Skip to main content

Home/ Digit_al Society/ Group items tagged code

Rss Feed Group items tagged

dr tech

Android devices ensnared in DDoS botnet | ZDNet - 0 views

  •  
    "Netlab researchers, who are usually among the firsts to discover emerging botnets, said the botnet contains several clues to suggest this is the work of the same group which developed the Moobot botnet in 2019 and the LeetHozer botnet in 2020. Both botnets were essentially built and used for launching DDoS attacks, which also appears to be Matryosh's primary function, as well. The Netlab team says they found functions in the code specific to features that will use infected devices to launch DDoS attacks via protocols like TCP, UDP, and ICMP."
dr tech

Robots may soon be able to reproduce - will this change how we think about evolution? |... - 0 views

  •  
    "But could robots ever reproduce? This, undoubtedly, forms a pillar of "life" as shared by all natural organisms. A team of researchers from the UK and the Netherlands have recently demonstrated a fully automated technology to allow physical robots to repeatedly breed, evolving their artificial genetic code over time to better adapt to their environment. Arguably, this amounts to artificial evolution. Child robots are created by mixing the digital "DNA" from two parent robots on a computer."
dr tech

Why Printers Add Secret Tracking Dots - 0 views

  •  
    "At that point, experts began taking a closer look at the document, now publicly available on the web. They discovered something else of interest: yellow dots in a roughly rectangular pattern repeated throughout the page. They were barely visible to the naked eye, but formed a coded design. After some quick analysis, they seemed to reveal the exact date and time that the pages in question were printed: 06:20 on 9 May, 2017 - at least, this is likely to be the time on the printer's internal clock at that moment. The dots also encode a serial number for the printer. "
dr tech

From viral conspiracies to exam fiascos, algorithms come with serious side effects | Co... - 0 views

  •  
    "And that was a genuine first - the only time I can recall when an algorithmic decision had been challenged in public protests that were powerful enough to prompt a government climbdown. In a world increasingly - and invisibly - regulated by computer code, this uprising might look like a promising precedent."
dr tech

The Information Catastrophe: Digital Content on Track to Equal Half Earth's Mass by 2245 - 0 views

  •  
    "Eventually, we will reach a point of full saturation, a period in our evolution in which digital bits will outnumber atoms on Earth, a world "mostly computer simulated and dominated by digital bits and computer code," according to an article published in AIP Advances, by AIP Publishing."
dr tech

Wikipedia sets new rule to combat "toxic behaviour" - BBC News - 0 views

  •  
    "The development of a new code of conduct will take place in two phases. The first will include setting policies for in-person and virtual events as well as policies for technical spaces including chat rooms and other Wikimedia projects. It is set to be ratified by the board by 30 August."
dr tech

Apple's iOS update will be bad news for developers, but a boon for users | Apple | The ... - 0 views

  •  
    "On the other hand, users (as distinct from developers) are about to see an upside of Apple's monopoly power. The next update of its mobile operating system, iOS14, includes a change that should have a dire impact on many online advertisers. The industry assigns a unique code to each device called an IDFA. Knowing your IDFA can help advertisers tell whether their ads are effective, particularly when they've shown you the same ad in multiple places. Facebook uses the IDFA as part of Audience Network, its ad network for developers."
dr tech

Microsoft warns digital currency owners to be aware of new malware - 0 views

  •  
    "The new malware, called Anubis, seems to use code forked from Loki. It steals crypto wallet credentials, credit card details and other valuable information from these Windows users. According to MSI, it first discovered the malware in June in the cybercriminal underground. It has the same name with another potent banking Trojan that has been targeting Android smartphones for months."
dr tech

Online Harms: Encryption under attack | Open Rights Group - 0 views

  •  
    "Service providers, including many ORG members, will be required to do this through the imposition of a "duty of care" - a concept awkwardly borrowed from health & safety - which will require them to monitor the integrity of their services not by objective technical standards, but by subjective "codes of practice" on both illegal and legal content. Although the framework has been drawn up with large American social media platforms in mind, it would apply to any site or service with UK users which hosts user-generated content. A blog with comments will be fair game. An app with user reviews will be fair game. "
dr tech

