Skip to main content

Home/ Digit_al Society/ Group items tagged systems

Rss Feed Group items tagged

dr tech

Watch a 'USB killer' stick destroy a laptop when it's plugged in - 0 views

  •  
    "A new type of threat, however, goes one step further: the physical destruction of your computer."
dr tech

Stealing an AI algorithm and its underlying data is a "high-school level exercise" - Qu... - 0 views

  •  
    "Researchers have shown that given access to only an API, a way to remotely use software without having it on your computer, it's possible to reverse-engineer machine learning algorithms with up to 99% accuracy. In the real world, this would mean being able to steal AI products from companies like Microsoft and IBM, and use them for free. Small companies built around a single machine learning API could lose any competitive advantage."
dr tech

Tech is disrupting all before it - even democracy is in its sights | Technology | The G... - 0 views

  •  
    "It was robot accounts that caused "#TrumpWon" to trend after each TV debate and allowed Trump to claim "victory"."
dr tech

MarsJoke ransomware threatens to permanently encrypt files if a ransom is not paid - 0 views

  •  
    "A new strain of ransomware has been targeting government agencies and educational institutions in the United States, through scam emails that pretend to be something important. The malware, dubbed as 'MarsJoke' by Proofpoint security researchers, reportedly began a large-scale email campaign which distributed the cryptomalware last week. The developers are sending out emails which seems to be masked as a message from an airline company."
dr tech

This is the fastest way to alphabetize 1,000+ books (or anything else) / Boing Boing - 0 views

  •  
    "How can you sort the books quickly? Chand John shows how, shedding light on how algorithms help librarians and search engines speedily sort information."
dr tech

The Mirai Botnet Isn't Easy to Defeat | WIRED - 0 views

  •  
    ""It's accelerating because there's a wide-open, unprotected landscape that people can go to," says Chris Carlson, vice president of product management at Qualys. "It's a gold rush to capture these devices for botnets.""
dr tech

'Dalek' commands can hijack smartphones - BBC News - 0 views

  •  
    "Researchers have demonstrated how garbled speech commands hidden in radio or video broadcasts could be used to control a smartphone. The clips, which sound like the Daleks from Doctor Who, can be difficult for humans to understand but still trigger a phone's voice control functionality. The commands could make a smartphone share its location data, make calls and access compromised websites."
dr tech

Death by GPS: are satnavs changing our brains? | Technology | The Guardian - 0 views

  •  
    "Anyone who has driven a car through an unfamiliar place can attest to how easy it is to let GPS do all the work. That GPS can have a transformative effect on a society is undeniable. We have come to depend on a technology that, in theory, makes it impossible to get lost. But not only are we still getting lost, we may actually be losing a part of ourselves."
dr tech

Fansmitter: malware that exfiltrates data from airgapped computers by varying the sound... - 0 views

  •  
    "demonstrate a fiendishly clever procedure for getting data off of airgapped computers that have had their speakers removed to prevent acoustic data-transmission: instead of playing sound through the target computer's speakers, they attack its fans, varying their speeds to produce subtle sounds that humans can barely notice, but which nearby devices can pick up through their microphones."
dr tech

Internet-connected teddy bear leaked kids' data online / Boing Boing - 0 views

  •  
    "Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, Security researcher Troy Hunt reports that the snuggly spies, from Spiral Toys, "represents the nexus" of the problem with internet-connected appliances and toys: children being recorded, data being leaked, and the technical possibility of surreptitious access to children through networked toys. "The best way to understand what these guys do is to simply watch the video [advertisement for the toy].""
« First ‹ Previous 321 - 340 of 503 Next › Last »
Showing 20 items per page