Engineer Sees Big Possibilities in Micro-robots, Including Programmable Bees - 0 views
-
"One prototype system that Wood has helped developed, called Second Skin, can be worn by patients with neuromuscular disorders to stimulate nerve activity and advance rehabilitation. He says that soft- and micro-robotic devices may one day be used inside the body to aid minimally invasive medical procedures."
Microsoft blocks Bing from showing image results for Tiananmen 'tank man' | Bing | The ... - 0 views
-
"Microsoft has blamed human error after its search engine, Bing, blocked image and video results for the phrase "tank man" - a reference to the iconic image of a lone protester facing down tanks during the 1989 protests in Tiananmen Square - on the 32nd anniversary of the military crackdown. Users reported that no results were shown for the search query in countries including the US, Germany, Singapore, France and Switzerland, according to Reuters and Vice News."
How fraudsters can use the forgotten details of your online life to reel you in | Scams... - 0 views
-
""The social engineering type of attack does not tend to scale [up] easily given the time and effort required to succeed, and therefore is more often than not used by individuals rather than the 'call centre' approach of criminal enterprises," Goddard says. "The trigger to target an individual could be targeted, or opportunistic such as overhearing a conversation or getting access to sensitive or exploitable information like a picture or bank statement.""
Google engineer fired for privacy breach after 'stalking and harrassing teenagers' - 0 views
'I employ a lot of hackers': how a stock exchange chief deters cyber-attacks | Cyberwar... - 0 views
-
"After "social engineering" efforts using personal details to target staff were uncovered, badges no longer carry last names, clean-desk policies are far more strictly enforced and the processing and communication of sensitive information is now subject to higher bars of regular mandatory training."
TerraCom and YourTel threaten journalists who exposed massive personal data breach - Bo... - 0 views
-
"Journalists discovered that two companies had posted the personal data of 170,000 customers online. The leak, which exposed the victims to identity theft and fraud, was reportedly so bad that social security numbers, passport scans, financial data and home addresses were indexed by search engines. Rather than merely address the problem, however, TerraCom and YourTel threatened the reporters, referring to them as "hackers" and accusing them of "numerous violations of the Computer Fraud and Abuse Act"
Google defends listing extremist websites in its search results | Technology | guardian... - 0 views
-
"Eric Schmidt, executive chairman of Google, was asked to act to take down terrorist-sympathising websites from his search engines during a question and answer session at the literary festival on Saturday. This weekend MPs, including the Labour politician Paul Flynn, called on the company to prevent searches listing sites for groups such as the Islamist organisation Al Shabaab. Schmidt said: "We cannot prima facie identify evil and take it down. We have taken the decision that information if it's legal, even if it's despicable, will be indexed.""
Stealing an AI algorithm and its underlying data is a "high-school level exercise" - Qu... - 0 views
-
"Researchers have shown that given access to only an API, a way to remotely use software without having it on your computer, it's possible to reverse-engineer machine learning algorithms with up to 99% accuracy. In the real world, this would mean being able to steal AI products from companies like Microsoft and IBM, and use them for free. Small companies built around a single machine learning API could lose any competitive advantage."
Your smartwatch is also recording your PIN - 0 views
-
"With all the personal data it collects, your wrist-mounted wearable computer is almost definitely going to betray you at some point, whether that's a reminder to get up and do another 5,000 steps this afternoon or accidentally giving away your ATM PIN. According to a new paper, ominously titled "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN" it is surprisingly simple to determine your PIN or password by reverse-engineering motion sensor data from a smartwatch or fitness tracker."
Tech Terms Censored Online in China - 0 views
-
"A new study released this month in First Monday uncovers more than 4,000 unique keywords censored over the last year and a half on Chinese instant messaging platforms. Focusing on Skype and the microblogging service Sina Weibo, the researchers cultivated their keyword list using reverse-engineering techniques such as packet sniffing, which captures and analyzes packets of data as they pass through a network."
Google faces deluge of requests to wipe details from search index | Technology | thegua... - 0 views
-
"The deluge of claims trying to exercise the "right to be forgotten" follows a decision by Europe's highest court, which said that in some cases the right to privacy of individuals outweighs the freedom of search engines to link to information about them although the information itself can remain on web pages."
Egypt's New Internet Surveillance System Remains Shrouded in Mystery - 0 views
-
"Three months passed. Then, on Wednesday, anonymous government officials reportedly confirmed that a local company called Systems Engineering of Egypt (SEE or See Egypt) had won the bid to develop the system, which would allegedly allow the Egyptian government to sniff and analyze Internet and social media activity, as well as intercept Skype, WhatsApp and Viber conversations. "
Free Technology for Teachers: Google Launches a Realtime Search Engine... Again - 0 views
‹ Previous
21 - 40 of 107
Next ›
Last »
Showing 20▼ items per page