cyber war
04/22/2018
/
By David Williams
Voice mimicry technology causes concern for privacy, security and accuracy of news
Will the days of reliable, trustworthy news sources soon be over? At the rate that artificial intelligence (AI) is currently advancing, that seems highly likely. Companies like China’s Baidu are now using AI to create advanced voice mimicry technology that’s slowly but surely becoming more than a bit scary. As of this time’s writing, they […]
04/22/2018
/
By David Williams
“Trust crisis” looms over tech industry as public grows weary of privacy scandals
It’s a bad time to be an internet user. Despite the many technological advancements that have made it possible for more people to get online and connect with each other, along with all of the many online services that can be enjoyed by almost anyone by doing nothing more than simply tapping a few buttons, […]
04/14/2018
/
By David Williams
China readying Social Credit System where citizens receive scores based on their online obedience to the state
China is planning to implement a system wherein its citizens will be ranked and given ratings based on a certain set of specified criteria, like social media activity and online obedience to the state. The system, called the Social Credit System, is said to be in place for a country-wide launch some time in 2020. […]
04/13/2018
/
By Frances Bloomfield
SCARY: Computer experts show how easy it is to hack off-the-shelf smart devices like baby monitors and home security cameras
Is anyone truly secure in their home? That may not be the case in a world where bridges are being connected by rapidly improving technology. And with off-the-shelf smart devices becoming increasingly common features in homes, it seems that it’s easier than ever to invade the sanctity of a personal space. This was demonstrated by […]
03/24/2018
/
By Lance D Johnson
Bitcoin users are systematically targeted by the NSA to track their computer activity and crypto transactions
According to an internal NSA memo dated March 2013, the National Security Administration (NSA) has been systematically targeting any Bitcoin users they want, by tricking them into giving up personal information through privacy protection software and by tracking their computer activity and financial transactions. People who want to preserve the privacy of their financial transactions gravitate toward cryptocurrencies […]
03/11/2018
/
By David Williams
Intel breakthrough uses silicon to make a quantum processor; are hack-proof computers on the horizon?
Quantum computing is shaping up to be the next best thing since sliced bread, according to many technology industry leaders and experts. Indeed, many of today’s leading technology companies are trying to conduct their own research to advance the field, and they’re all making progress slowly but surely. Now microchip maker Intel has announced that […]
03/08/2018
/
By Edsel Cook
Prove you’re HUMAN: Real-time Captcha technique relies on human answers to unusual questions
In a happy marriage of old Captcha and new biometric techniques, researchers have devised a new verification methodology called Real-Time Captcha. It presents real-time puzzles that will throw artificial intelligence for a loop and protect the accounts of human users, reported a ScienceDaily article. Real-Time Captcha is a logical evolution of current biometric techniques based on facial photos […]
02/27/2018
/
By David Williams
Amazon’s new Key device already hacked by security researchers, highlighting security flaws
Online retail giant Amazon has a unique new delivery service feature that allows delivery guys to open locked doors, leave packages inside people’s homes, and leave after locking the door again behind them. This is called Amazon Key, and it’s a service that is now a hot topic in the security industry as one researcher […]
02/25/2018
/
By David Williams
Bitcoin wallet devices found to be surprisingly vulnerable to hacking
People have touted bitcoin to be much more secure than most existing financial services. However, it’s not immune to hacks and other intrusions. A group of computer scientists has just shown how vulnerable Bitcoin can truly be, particularly when stored inside so-called hardware wallets that are meant to keep them safe in an analog form. […]
02/10/2018
/
By David Williams
MIT students told to watch “Black Mirror” episodes as part of their studies to learn about the unintended consequences of technology
The critically acclaimed TV-show-turned-Netflix series Black Mirror has been on a roll for pretty much the entirety of its six-season-long run. Despite its typically shocking storylines and twists — which prompt viewers to stop watching after every episode to contemplate what they just saw — it is almost universally loved and always near the top […]
« Return Home
1 of 3
Next Page »
Popular Articles
COPYRIGHT © 2017 COMPUTING NEWS