Data revolution will dwarf internet revolution and change society - MIT - 03 Sep 2013 -... - 0 views
-
""Not just here in this country, or in the United States, but virtually every adult human in the world has a cellphone, and they're all putting out data about where they are, what their preferences are, who they talk to and that data will run the world. That's why I call it the decade of data. "This is the beginning of it, not the end of it, we're just at the start," Pentland added. "
Snowden Docs: British Spies Used DDoS Attacks Against Anonymous - 0 views
-
"The new documents reveal that a GCHQ unit dubbed the Joint Threat Research Intelligence Group, or JTRIG, launched an operation called Rolling Thunder against the hacker collective in 2011. That operation included using DDoS attacks as well as malware to slow down the hackers and later identify them, as first reported by as reported by NBC News on Wednesday."
London School of Economics: piracy isn't killing big content; government needs to be sk... - 0 views
-
"Copyright and Creation, a policy brief from a collection of respected scholars at the rock-ribbed London School of Economics, argues that the evidence shows that piracy isn't causing any grave harm to the entertainment industry, and that anti-piracy measures like the three-strikes provision in Britain's Digital Economy Act don't work. They call on lawmakers to take an evidence-led approach to Internet and copyright law, and to consider the interests of the public and not just big entertainment companies looking for legal backstops to their profit-maximisation strategies. "
India Will Ask the U.S. Government for Help Spying on Its Citizens - 0 views
-
While governments in many countries, including India, have reacted with anger to this year’s revelations from former National Security Agency contractor Edward Snowden that the United States spied on foreign officials, several have also been increasing Internet surveillance at home
-
Engineer Sees Big Possibilities in Micro-robots, Including Programmable Bees - 0 views
-
"One prototype system that Wood has helped developed, called Second Skin, can be worn by patients with neuromuscular disorders to stimulate nerve activity and advance rehabilitation. He says that soft- and micro-robotic devices may one day be used inside the body to aid minimally invasive medical procedures."
Chatbot 'Eugene Goostman' passes Turing Test | KurzweilAI - 0 views
-
"The Turing Test was passed for the first time by a chatbot called "Eugene Goostman" on Saturday by convincing 33% of the human judges that it was human, according to Professor Kevin Warwick, a Visiting Professor at the University of Reading and Deputy Vice-Chancellor for Research at Coventry University, in a statement."
US "suspected terrorist" database had 1.5M names added to it in past 5 years - Boing Boing - 0 views
-
"99 percent of the names submitted to the list are accepted; the court called this "wildly loose." The database has grown from 227,932 names in 2009 to its current stratospheric heights. There is no official, public procedure for having your name removed from the list. The US government is seeking to end the trial by invoking state secrecy."
The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block - 0 views
-
"The type of tracking, called canvas fingerprinting, works by instructing the visitor's web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it."
Dropbox reveals government requests for user information | Technology | theguardian.com - 0 views
-
"The transparency report is in its third year, but it hasn't prevented attacks from advocates such as Edward Snowden, who called the company "hostile to privacy". "Dropbox is a targeted you know wannabe PRISM partner," he told the Guardian in July 2014. "They just put … Condoleezza Rice on their board … who is probably the most anti-privacy official you can imagine.""
Egypt's New Internet Surveillance System Remains Shrouded in Mystery - 0 views
-
"Three months passed. Then, on Wednesday, anonymous government officials reportedly confirmed that a local company called Systems Engineering of Egypt (SEE or See Egypt) had won the bid to develop the system, which would allegedly allow the Egyptian government to sniff and analyze Internet and social media activity, as well as intercept Skype, WhatsApp and Viber conversations. "
How to Use USB Security Keys with your Google Account - 0 views
-
"The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
Qualcomm Brings Artificial Intelligence to Smartphone Security | TIME - 0 views
-
"Upcoming cell phone chips from Qualcomm will use artificial intelligence to block malware before it infects your phone. The chip company said on Monday that the next-generation Snapdragon 820 processor used in a variety of Android smartphones will be the first chip that uses machine learning to detect threats and privacy issues thanks to an application called Snapdragon Smart Protect." Qualcomm is trying to use artificial intelligence in a chip for smart phones. The chip will learn to detect any privacy or security issues that would usually be hard to detect.
« First
‹ Previous
41 - 60 of 240
Next ›
Last »
Showing 20▼ items per page