Lunar Crater Radio Telescope

Lunar Crater Radio Telescope

NASA is proposing to create the solar systems largest Radio Telescope, by deploying a wire-mesh grid inside of a crater on the far side of the moon. This wire-mesh grid would measure 1 kilometer, and sit inside of a crater with a 3-5 kilometer diameter.

Radio Telescopes have been in use since 1937 and are utilized to detect radio-frequencies emitted by extraterrestrial sources. Radio Wavelengths are much longer than those of visible light; to compensate a very large reflector, or dish is used to feed the incoming wave into a receiver and amplifier. There are limitations to a terrestrial based radio telescope. The majority of the limitations are based on 2 factors, larger wavelengths cannon penetrate our Ionosphere, reflecting back into space, and radio interferences that interrupt the ability to receive the signals.

A Lunar Crater Radio Telescope (LCRT) eliminates the first two limitations. It is very difficult for a radio wavelength longer than 6 meters to penetrate our atmosphere. A lunar based telescope would be able to receive signals from 6 meters all the way up to 30 meters in length. This will allow NASA to explore new signals with the hope to seeing other solar systems in the creation phase. The Moon will also be used as a shield to protect the LCRT from interference created on Earth, especially from other radio wave sources. The most obvious benefit to creating the LCRT, is it’s resemblance to the Death Star. Because our Moon will only be used to explore new solar systems, not destroy planets of our enemies, we should not have to worry about it’s destruction by rebels.

HubWise Technology is always exploring the newest technologies that come to market. While this technology will not help us manage our Clients IT infrastructure, if you would like to find out what we us that does, feel free to reach out to Jason at 402-339-7441 or jmoen@hubwisetech.com.

Email Security

Email Security

In our current business environment, email security has been focused on the newest threats. The threats pertaining to Covid-19 are very serious and need to be highlighted but they are not the only type of threat that needs to be emphasized.

In times of disaster, malicious actors will always try to take advantage of the situation. While all email users need to be aware of these perils, we cannot forget about other risks that are still present. There are millions of phishing and spoofing emails being sent daily that do not contain any information about the Coronavirus.

While phishing and spoofing can be used in conjunction with each other, they are both separate types of fraudulent emails meant to trick users into giving up personal information; including passwords, bank account information, and credit card numbers. Phishing is the practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, usually passwords. Spoofing disguises a communication from an unknown source as being from a known source. Both acts are not only used maliciously through email, but can be utilized as fake websites, phone calls or text messages.

Email Phishing

There are millions of phishing emails that are sent globally everyday. They make up 90% of all cyber attacks by volume. Some are poorly done, the Nigerian Prince, while some take an expert to tell the difference between a legitimate and fake email. The most common form of phishing emails are mocked-up templates informing users that their Microsoft, Apple or Facebook accounts have been locked out. They usually contain a link to click which will immediately reset your password, and by only entering your current user name and password this issue can be quickly fixed. The key to this type of scam, is they urge the recipient to quick action. They succeed by minimizing the amount of time users spend thinking about the legitimacy of the request with their call to action. The top ten most common companies that are used in phishing emails are;

  • Microsoft
  • PayPal
  • FaceBook
  • Netflix
  • Bank of America
  • Apple
  • CIBC
  • Amazon
  • DHL
  • DocuSign

If you receive an email asking for your passwords, first, stop and think. Never follow an unprompted e-mail link to reset your password. If you think there might be an issue with your password, access your mobile or desktop application, and establish if you can access it normally. If you can, more than likely you have been phished. If you have put in your sign in information, immediately change your passwords.

Email Spoofing

Spoofing is a less common form of malicious email attack, but if done well, hackers can easily trick an unsuspecting receiver into giving up personal information. The most common is an attempt by the malicious party to trick their target into giving up their credit card numbers, Social Security Numbers or bank account information. They accomplish this by tricking the target in believing the email has been sent from a trusted source; their bank, coworker or insurance company. For example, the accounting department may get an email from what they think is the CFO asking to purchase gift cards for clients. After they are purchased, they will be asked to scan and email the information. At this point, the bad actor has successfully scammed their intended target, and received untraceable funds. If you receive an email, asking for personal information, money, account numbers, etc, always verify that it is a legitimate request. This can be done by simply picking up the phone and calling the requester at a phone number that you already possess not any that are listed on the potentially spoofed email.

