
<p>App stores allow developers to target their apps to users based on a wide array of factors, including their country and their device’s specific features. Though Google has taken <a href="https://android-developers.googleblog.com/2021/05/new-safety-section-in-google-play-will.html" target="_blank" rel="noopener">some steps toward transparency</a> in its app store, our research shows that there are shortcomings in Google’s auditing of the app ecosystem, some of which could put users’ security and privacy at risk.</p>
<p>Potentially also as a result of app store policies in some countries, app stores that specialize in specific regions of the world are becoming increasingly popular. However, these app stores may not have adequate vetting policies, thereby allowing altered versions of apps to reach users. For example, a national government could pressure a developer to provide a version of an app that includes <a href="https://doi.org/10.1109/SP40000.2020.00072" target="_blank" rel="noopener">backdoor access</a>. There is no straightforward way for users to distinguish an altered app from an unaltered one.</p>
<p>Our research provides several recommendations to app store proprietors to address the issues we found:</p>
<ul>
<li>Better moderate their country targeting features</li>
<li>Provide detailed transparency reports on app takedowns</li>
<li>Vet apps for differences based on country or region</li>
<li>Push for transparency from developers on their need for the differences</li>
<li>Host app privacy policies themselves to ensure their availability when the policies are blocked in certain countries</li>
</ul>
<p><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --></p>
<p>&nbsp;</p>
<p>Author: <!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --><a href="https://theconversation.com/profiles/renuka-kumar-1372197" target="_blank" rel="noopener">Renuka Kumar</a>, Ph.D. student in Computer Science and Engineering, <em><a href="https://theconversation.com/institutions/university-of-michigan-1290" target="_blank" rel="noopener">University of Michigan</a></em></p>
<p>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: center;"> ___________________________________</p>
<p>&nbsp;</p>
<p>Image Credit: <a href="https://www.freepik.com/free-photo/phone-with-map-colorful-icons_935239.htm#page=2&amp;query=app%20security&amp;position=10&amp;from_view=search" target="_blank" rel="noopener">Image by creativeart</a> on Freepik</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.akingate.com/the-same-app-can-pose-a-bigger-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4887</post-id>	</item>
	</channel>
</rss>