Android Users Need to Manually Remove These 16 Infected Apps - 0 views

  •  
    "The Joker malware circumvents the Google Play app vetting process through a combination of code tweaks, execution method variation, and changes to how it downloads the payload allowing it to function, steal information, and trigger the WAP service sign-ups. Google has removed the 16 infected apps from the Play Store and disabled them on devices where they are installed, thought to be in the region of 120,000 devices. "
dr tech

U.K. Found 'Critical' Weakness in Huawei Equipment - Bloomberg - 0 views

  •  
    ""Critical, user-facing vulnerabilities" were found in the Chinese supplier's fixed-broadband products caused by poor code quality and an old operating system, the Huawei Cyber Security Evaluation Centre Oversight Board said in a report. "U.K. operators needed to take extraordinary action to mitigate the risk.""
dr tech

Anti-Cheating Service Turnitin Says It Can Detect Use of ChatGPT - 0 views

  •  
    "However, executives at anti-cheating software maker Turnitin say they've cracked the code. The company, which works with thousands of universities and high schools to help teachers identify plagiarism, said it plans to roll out a service this year that can accurately tell whether ChatGPT has done a student's assignment for them. "
dr tech

Chinese city may have used a COVID app to block protesters, drawing an outcry | The Sea... - 0 views

  •  
    "Hu Xijin, a former editor of the ruling Communist Party's Global Times newspaper, warned that the use of the health code for purposes other than epidemic control "damages the authority" of the monitoring system and would chip away at the public's support for it. His post on Weibo, a Twitter-like social media platform, on Monday became a hashtag that was among the most-searched earlier this week, drawing 280 million views."
mrrottenapple

"Anonymous" Data Won't Protect Your Identity - Scientific American - 2 views

  •  
    This discrepancy has made it relatively easy to connect an anonymous line of data to a specific person: if a private detective is searching for someone in New York City and knows the subject is male, is 30 to 35 years old and has diabetes, the sleuth would not be able to deduce the man's name-but could likely do so quite easily if he or she also knows the target's birthday, number of children, zip code, employer and car model.
dr tech

If Meta's intransigence isn't enough, AI poses an even greater threat to journalism | M... - 0 views

  •  
    "It's hardly a surprise that Meta, owner of Facebook, is refusing to renew its deals with Australia's media companies. It was always grudging in its negotiations and never really accepted the principle that it should pay for the benefit of using the work of journalists. Facebook and Google were forced to the bargaining table by the news media bargaining code. That law allowed the government to "designate" digital platforms, which would force them to negotiate with media companies. The big stick was that if the parties could not agree, the decision would be made by an independent arbiter. In other words, Google and Facebook would lose control."
dr tech

'Pimps' use Instagram to glorify sexual violence and abuse, investigation finds | Sex t... - 0 views

  •  
    "Instagram has been used to promote sexual violence and exploitation by people advertising themselves as "pimps", a Guardian investigation has found. For the past year, the Guardian has been tracking Instagram accounts hosting content that advocates such activity as well as those that encourage violence against the women under the control of a pimp - someone who makes money from selling others for sex. The accounts identified often use hashtags as well as code phrases commonly associated with sex work to make it easier for buyers to locate them."
dr tech

Tech firms must 'tame' algorithms under Ofcom child safety rules | Social media | The G... - 0 views

  •  
    "The children's safety codes, introduced as part of the Online Safety Act, let Ofcom set new, tight rules for internet companies and how they can interact with children. It calls on services to make their platforms child-safe by default or implement robust age checks to identify children and give them safer versions of the experience. For those sites with age checks, Ofcom will require algorithmic curation to be tweaked to limit the risks to younger users. That would require sites such as Instagram and TikTok to ensure the suggested posts and "for you" pages explicitly take account of the age of children."
dr tech

The Coming Software Apocalypse - The Atlantic - 0 views

  •  
    ""The problem," Leveson wrote in a book, "is that we are attempting to build systems that are beyond our ability to intellectually manage.""
« First ‹ Previous 61 - 80 of 86 Next ›
Showing 20 items per page