How Is Your Organization’s Email Security?

While in these trying times, we need to be extra cautious, especially with the newer digital threats that revolve around Covid-19, we still can not ignore other forms of cyberattacks. If you are interested in learning more about how to prevent phishing, spoofing and other cyberattacks, please reach out to HubWise Technology, jmoen@hubwisetech.com or at (402)339-7441.

Choosing the Right Video Conferencing Application

Choosing the Right Video Conferencing Application

What is the right video conferencing application for your business or to stay connected with friends and family while we practice social distancing across the nation? There are several quality options available on the market today and updates are being introduced regularly to these applications to increase their ease of use.

With the current importance of and extremely high level of use, the assumption moving forward is their use will stay elevated after the business world moves back to normality. Between the current importance and the assumption of future use, there has been a race to see who can capture the most market share. This race has only increased the features, quality, and ease of use of all the video conferencing applications. While each major application has differing positives and negatives there are more similarities in use and features then differences. We are outlining several popular solutions below, but if you would like custom advice, our Managed Services can help find the right solution for your company.

Zoom

Currently Zoom is the most popular video conferencing applications in terms of use and name recognition. Zoom has two options, free and a paid version. Zoom offers the most “fun” with easy to use backgrounds, you can personalize your meeting space. The free version does limit the amount of time of each call to 40 and keeps the amount of users to 100 or fewer. If used for personal use, most people can keep their calls to less than 40 minutes and if you go over, a new meeting can be immediately started. For business use, the paid version does not limit the length of time on each call and still limits you to 100 call participants unless you include the additional paid feature of large meeting, which will allow up to 500 people to participate. The mobile versions for Android and IOS are also very easy to use.

Skype

Skype is another free option for video conferencing. Skype limits participants at 50 users but does not the duration of the calls that you are using. There is not an upgraded version that will allow more users or extra features. To use Skype, all users need to download and sign up for either the mobile or desktop version. You can blur the background, but can not upload any different backgrounds.

GoToMeeting

GoToMeeting traditionally has been a business only application. There is not a free version. It has the most friendly mobile applications, including quality and ease of use. It is also the only video conferencing application that allows users to maximize call and image quality. This feature is extremely useful when a user has internet limitations, either slower download speeds or while using mobile data. There are 3 different version which allow higher amounts of participants. The levels are 150, 250 and 3000 participants.

Google Meeting/Hangouts

Google Meeting has several versions available based on what type of account that you hold; G-suite basic, G-Suite business or G-Suite enterprise. All of the options for Google Meet are included with your G-suite account, but they are paid business accounts; Google Hangouts is available for free to all Google users with limited functionality. All of the options allows for calls of unlimited duration but they are either limited to 10, 250 or 100,000 participants. During the current pandemic, they are offering some of their calling functionality for free, including calls of up to 250 participants.

Cisco Webex

Cisco Webex supports up to 100 participants with an unlimited call duration, with the free or paid version. The free option limits specialized features, the premium version allows call transcription, storage of recorded calls, easier integrations with phone systems and more bouts administrative controls.

If you have questions about what Video Conferencing systems is the right fit for your business. Please contact Jason at (402)339-7441 or at jmoen@hubwisetech.com.

Attacking the Coronavirus outbreak with Artificial Intelligence and Machine Learning

Attacking the Coronavirus outbreak with Artificial Intelligence and Machine Learning

As the spread of the coronavirus (COVID-19) has a larger impact globally, Artificial Intelligence (AI) and Machine Learning (ML) are being used to combat the spread of this deadly disease.

Several startup companies were able to predict that a new virus outbreak had started prior to the release of any information by government officials in China.  This data analytics search is run by artificial intelligence and utilizes machine learning by scrapping data from across the web, including social media, health advice websitesphysician ran community websites and other data points.  AI and ML are used to scan this vast trove of data to look for and recognize patterns and commonalities in specific areas.  With this data, minus information from social media, BlueDot was able to predict the outbreak prior to any release of this information.  BlueDot was also able to predict the outbreak of SARS in 2017 successfully and as the technology advances, they and companies like them, will be able to predict outbreaks even easier and more accurately soon.   

