Posts

Showing posts from October, 2015

Undersea Internet Cables Are Surprisingly Vulnerable

Image
Undersea Internet Cables Are Surprisingly Vulnerable So, the Russians are at it again, snooping around the undersea communications cables that connect the continents. These fiber optic cables carry 99 percent of all transoceanic digital communication—phone calls, emails, web pages, you name it. They’re the reason you can Skype your colleague in Sydney or text with your friend in Mumbai. They’re essential infrastructure for the global economy. It’s no wonder, as The New York Times reported this week , that US military officials are not at all comfortable with Russian subs and spy ships “aggressively operating” in their vicinity. Despite the importance of this undersea network, most people never give it a thought until something goes wrong, or seems likely to. Nicole Starosielski wants to change that. Starosielski, a media scholar at New York University, spent six years traveling the globe to study the history of the cable network and the cultural, political, and envi...

If We Want Humane AI, It Has to Understand All Humans

Image
If We Want Humane AI, It Has to Understand All Humans   The first picture flashes on the screen. “A man is standing next to an elephant,” a robotic voice intones. Another picture appears. “A person sitting at a table with a cake.” Those descriptions are obvious enough to a person. What makes them remarkable is that a human is not supplying the descriptions at all. Instead, the tech behind this system is cutting-edge artificial intelligence: a computer that can “see” pictures. Fei-Fei Li, director of the Stanford Artificial Intelligence Lab, is standing on a lit stage in a dark auditorium showing off the advanced object-recognition system she and her fellow researchers built. But as impressive as the system is, Li grows more critical as her presentation unfolds. She says that even if the computer is technically accurate, it could do more. The computer may be able to describe in simple, literal terms what it “sees” in the pictures. But it can’t describe the sto...

Facebook Kills the Inbox You Didn’t Know You Had

Image
Facebook Kills the Inbox You Didn’t Know You Had Ahhhh, the Facebook “Other” inbox—a hive of scum and villainy, the barely visible, rarely used repository of messages you don’t really want from people you don’t really care about mixed in with a few things you’d actually want to know about. What? You have no idea what I’m talking about? Oh, you’re in for a fun surprise. Go to your messages. No, no, not on your phone. You have to type “facebook.com” into your browser. Done? Now go to Messages and click that light gray box labeled “Other.” That’s the Other Inbox. I’ll wait here while you click through it, slack-jawed at this mystery unveiled. The Other inbox was where messages from strangers, or people you only kinda sorta know, would land. And like most people, you probably had no idea it existed. Now that you’ve found it, you’ve probably discovered all kinds of stuff. Maybe you found invitations to a party you would have loved to attend. Maybe som...
Image
CISA Security Bill Passes Senate With Privacy Flaws Unfixed For months, privacy advocates have asked Congress to kill or reform the Cybersecurity Information Sharing Act, a bill that they say hides new government surveillance mechanisms in the guise of security protections. Now the Senate has shot down a series of attempts to change the legislation’s most controversial measures, and then passed it with those privacy-invasive features fully intact. On Tuesday afternoon, the Senate voted 74 to 21 to pass a version of CISA that roughly mirrors legislation passed in the House earlier this year, paving the way for some combined version of the security bill to become law. CISA is designed to stem the rising tide of corporate data breaches by allowing companies to share cybersecurity threat data with the Department of Homeland Security, who could then pass it on to other agencies like the FBI and NSA, who would in theory use it to defend the target company and...

Security This Week: Apparently China Is Still Hacking US Companies

Image
Security This Week: Apparently China Is Still Hacking US Companies This week, a group of teenagers hacked CIA director John Brennan’s private AOL account, and WikiLeaks started publishing his leaked emails. Some ingenious French criminals exploited the supposedly secure chip and pin credit cards that are even more secure than what the US just adopted. (Let’s just say we told you so.) Facebook will now warn users about nation-state attacks, but it will also allow users to find public posts using search, so you may want to consider hiding yours. And WIRED set the record straight on the importance of reporting on car hacking. But that’s not all. Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. As always, click on the headlines to read the full story in each link posted. And stay safe out there! China Said It Would Stop Hacking US Companies, But It Didn’t The US and China reached a histo...
Image
The Most Controversial Hacking Cases of the Past Decade   The Computer Fraud and Abuse Act, the law that’s been at the heart of almost every controversial hacking case of the past decade, is in the news again this month. Prosecutors recently used the law to convict journalist Matthew Keys on felony hacking charges, drawing rounds of condemnation on the web. Edward Snowden, for one, derided the harsh penalty Keys now faces—a maximum possible sentence of 25 years. But charging Keys with a felony for his role in a crime that critics say should have been considered a misdemeanor—the minor defacement of a Los Angeles Times article—is not an anomaly for the feds. It’s just one among a growing list of contentious cases that critics say illustrate how prosecutors have been overstepping in their use of the CFAA. The government first used the federal anti-hacking statute in 1989, three years after its enactment, to indict Robert Morris, Jr., son of the then-chief sci...

6 Experts on How Silicon Valley Can Solve Online Harassment

Image
6 Experts on How Silicon Valley Can Solve Online Harassment   Silicon Valley is all about using tech to come up with solutions to gnarly problems. Yet the ugly reality of online harassment has remained intractable. The Internet, which has so amplified the voices of women, minorities, and LGBT folk, is still very much a free-fire zone for those who would shame, silence, or abuse them. A 2014 study by the Pew Research Center found that 25 percent of 18- to 24-year-old women have been the target of online sexual harassment. Last year the issue erupted in the mainstream media with Gamergate. The online movement targeted a female game developer, making accusations about her sexual life and publishing her address and phone number, prompting her to move out of her home. In September, WIRED convened a roundtable of people deeply involved in the issue to discuss what it would take to produce lasting change. This conversation has been edited for clarity and space constra...

ACCIDENTAL BILLIONAIRES

Image
ACCIDENTAL BILLIONAIRES    If we try to analyze the technics that were used by the current billionaires , such as Mark Zuckerberg , Billgates , Steve .....and so on . Behind there wealth there are lots of codecs printed in there genius brains . As any coder there are sleepless nights spending most thier time eating codes of php , java scripts , java , mysql , c++ .....and so on. These people didn't spend the rest of there times doing code because of money as i assume . www.bevir.wordpress.com/markz www.bevir. wordpress.com/ billgates