2024 Edition
ISSN 0742-468XThis video with Incognia discusses the impact of location spoofing and location-based fraud, and offers protection tips.
In this Help Net Security video, Andrè Ferraz, CEO at Incognia , discusses the impact of location spoofing and location-based fraud
Any tool that enables users to alter the location information given by their device is known as location spoofing. Scammers are increasingly utilizing this technique as a standard tactic.
Watch video here: Help Net Security…
Geospatial professionals, such as city planners, environmental scientists, and GIS analysts, often find themselves amidst confusing maps and data overloads, trying to make sense of coordinates and hidden patterns.
To help you find the right tool, we have highlighted the three top-rated affordable GIS software based on their pricing, as found on vendor websites and verified software reviews. Based on our research, we've considered products priced less than $33 per month as affordable software and have arranged them in ascending order.
The tools listed in this article are either web mapping platforms or drone deployment and data management solutions with GIS capabilities. Nonetheless, they all offer data visualization and map creation as common features.
Read full story at Software Advice…
New Website Showcases the Maps That Are Helping People Better Understand the World through Cartography
Maps.com is focused on spotlighting distinctive, powerful maps and those who make them. As a creator-focused platform, Maps.com encourages individuals as well as organizations to submit their maps to be featured on the site. Submissions that are visually engaging, dramatic, and bold but understandable, with both style and substance, have already been highlighted on the site during soft launch.
Read full story at Esri…
Google has introduced a new feature in its Maps app that allows users to navigate even in areas with poor satellite signals, such as tunnels or dead zones.
This functionality is achieved through the support for 'Bluetooth beacons,' a feature that has been widely rolled out on Google Maps for Android. However, it is currently not available in the iOS version of the application, as reported by 9to5Google.
…The introduction of Bluetooth beacons in Google Maps for Android is a significant step forward in providing a more reliable and accurate navigation experience, especially in areas where traditional GPS signals may struggle, such as tunnels and locations with poor satellite connectivity.
Read full story at ITVoice…
The rise of location technology marks a significant shift in how industries operate and interact with consumers.
…This technological advancement has altered the fundamental dynamics between businesses and consumers. Industries that once relied on traditional methods are now embracing the precision and agility offered by location technology. It has enabled a more responsive and customer-centric approach, transforming not just the operational aspects but also enhancing overall consumer engagement.
Read full story at Newstrail.com…
From GeoJSON to UTM, these tools help map the world!
In this article, I'd like to walk you through some of the most popular data formats and coordinates that data scientists and engineers use for geographic data. I've you've ever taken a look at map projections of the world, you'll know that there are many many ways to visualize spatial geography and while this guide does not go through ALL of the tools, it should provide a good overview of some of the more popular ones.
Read full story at Medium…
State and local agencies can embrace the technology to speed citizen services.
Artificial intelligence is no longer an intangible concept; it's actively reshaping every aspect of our society. From healthcare to education, from transportation to defense, AI is enabling new levels of efficiency, innovation and impact. 2023 saw the emergence and rapid advancement of generative AI, which has the potential to significantly alter the ways government operates and interacts with citizens.
As a new year unfolds, there are already clear indications that adoption of generative AI in government will accelerate, bringing benefits to citizen services, cybersecurity, procurement and more. Here's what could come next.
Read full story at StateTech…
On January 18, 2024, the Federal Trade Commission announced a proposed order against geolocation data broker InMarket Media, barring the company from selling or licensing precise location data. According to the FTC's charges, InMarket failed to obtain informed consent from users of applications developed by the company and its third-party partners.
InMarket is a data aggregator company that developed a software tool for use in mobile applications developed by InMarket or third-party developers. The software tool allowed the company to track users' geolocation and analyze points of interest visited by such users. InMarket then used data from this analysis to sort consumers into audience segments for targeted advertising.
Read full story at Hunton Andrews Kurth LLP…
Some contractors are slowly reassessing spend in other areas of the company and applying larger budgets to future IT and cyber compliance.
Defense Industrial Base (DIB) partners will eventually be subject to increased assessment and certification of their cybersecurity programs and systems. The Defense Department is codifying a more stringent phase of Cybersecurity Maturity Model Certification (CMMC) rules.
Small contractors and subcontractors are not excluded from what is being called CMMC 2.0. All contractors will need to provide specific assurance that they "are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information."
Read full story at Federal News Network…
There's also a refreshed iPadOS, with the same feature.
…This is a modest refresh, so don't go looking for anything too crazy. There is, however, a new feature called Stolen Device Protection. This isn't used to locate a stolen iPhone or iPad, but rather to keep the thieves from accessing your personal data.
… If someone manages to steal your iPhone or iPad, and you are updated to OS 17.3, you can lock them out of the system by forcing Face ID or Touch ID access.
Read full story at engadget…
There's also a refreshed iPadOS, with the same feature.
…This is a modest refresh, so don't go looking for anything too crazy. There is, however, a new feature called Stolen Device Protection. This isn't used to locate a stolen iPhone or iPad, but rather to keep the thieves from accessing your personal data.
… If someone manages to steal your iPhone or iPad, and you are updated to OS 17.3, you can lock them out of the system by forcing Face ID or Touch ID access.
Read full story at engadget…
Senior execs' emails accessed in network breach that wasn't caught for 2 months
Russia-state hackers exploited a weak password to compromise Microsoft's corporate network and accessed emails and documents that belonged to senior executives and employees working in security and legal teams, Microsoft said late Friday.
The attack, which Microsoft attributed to a Kremlin-backed hacking group it tracks as Midnight Blizzard, is at least the second time in as many years that failures to follow basic security hygiene have resulted in a breach that has the potential to harm customers
Read full story at arsTechnica…
Smart meters eliminate constraints of traditional electricity meters, improving the advanced metering infrastructure.
…Despite growing interest, the smart metering landscape remains intricate, featuring a multitude of tools and diverse contributing technologies. This article aims to disentangle this complexity, offering clarity and insights into the diverse facets of smart meter solutions.
Despite growing interest, the smart metering landscape remains intricate, featuring a multitude of tools and diverse contributing technologies. This article aims to disentangle this complexity, offering clarity and insights into the diverse facets of smart meter solutions.
Read full story at EINPresswire…
Implementing and sustaining cybersecurity best practices is the first step to protecting against cyberattacks, breaches, and other incidents.
The American Public Power Association acknowledges the importance of protecting the confidentiality, integrity, and availability of critical infrastructure systems and digital assets. This comprehensive, high-level cybersecurity guide, developed by APPA, offers reliable industry guidance and resources aligned with a high-level outline of the National Institute of Standards and Technology's Cybersecurity Framework.
Read full story at American Public Power Assoc.…
Replacing the Cumberland power plant with gas-fired generation will reduce carbon emissions by about 7 million metric tons a year, FERC said.
The Federal Energy Regulatory Commission on Thursday approved two natural gas pipeline projects, including one that will supply a planned power plant the Tennessee Valley Authority intends to use to help replace a 2,470-MW coal-fired generating station.
Earlier this month, the TVA, a federal power agency, said it might delay retiring its Cumberland power plant in Tennessee if FERC didn't promptly approve a 32-mile pipeline to be built by Tennessee Gas Pipeline.
Read full story at UtilityDive…