After the spread is predicted, what role does AI and ML play?  Currently the main function is tracking and predicting real and potential spread patterns. Where AI and ML are most usefully, other than the ability to sift through this huge amount of data, is the ability to distinguish between data points about the coronavirus and associated symptoms and data points that specifically refer to someone that has these symptoms.  Using similar data mining techniques that are used to predict outbreaks, data scientists, using Geographic Information Systems (GIS) technology can accurately map where the current outbreak has spread to and will continue to spread.

While AI and ML have been used to predict the outbreak and to track the spread of the virus, its next use will be in helping to create a cure or preventative for coronavirus. 

Currently tech companies in China are deploying applications that can track and accurately map where those that have been in contact with Coronavirus have been and find other potential outbreak locations using this information.  They are using phone GPS data, train passenger lists, flight information and other data from mass transit to verify where infected people have traveled to prior to them being placed in quarantine.  Prior to the current advances in AI and ML collating all this data would be a task that could not be undertaken effectively.   

While AI and ML have been used to predict the outbreak and to track the spread of the virus, its next use will be in helping to create a cure or preventative for coronavirus.  Insilico Medicine, a Hong Kong-based start-up, has allowed partial access to its database of drug compounds to global pharmaceutical companies, in the hope of finding a cure quickly for Covid-19. Insilico believes by showing their algorithms that were designed by their data scientists, it can design new drug compounds quicker than current methods used by the pharmaceutical industry.

Using AI and ML in four days they were able to design new drug compounds that did not exist prior to, that they believe can combat this outbreak that the same techniques can be used to quickly fight any future disease outbreaks.  While AI and ML are still new technologies, the advances made are currently being used to fight this deadly outbreak and will continue to be critical to combat this and other outbreaks in the future.   

If you are interested in learning how HubWise Technology uses AI to manage our customers networks, please contact us at (402)339-7441 or jmoen@hubwisetech.com 

New US AI Regulatory Principles

New US AI Regulatory Principles

Last February, President Trump signed an executive order creating the American Artificial Intelligence (AI) Initiative.

While this new program did not include new funding for AI research, it directed existing funds, programs, and data in support of AI research and commercialization.  The plan also directs federal agencies to prioritize AI when allocating their R&D budget.  This new program was founded in part to keep America at the forefront of Artificial Intelligence technology and help guide American investment and prepare for the technology’s effect. Another aspect of the program is to help U.S. worker to adjust to jobs that have been or will be changed due to the ever-evolving technology and the wider adaption of it across a larger spectrum of businesses.

To start the year, the White House released ten principles for government agencies to adhere to when they are proposing new AI regulations for the private sector.  These new guiding principles are to serve many functions in an industry that is not only a new frontier but is also essentially unregulated currently.  The White House is weary of new regulations that would hamper private industries ability to grow this field and could harm the United States’ current position as a leader in this industry.  The main three functions according to the briefing that was released was to limit “regulatory overreach”, ensure public participation and promote the development of “trustworthy” artificial intelligence.  The principles were left intentionally vague so each agency that creates specific regulation for their industry is given leeway in shaping specific regulations.

The principles are:

  • Public Trust in artificial intelligence.
  • Public Participation.
  • Scientific integrity and information quality.
  • Benefits and costs.
  • Benefits and costs.
  • Flexibility.
  • Fairness and non-discrimination.
  • Disclosure and transparency.
  • Safety and Security.
  • Interagency coordination.

In practice, prior to implementation of any new regulations that involve artificial intelligence, the federal agency will have to submit a memorandum to the Office of Science and Technology Policy (OSTP).  The Office does not have the power to stop any regulation but should be able to apply the necessary pressure to ensure that the standards that were set forth are upheld.

One of HubWise Technologies core values is Fearless Innovation, and AI is at the forefront of innovation in the technology field.  If you would like to learn about how HubWise uses artificial intelligence to ensure our customers technology is enabling their success, please reach out to Jason Moen, jmoen@hubwisetech.com (402)339-7441.

Top Predicted Cyber Attacks of 2020 – Part 2

Top Predicted Cyber Attacks of 2020 – Part 2

Just like in the past couple of years, ransomware attacks will still be prevalent in 2020, but it is predicted that not only will the attacks become more sophisticated, they will begin deploying 2 stages of extortion.

