"RECHO DOES ONE very simple, little thing: It lets you leave a voice message tied to a location. When other people using the app hit those coordinates, Recho will tell them there's something to listen to. You can use the app to discover different "rechoes" around you, if you actively want to listen in on someone's location-aware thoughts. You can also share interesting soundbytes with your Recho followers. It's a little weird and novel, but ultimately a new way to think about digital exploring a place."
"The new tools appear to allow Twitter users to share images with text overlays, stickers, and other modifications. Twitter's existing tools merely allow people to crop images or run them through filters that greatly change their appearance, whether it's by upping the contrast or making them look like old Polaroid shots."
"Researcher Billy Rios (previously) has extended his work on vulnerabilities in hospital drug pumps, discovering a means by which their firmware can be remotely overwritten with new code that can result in lethal overdoses for patients. "
"Like China's Great Firewall, the UK firewall is a patchwork of rules and filters that are opaque to users and regulators. Every ISP uses its own censorship supplier to spy on its customers and decide what they're allowed to see, and they change what is and is not allowed from moment to moment, with no transparency into how, when or why those decisions are being made. "
"The "March 2013 Watchlisting Guidance," a 166-page document issued last year by the National Counterterrorism Center, spells out the government's secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings."
Scary but if we are not careful - could be true in the future - "Existing properties will be required to install them over a four-year period. These would supply real-time images of terrorists, criminals and paedophiles at any time of day and night. Any disconnection of a camera would immediately alert the police as prima facie evidence of wrongdoing. I have held talks with the industry on whether the cameras should be in bathrooms and bedrooms. It would clearly be nonsensical to exclude them, as terrorists and paedophiles often make use of these rooms."
"The UK is opposing an international ban on so-called "killer robots" at a United Nations conference that is this week examining future developments of what are officially termed lethal autonomous weapons systems (Laws)."
"Kim Zetter asked them, on behalf of the New York Times, if their products shipped with backdoors allowing remote parties to access and alter them over the internet, they told her unequivocally that they did not engage in this practice.
But now, in a letter to Senator Ron Wyden [D-OR], they admit that they lied, and that they "provided pcAnywhere remote connection software … to a small number of customers between 2000 and 2006.""
"Victims of a major ransomware cyberattack that has spread through the US and Europe can no longer unlock their computers even if they pay the ransom.
The "Petya" ransomware has caused serious disruption at large firms including the advertising giant WPP, French construction materials company Saint-Gobain and Russian steel and oil firms Evraz and Rosneft.
Infected computers display a message demanding a Bitcoin ransom worth $300. Those who pay are asked to send confirmation of payment to an email address. However, that email address has been shut down by the email provider. "
"Moore's Law (or the exponential growth of integrated circuits) is actually referring to the fifth paradigm of computation. Here's the list of the underlying technologies: (1) Electromechanical; (2) Vacuum Tube; (3) Relay; (4) Transistors; and (5) Integrated Circuits.
Quantum computers may well be the sixth paradigm, given that they work in a fashion that is entirely different from "classical" computers"
"This RFID-enabled device allowed its proud new owners to do things such as log into their computer, open doors and purchase food in the office cafeteria with a flick of the wrist. Nearly half of the company's 85 workers had the device implanted when the firm held a "chip party".
YIKES!
"However, there is some concern about how accurate these new procedures will be. Apparently the facial recognition technology doesn't recognize all people will the same accuracy. White women and black people aren't as easily recognized as white men, meaning there could be some mismatching of identities. Some are also concerned that this is crossing the line in terms of passenger privacy."
"So, yes: the internet of things presents many new possibilities, and it would be foolish to dismiss those possibilities out of hand. But we would also be wise to approach the entire domain with scepticism, and in particular to resist the attempts of companies to gather ever more data about our lives - no matter how much ease, convenience and self-mastery we are told they are offering us."
"The conference acquired 30 machines for hackers to toy with. Every voting machine in the village was hacked.
Though voting machines are technologically simple, they are difficult for researchers to obtain for independent research."