Archive for December, 2017 | Monthly archive page

The Founder of Litecoin Says He No Longer Owns Any Litecoin

“[W]henever I tweet about Litecoin price or even just good or bads news, I get accused of doing it for personal benefit. Some people even think I short LTC! So in a sense, it is conflict of interest for me to hold LTC and tweet about it because I have so much influence,” Lee, who […]

Coinbase Freezes Bitcoin Cash Trades, Launches Insider Trading Probe

Coinbase, one of the world’s most popular cryptocurrency apps, surprised its users by adding Bitcoin Cash to its offerings on Tuesday. But it appears that not everyone trading in the altcoin was blindsided by the move. Before the announcement, prices for Bitcoin Cash began climbing in other markets, and now a self-investigation of possible insider […]

Lightwear: Introducing Magic Leap’s $1.9 Billion Dollar Invstement Mixed Reality Goggles

Magic Leap today revealed a mixed reality headset that it believes reinvents the way people will interact with computers and reality. Unlike the opaque diver’s masks of virtual reality – which replace the real world with a virtual one – Magic Leap’s device, called Lightwear, resembles goggles, which you can see through as if you’re […]

Bitcoin exchange Youbit shuts after second hack attack – BBC News

A crypto-currency exchange in South Korea is shutting down after it was hacked for the second time in less than eight months. Youbit, which lets people buy and sell bitcoins and other virtual currencies, has filed for bankruptcy after losing 17% of its assets in the cyber-attack. It did not disclose how much the assets […]

Dozens of Companies Are Using Facebook to Exclude Older Workers

Verizon is among dozens of the nation’s leading employers — including Amazon, Goldman Sachs, Target and Facebook itself — that placed recruitment ads limited to particular age groups, an investigation by ProPublica and The New York Times has found. The ability of advertisers to deliver their message to the precise audience most likely to respond […]

Windows 10 Facial Recognition Feature Can Be Bypassed with a low res Photo

You can bypass Windows Hello with a low-res printed photoIn a report published yesterday, German pen-testing company SySS GmbH says it discovered that Windows Hello is vulnerable to the simplest and most common attack against facial recognition biometrics software — the doomsday scenario of using a printed photo of the device’s owner.Researchers say that by […]

Hackers Used DC Police Surveillance System to Distribute Ransomware

A Romanian man and woman are accused of hacking into the outdoor surveillance system deployed by Washington DC police, which they used to distribute ransomware.The two suspects are named Mihai Alexandru Isvanca and Eveline Cismaru, Romanian nationals, both arrested last week by Romanian authorities part of Operation Bakovia that culminated with the arrest of five […]

Nissan Canada Finance hacked, up to 1.1m Canucks exposed

Nissan Canada’s vehicle-financing wing has been hacked, putting personal information on as many as 1.13 million customers in the hands of miscreants. […] According to Nissan Canada, the exposed data includes at least customer names, addresses, vehicle makes and models, vehicle identification numbers (VINs), credit scores, loan amounts and monthly payment figures. “We are still […]

 Gemini • Psion come alive again running linux and android

Gemini brings the Psion Series 5 design into the 21st century. Psion’s designer, Martin Riddiford of Therefore, has devised a new keyboard and hinge, which allows the machine to spring open and snap shut, just like Psions used to, and stand firmly on a flat surface without keeling over. Inside is a full phone board, […]

Yes, your old iPhone is slowing down: iOS hits brakes on CPUs as batteries wear out

It turns out Apple’s mobile operating system includes a throttling mechanism for devices with weary batteries, designed to limit CPU utilization in order to prevent peak power demands that the battery is no longer capable of providing. In other words, the OS secretly stalls the CPU on older iPhones to stop them rapidly draining their […]

Chinese Adups Backdoor Still Active on Many Android Devices

Back in mid-November 2016, US cyber-security firm Kryptowire revealed it discovered that firmware code created by a Chinese company called Adups was collecting vasts amount of user information and sending it to servers located in China.According to Kryptowire, the backdoor code was collecting SMS messages, call history, address books, app lists, phone hardware identifiers, but […]

Ghostery, uBlock, Privacy Badger lead the anti-tracking browser extensions

A group of researchers in France and Japan say RequestPolicyContinued and NoScript have the toughest policies, while Ghostery and uBlock Origin offer good blocking performance and a better user experience. The study also gave a nod to the EFF’s Privacy Badger, which uses heuristics rather than block lists, but once trained is nearly as good […]

