Group items matching
in title, tags, annotations or urlHow the internet found a better way than illegible squiggles to prove you're not a robot | Technology | The Guardian - 0 views
-
"The company has revealed the latest evolution of the Captcha (short, sort of, for Completely Automated Public Turing test to tell Computers and Humans Apart), which aims to do away with any interruption at all: the new, "invisible reCaptcha" aims to tell whether a given visitor is a robot or not purely by analysing their browsing behaviour. Barring a short wait while the system does its job, a typical human visitor shouldn't have to do anything else to prove they're not a robot."
The Surgeon Who Wants to Connect You to the Internet with a Brain Implant | MIT Technology Review - 0 views
-
"But Leuthardt, for one, expects he will live to see it. "At the pace at which technology changes, it's not inconceivable to think that in a 20-year time frame everything in a cell phone could be put into a grain of rice," he says. "That could be put into your head in a minimally invasive way, and would be able to perform the computations necessary to be a really effective brain-computer interface.""
The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 1 views
-
"The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
-
"Increasing numbers of implantable medical devices are now gaining internet connectivity, giving doctors the ability to monitor patients health remotely, and even update the devices to tweak a treatment plan. Unfortunately, that flexibility offers a way for hackers to hijack that hardware, and even potentially make changes to the way the devices work. While so far no attacks have been successful, proof-of-concept attacks have been available for years"
Snooper's charter: wider police powers to hack phones and access web history | World news | The Guardian - 0 views
-
"The bill will now allow police to access all web browsing records in specific crime investigations, beyond the illegal websites and communications services specified in the original draft bill. It will extend the use of state remote computer hacking from the security services to the police in cases involving a "threat to life" or missing persons. This can include cases involving "damage to somebody's mental health", but will be restricted to use by the National Crime Agency and a small number of major police forces."
Six bailed teenagers accused of cyber attacks using Lizard Squad tool | Technology | The Guardian - 0 views
-
"Ddos attacks have been used to cause both financial and reputational damage to businesses and services from Sony to government websites. The attacks can last from hours to days, and typically use computers or internet routers infected with viruses to make innocent users unwitting parties to the attack. The Lizard Stresser tool was used effectively by Lizard Squad during cyber attacks on Microsoft's Xbox Live and Sony's PlayStation Network online gaming services in December last year."
NSA facial recognition: combining national ID cards, Internet intercepts, and commercial facial databases for millions of people - Boing Boing - 0 views
-
"A newly released set of slides from the Snowden leaks reveals that the NSA is harvesting millions of facial images from the Web for use in facial recognition algorithms through a program called "Identity Intelligence." James Risen and Laura Poitras's NYT piece shows that the NSA is linking these facial images with other biometrics, identity data, and "behavioral" data including "travel, financial, behaviors, social network." "
Open Rights Group - ISC report into Lee Rigby's murder is misleading - 0 views
-
""When the intelligence services are gathering data about every one of us but failing to act on intelligence about individuals, they need to get back to basics, and look at the way they conduct targeted investigations. "The committee is particularly misleading when it implies that US companies do not co-operate, and it is quite extraordinary to demand that companies pro-actively monitor email content for suspicious material. Internet companies cannot and must not become an arm of the surveillance state."
« First
‹ Previous
41 - 60 of 78
Next ›
Showing 20▼ items per page