Most ransomware attacks follow a basic pattern; reconnaissance, where the hackers learn about the company, employees, controls and processes.  Penetration is the next phase; this is where hackers gain access to their target.  The 3rd step is fortification, when the attackers hide the evidence that they have gained access and will even go as far as protecting the devices they have attacked so other hackers can’t gain access.  The next step to deploying ransomware is infiltration. This is where they perform internal reconnaissance trying to find higher value targets and acquire administration level passwords.  Spoliation follows infiltration, when they will alter backups, remove some data but leave the containers, and then introduce flaws into software to make it harder to backup.  The last step is the actual ransom, this is when the data is encrypted, and archives are wiped.  After the ransom demand is made businesses are not left with many choices.  Usually when the payment is made the hackers will pass on the encryption code and the company will be able to get back their lost data.  In most attacks, this is where the transaction ends, the hackers have their money and the company has their data.  In the future, the large worry is that a single stage attack will morph into a two-stage attack.  In a two-stage attack, the hackers also keep a copy of all the data, eventually asking for another ransom.  This time, they will threaten to leak all the personally identifiable information that is stored within the network.  This second stage can be just as damaging to a company as the first stage.

Application Programming Interfaces (APIs)

Application Programming Interfaces (APIs) have been in use for years, but over the last five years they have gone from being a developmental tool to a driving force behind today’s economy.  The important role that APIs play is one reason why future attacks are predicted to occur by McAfee.  API’s are a set of routines, protocols, and tools for building software applications. Basically, an API specifies how software components should interact and allows different applications to speak to each other. Because they are used as a communication device between applications, there is sensitive data that is transferred through them.  This data is what hackers are trying to gain access to.  As more and more software and web-based applications utilize this means of communication, more entry points are created for possible infiltration and exposure.  Sensitive data attacks are what is most reported on by the media, but this is not the only type of exposure that is left vulnerable by insecure APIs.

Application containerization

Application containerization has increased in popularity recently because it allows developers to create and deploy applications faster and without deploying as many resources as have been used traditionally.  It is an Operating System (OS) level virtualization method used to deploy and then run applications without launching an entire Virtual Machine (VM) for each application.  They share resources with the core OS, and this leads to gains in efficiency for memory, CPU and storage in comparison to conventional VM’s and physical hosting.  Where the concern lays deploying containerized applications is, they are not isolated from the main OS.  This allows easier access once penetrated to the entire system.  They are not as easily secured as a traditionally hosted application and tools to scan and monitor the container are almost nonexistent.  Because they are not as easily secured, scanned or monitored, once they have been penetrated, it is very difficult to detect the unauthorized access.

If you missed Part 1 of this series: Top Predicted Cyber Attacks of 2020

If you are worried that your data could be breached or accessed, please reach out to HubWise Technology, jmoen@hubwisetech.com (402) 210-7138 to discuss what you are currently doing to secure your network and how it can be improved.

5 Technology trends for 2020

5 Technology trends for 2020

We are currently amid the greatest technology revolution since the industrial age.  Technology is moving forward at an incredible rate of speed, and we can only predict how these changes will affect our lives moving forward.

What are some of the biggest trends slated for the New Year? AI as a Service, 5G networks, autonomous driving, hyper-automation and practical blockchain.  How will these new technologies and trends change how business is performed in 2020?

Artificial Intelligence

AI as a Service (AIaaS) will allow easier access to Artificial Intelligence without a large investment.  AIaaS broken down is a service that is offered by companies that currently have an AI platform and infrastructure in place.  These services will continue to grow in 2020.  For an example, Google’s Cloud Platform has a varied array of in-house AI capabilities, including speech recognition, translation, image content identification and maybe most importantly for AIaaS, predictive analytics.  Google also offers it’s TensorFlow software library via an Open Source Apache license for use.

5G Wireless

5G is coming and it is coming soon, new data speeds will as much as 100 times faster than what is currently being offered through 4G, with up to 100 gigabit per second download speed.  When 4G debuted, speeds were up to 500 times faster than 3G and allowed true HD TV on mobile, fast mobile browsing and made high-quality video calls all a possibility.  5G allows a true development of the Internet of Things with the predicted 20 billion connections by the end of 2020 and will reduce latency.  This reduction in latency should allow your data connections to replace cabled internet and WIFI.  This quicker data will allow seamless flow of data whether you are working from your office or on the road.