Another AI attack, this time against ‘black box’ machine learning

Unlike adversarial models that attack AIs “from the inside”, attacks developed for black boxes could be used against closed system like autonomous cars, security (facial recognition, for example), or speech recognition (Alexa or Cortana).The tool, called Foolbox, is currently under review for presentation at next year’s International Conference on Learning Representations (kicking off at the […]

Older Adults’ Forgetfulness Tied To non syncing Brain Rhythms In Sleep

During deep sleep, older people have less coordination between two brain waves that are important to saving new memories, a team reports in the journal Neuron. To find out, Walker and a team of scientists had 20 young adults learn 120 pairs of words. “Then we put electrodes on their head and we had them […]

Seagate’s lightbulb moment: Make read-write heads operate independently

Seagate is increasing IO performance in disk drives by separating read-write heads into two separate sets which can operate independently and in parallel.The heads are positioned at one end of actuator arms which rotate around a post at their other end to move the heads across the platter surfaces. Thus, with an eight-platter drive, each […]

KLM uses AI to answer questions on social media

olgens KLM worden wekelijks 30.000 gesprekken gevoerd door de 250 socialmediamedewerkers. De luchtvaartmaatschappij wordt wekelijks ruim 130.000 keer genoemd op social media. Gemiddeld bestaat een gesprek tussen KLM en een klant uit vijf tot zes vragen en antwoorden. De veelgestelde vragen die met behulp van kunstmatige intelligentie automatisch kunnen worden beantwoord, worden meestal aan het […]

Simulated Traffic flow measured on 30 different 4-way junctions – YouTube

China’s big brother: how artificial intelligence is catching criminals and advancing health care

“Our machines can very easily recognise you among at least 2 billion people in a matter of seconds,” says chief executive and Yitu co-founder Zhu Long, “which would have been unbelievable just three years ago.” Yitu’s Dragonfly Eye generic portrait platform already has 1.8 billion photographs to work with: those logged in the national database […]

AI helps find planets in other solar systems

The neural network is trained on 15,000 signals from the Kepler dataset that have been previously verified as planets or non-planets. A smaller test set with new, unseen data was fed to the neural network and it correctly identified true planets from false positives to an accuracy of about 96 per cent.The researchers then applied […]

Tripwire detects hacks companies haven’t told us about by creating accounts with unique emails on thousands of servers. If the email account is accessed, the site has been breached. No-one knows or cares that there has been a breach in vast majority of cases.

a prototype tool created by researchers from the University of California San Diego (UCSD) aims to bring greater transparency to such breaches. The system, called Tripwire, detects websites that were hacked, as is detailed in this study. Here’s here how it works: To detect breaches, the researchers created a bot that automatically registered accounts on […]

Windows 10 Password Manager Keeper allows sites to steal any password.

A Google security researcher has found and helped patch a severe vulnerability in Keeper, a password manager application that Microsoft has been bundling with some Windows 10 distributions this year.”I’ve heard of Keeper, I remember filing a bug a while ago about how they were injecting privileged UI into pages,” said Tavis Ormandy, the Google […]

“Suspicious” event routes traffic for big-name sites through Russia

According to a blog post published Wednesday by Internet monitoring service BGPMon, the hijack lasted a total of six minutes and affected 80 separate address blocks. It started at 4:43 UTC and continued for three minutes. A second hijacking occurred at 7:07 UTC and also lasted three minutes. Meanwhile, a second monitoring service, Qrator Labs, […]

Looking through walls, now easier than ever • The Register

In a paper published on Thursday in the journal Optica, Duke professors Daniel Marks and David R. Smith, and postdoctoral researcher Okan Yurduseven describe a method for through-wall imaging (TWI) that compensates for the varied distortion produced by different wall materials, to allow details to be captured more accurately. Source: Looking through walls, now easier […]

How to Track a Cellphone Without GPS—or Consent

Using only data that can be legally collected by an app developer without the consent of a cellphone’s owner, researchers have been able to produce a privacy attack that can accurately pinpoint a user’s location and trajectory without accessing the device’s Global Position System—GPS. And while the ramifications of this ability falling into the wrong […]

Google Taught an AI to Make Sense of the Human Genome

This week, Google released a tool called DeepVariant that uses deep learning to piece together a person’s genome and more accurately identify mutations in a DNA sequence.Built on the back of the same technology that allows Google to identify whether a photo is of a cat or dog, DeepVariant solves an important problem in the […]

Skip to toolbar