Skip to main content

Home/ Digit_al Society/ Group items tagged network

Rss Feed Group items tagged

dr tech

Kerala is rolling out free broadband for its poorest citizens. What's stopping your gov... - 0 views

  •  
    "This takes us to Kerala in south India, home to about 34 million people. There, the communist-led state government is launching something called the Kerala Fibre Optical Network (KFON) - and it's a major milestone. (It is worth noting the irony that the communist government, which has a history of opposing the introduction of computers, is now at the forefront of this digital initiative.) In 2016, the state recognised the internet as a basic citizen's right, joining other polities like Finland, Costa Rica and France. Next on the agenda: making this new right mean something. Despite facing various setbacks - such as the pandemic and a corruption allegation that led to the arrest of the senior bureaucrat who was previously in charge of KFON (he denies the allegation) - the project has finally been launched. It's a fibre-optic broadband network project, aiming to provide affordable and reliable internet connectivity to every household, government institution and business entity in the state."
dr tech

Victorian MP Georgie Purcell criticises Nine News for 'sexist' image editing to make ou... - 0 views

  •  
    "The Victorian upper house MP Georgie Purcell has lashed Nine News in Melbourne for using an image edited to make her breasts look bigger and expose her midriff, which the network blamed on "automation by Photoshop". But Adobe has cast doubt on Nine News's claim about its software, after the network broadcast the image during Monday night's bulletin. The program's news director, Hugh Nailon, apologised to the upper house Animal Justice Party MP on Tuesday for the "graphic error", and blamed "automation by Photoshop"."
dr tech

Your next car could have a built-in road-rage detector - 0 views

  •  
    "Affectiva is running a program that pays drivers to help train its emotion-recognition system. The company sends drivers a kit including cameras and other sensors to place within their vehicles. These record a person's facial expressions, gestures, and tone of voice on the road. That data is then labeled by trained specialists for a range of emotions, and fed into deep neural networks."
dr tech

Researchers demonstrate attack for pwning entire wind-farms / Boing Boing - 0 views

  •  
    "Worse: turbines are networked, so once one turbine is compromised, the rest of the turbines in the field can be poisoned, with attacks that include "paralyzing turbines, suddenly triggering their brakes to potentially damage them, and even relaying false feedback to their operators to prevent the sabotage from being detected.""
dr tech

Facebook-Style Algorithms Are Now Hunting for Dark Matter - 0 views

  •  
    ""This is the first time such machine learning tools have been used in this context," says Fluri, "and we found that the deep artificial neural network enables us to extract more information from the data than previous approaches. We believe that this usage of machine learning in cosmology will have many future applications.""
dr tech

Amazon US customers have one week to opt out of mass wireless sharing | Amazon | The Gu... - 1 views

  •  
    "Amazon customers have one week to opt out of a plan that would turn every Echo speaker and Ring security camera in the US into a shared wireless network, as part of the company's plan to fix connection problems for its smart home devices."
dr tech

Iran's Secret Manual for Controlling Protesters' Mobile Phones - 0 views

  •  
    "According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their data connections to a crawl, break the encryption of phone calls, track the movements of individuals or large groups, and produce detailed metadata summaries of who spoke to whom, when, and where. Such a system could help the government invisibly quash the ongoing protests - or those of tomorrow - an expert who reviewed the SIAM documents told The Intercept."
dr tech

I've been waiting 15 years for Facebook to die. I'm more hopeful than ever | Cory Docto... - 0 views

  •  
    "My prediction failed. For a decade and a half, Facebook resisted the fate of all the social networks that preceded it. In hindsight, it's easy to see why: it cheated. The company used investor cash to buy and neutralize competitors ("Kids are leaving Facebook for Insta? Fine, we'll buy Insta. We know you value choice!"). It allegedly spied on users through the deceptive use of apps such as Onavo and exploited the intelligence to defeat rivals. More than anything, it ratcheted up "switching costs.""
dr tech

Seized ransomware network LockBit rewired to expose hackers to world | Cybercrime | The... - 0 views

  •  
    "The organisation is a pioneer of the "ransomware as a service" model, whereby it outsources the target selection and attacks to a network of semi-independent "affiliates", providing them with the tools and infrastructure and taking a commission on the ransoms in return. As well as ransomware, which typically works by encrypting data on infected machines and demanding a payment for providing the decryption key, LockBit copied stolen data and threatened to publish it if the fee was not paid, promising to delete the copies on receipt of a ransom."
dr tech

Millions of hacked LinkedIn IDs advertised 'for sale' - BBC News - 0 views

  •  
    "A hacker is advertising what he says is more than one hundred million LinkedIn logins for sale. The IDs were reportedly sourced from a breach four years ago, which had previously been thought to have included a fraction of that number. At the time, the business-focused social network said it had reset the accounts of those it thought had been compromised."
dr tech

Why the internet of things is the new magic ingredient for cyber criminals | John Naugh... - 0 views

  •  
    "The significance of the attack on Krebs is that it looks as though many of the attacks on him came from large numbers of enslaved devices - routers, cameras, networked TVs and the like. "Someone has a botnet with capabilities we haven't seen before," says Martin McKeay, Akamai's senior security expert. The DDoS arms race has just moved up a gear."
dr tech

$10 router blamed in Bangladesh bank hack - BBC News - 0 views

  •  
    "The bank had no firewall and used second-hand routers that cost $10 to connect to global financial networks. Better security and hardware would have hampered the attackers, Reuters said, quoting an official investigator."
dr tech

Artificial intelligence creates sound effects for silent videos that fool humans / Boin... - 0 views

  •  
    "This algorithm uses a recurrent neural network to predict sound features from videos and then produces a waveform from these features with an example-based synthesis procedure. We show that the sounds predicted by our model are realistic enough to fool participants in a "real or fake" psychophysical experiment, and that they convey significant information about material properties and physical interactions."
dr tech

Turkey coup plotters' use of 'amateur' app helped unveil their network | Technology | T... - 0 views

  •  
    "Security experts who looked at the app, known as ByLock, at the request of Reuters said it appeared to be the work of amateur software developers and had left important information about its users unencrypted."
dr tech

Major sites including New York Times and BBC hit by 'ransomware' malvertising | Technol... - 0 views

  •  
    "The malware was delivered through multiple ad networks, and used a number of vulnerabilities, including a recently-patched flaw in Microsoft's former Flash competitor Silverlight, which was discontinued in 2013. When the infected adverts hit users, they redirect the page to servers hosting the malware, which includes the widely-used (amongst cybercriminals) Angler exploit kit. That kit then attempts to find any back door it can into the target's computer, where it will install cryptolocker-style software, which encrypts the user's hard drive and demands payment in bitcoin for the keys to unlock it."
‹ Previous 21 - 40 of 143 Next › Last »
Showing 20 items per page