Autonomous (self-driving) Vehicles

2020 should produce major changes in the availability and usage of autonomous driving capable vehicles.  Self-driving cars are already a reality, but it is a new technology that still needs more being testing and improvement before it can authentically become practical for everyday use.  Uber recently purchased 600 acres to be used as a testing ground with hopes of being able to deploy autonomous vehicles in the near future.  Waymo has been testing its driverless taxi service in localized parts of Phoenix for over a year and have over 1,500 monthly active users with over 100,000 total rides.

Automation

Automation is the process of replacing work that has been traditionally done by humans with technology.  Robotic Process Automation (RPA) and the advances in the available tools for RPA have made Automation easier to achieve.  Hyperautomation allows businesses to automate more complex work.  It uses a combination of advanced technologies including Machine Learning (ML) and AI.  This will change the focus of automation from simple rules-based tasks to knowledge work, this shift should allow for a greater ROI. The use of AI and ML in combination will allow automation for tasks that have been thought of in the past as only capable by humans.

BlockChain

Practical applications of Block Chain management are becoming a reality.  In the simplest terms a blockchain is a database that is shared across a network of computers.  It is made up of 3 parts, the record, information, the block, a bundle of records and the chain, all the blocks linked together.  These records when linked together are very difficult to change and the records are usually decentralized.  Blockchains have been the basis for bitcoin and other cryptocurrencies for years, but many other practical uses are beginning to emerge.  Emerging uses include banking records, supply chain management, healthcare, property records and even voting.  These networks can be set up to allow multiple companies access to critical encrypted records but not allow access to private data.  To manage a supply chain, currently most companies use a slow, manual process.  With blockchain, unchangeable records can be added which will allow tracking materials from the original source all the way to the final user or endpoint.  You could track diamonds and ensure they are truly conflict free prior to purchase or verify that your organic beef is from a trusted source.

As technology advances, is your company situated to take advantage of these changes?  If you are not sure, contact HubWise Technologyjmoen@hubwisetech.com or 402-339-7441.

Top Predicted Cyber Threats of 2020 – Part 1

Top Predicted Cyber Threats of 2020 – Part 1

Now that we are in the new year, it is always a good practice to become aware of what the experts think will be the next big wave of cybercrime and how to combat it.

Over the last couple years, Ransomware, Malware and Remote Desktop Protocol (RDP) have become so commonplace that the verbiage is now part of the lexicon.  These threats will not disappear but will continue to evolve. There are measures that can be put in place to stop or at a minimum hinder these types of attacks, but how will we stop the next generation and what will they be. At HubWise Technology we constantly try to evolve our ability to detect these threats and stop them from invading our customers networks.    

McAfee recently posted a discussion about what they believe to be the next wave of threats that we must prepare for.  With the advances that are being made to Artificial Intelligence (AI) and Machine Learning (ML) they will be more advanced and, in the beginning, harder to spot.  What they, McAfee see as the greatest security threats to evolve in the coming year are; An increase in the quality of deep fakes, used to bypass facial recognition and created for misinformation. Ransomware attacks will still be prevalent but with become 2 stage extortion schemes, Application Programming Interfaces (API) will be found as the weakest link leading to cloud-native threats, new threats will emerge due to misconfigurations in containerized applications.   

Deep Fakes

Recently deep fakes have become part of the new lexicon.  These videos are currently getting better and more sophisticated which makes it more difficult to tell reality from fake.  These are videos that take a person in an existing image or video and replace them with the likeness of someone else.  While we may laugh at a video that has an image of Nicolas Cage superimposed over another actors’ face, there are security risks involved also.  One of the larger risks involved with these videos are political and the ability of deep fakes to influence the masses. This could become critical during the 2020 election cycle.  Earlier this year a video of Nancy Pelosi was passed as proof that she was slurring through a speech, this slur either caused by inebriation or health risks.  The larger and more immediate concern is their use to defraud individuals or corporations.  In early 2019, a British CEO was tricked by a deep fake into sending almost $250,000 to a scammer; he believed he was speaking to the CEO of his parent company.  Currently a coalition of tech companies have started The Deepfake Detection Challenge to find an easier way to distinguish between a real video and a deepfake.  At Present it is a complicated process using a similar algorithm to what is used to make them or using Blockchain to verify the source of the media prior to it’s release.   

Look for part 2 which will discuss 2 stage extortion schemes, API threats and containerized applications and the risks associated with them. If you question your network security and would like to know that it is safe, please reach out to HubWise Technology, jmoen@hubwisetech.com or at 402-339-7441