Archive

INSIGHTS

Machine Learning, TDA and the Future of Invention

Ayasdi came out of stealth mode and told the world it had a new way to analyze big data, and I think the implications for CRM and social are very large indeed. The new way is called "topological data analysis" and hearing about it has the feel of hearing about relativity for the first time and lea...

MIT’s Milli-Motein: Things Just Got a Lot More Interesting

Researchers at MIT's Center for Bits and Atoms have created milli-motein -- a manifestation of raw digital data that could create transformable robots. However, instead of pop-culture robots that can transform into giant cars or airplanes, these could result in material changes that might one day tr...

SPOTLIGHT ON SECURITY

Feds Back Projects to Bolster Online ID Verification

When Paul Steiner published his 1993 cartoon in The New Yorker with the caption, "On the Internet, no one knows you're a dog," little did he know it would become a mantra among security professionals, especially those concerned about authenticating identities on the Net. The job of finding ways to i...

SPOTLIGHT ON SECURITY

Hacker Claims Old-School Tactic Brought GoDaddy to Its Knees

Someone with the Twitter handle @AnonymousOwn3r made a grab for 15 minutes of fame last week by claiming responsibility for taking down the network for Internet's largest registrar, GoDaddy. GoDaddy discredited that claim. "The service outage was not caused by external influences," CEO Scott Wagner ...

SPOTLIGHT ON SECURITY

ID Theft Gives Apple Another Security Black Eye

Once upon a time, security shiners involving Apple were as rare as Windows Vista lovers, but now it seems that a week doesn't go by without the name of Steve Jobs' baby being dragged through the digital mud. Last week's episode involved the hacktivist group AntiSec and the FBI. AntiSec claimed it co...

SPOTLIGHT ON SECURITY

Java Patch May Be Just a Finger in the Dam

Oracle acted swiftly last week to close a zero-day vulnerability in its Java technology, but given Java's track record, that patch is just one hit in a long game of wackamole played with hackers. A number of security companies discovered the vulnerability over the weekend of Aug. 25. They noticed th...

SPOTLIGHT ON SECURITY

Security Sleuths Lay Blame on Apple for SMS Vulnerability

Research released last week fingered the iPhone as the source of a text messaging exploit that could be used to steal sensitive information from smartphone users or work mischief on their hardware. The flaw, revealed by a well-known security researcher and jailbreaker of iPhones, involves the "reply...

Power Strip’s a Penetration Testing Tool in Disguise

Advanced penetration testing product maker Pwnie Express has unveiled a new tester that looks just like a power strip. The Power Pwn is a fully integrated enterprise-class device that can be used over Ethernet, wireless or Bluetooth connections. It is priced at $1,300 and is currently available for ...

DARPA Wants to Give Robots More Staying Power

The Defense Advanced Research Projects Agency has issued an open call to the robotics industry soliciting expert proposals to create more power-efficient robots. The agency aims to maximize robotic technology potential and improve the power efficiency of current robots by 2,000 percent. Robots are h...

SPOTLIGHT ON SECURITY

The Cybersecurity Money Pit

Despite the hundreds of millions of dollars the U.S. federal government spends on cybersecurity, it seems that shoestring-budget attackers are still often able to get a foot in the door. At a security colloquium in North Virginia on Monday, the Defense Advanced Research Projects Agency told reporter...

SPACE

DARPA’s Long-Term Long Shot to the Stars

In a few short weeks, the United States Defense Advanced Research Projects Agency, or DARPA, will award a $500,000 grant for a 100-year starship project. The grant will be awarded at the 100 Year Starship Study Symposium, which will be held in Orlando, Fla., Sept. 30 through Oct. 2. The symposium wi...

DARPA Builds Cyberwarfare Proving Ground

News of two cybersecurity efforts undertaken by the United States government surfaced Friday. One is the Defense Industrial Base Cyber Pilot, in which the U.S. Department of Defense, partnering with the U.S. Department of Homeland Security, will share classified threat information and the knowledge ...

CONFERENCE REPORT

Visions of a Future Chock-Full of Chips

Twenty years from now, semiconductor chips will cost a penny apiece and will be in everything -- our clothing, our sunglasses, our contact lenses and even our toilets -- physicist Michio Kaku told an audience Thursday at the RSA 2011 convention. They'll revolutionize warfare, manufacturing and the m...

The Sisyphean Struggle for Biometric Security

Biometric security -- which employs systems that read people's fingerprints or compare their voiceprint or retina scans to information in data banks in order to authenticate them -- is being heavily used in some of the United States' most critical installations. How reliable are biometric systems? W...

Google Dabbles in Robotics With Self-Driving Cars

While it has been rumored for some time, Google announced Sunday is has been testing self-driving cars. The company equipped six Toyota Priuses and an Audi TT with technology that enabled a vehicle to drive from Google's Mountain View, Calif., campus to its Santa Monica office. It then moved on to H...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels