Pro-Trump and pro- Clinton software robots produce 3.8 million tweets masquerading as humans

Public Release: 4-Nov-2016 Fake Tweets, real consequences for the election A USC Viterbi School of Engineering Computer Scientist worries that robot-generated tweets could compromise the presidential election University of Southern California Software robots masquerading as humans are influencing the political discourse on social media as never before and could threaten the very integrity of the…

Germany warns US facilities could be targeted in wake of NSA leaks

Published time: November 12, 2013 22:13                                                                              The entrance to the US Airbase is pictured in Ramstein, southern German (AFP Photo / Daniel Roland) Officials in Germany have cautioned authorities to prepare for possible attacks against United States facilities overseas as revelations continue to emerge about America’s secretive National Security Agency. As leaked classified documents continue…

Artificial intelligence ‘will take the place of humans within five years’

  Salespeople, call centre staff and customer service personnel could all be replaced by computers within the next few years, claims one technology entrepreneur. Steven Spielberg’s 2001 film Artificial Intelligence (AI) depicts a future where robots have become eerily human.   By Rebecca Burn-Callander, Enterprise Editor 4:40PM BST 29 Aug 2013 Robotics and artificial intelligence…

E-tattoo monitors brainwaves and baby bump : “now modifying the tattoo to transmit data wirelessly to a smartphone”

      26 April 2013 by Sara Reardon Magazine issue 2914.  Subscribe and save For similar stories, visit the The Human Brain Topic Guide An electronic patch can analyse complex brainwaves and listen in on a fetus’s heart MIND reading can be as simple as slapping a sticker on your forehead. An “electronic tattoo”…

Couple Claim Cop Stole Their Drugs: Utah does not safeguard personal prescription information from unlawful access or dissemination

By JONNY BONNER SALT LAKE CITY (CN) – A city cop used Utah’s prescription drug database to visit a couple’s home for so-called “pill checks” and steal their pain drugs, hoping “they would be too dumb to notice the pills were missing,” the couple claim in court. Candy Holmes and Russell Smithe, a married couple,…

New Mac Malware ‘Dockster’ Found on Dalai Lama site

   Author : Mohit Kumar on 12/05/2012 03:48:00 AM   A new trojan horse app called Dockster is targeting Mac users by exploiting a known Java vulnerability CVE-2012-0507. The trojan is apparently being delivered through a website (gyalwarinpoche.com) dedicated to the Dalai Lama and once installed can collect user keystrokes and other personal information. Mac…

From sci-fi to reality: The computer-blitzing drone that can cripple a nation’s electronics at the touch of a button

Aircraft  manufacturer Boeing have created a weapon that can knock out  computers The missile is  thought to be able to penetrate bunkers and caves Experts warn, in  the wrong hands, could bring Western cities to their knees By  Ben Ellery PUBLISHED: 17:01 EST, 1  December 2012 |  UPDATED: 17:01 EST, 1 December 2012   Down…

Microsoft STALKS YOU even more than supermarkets do, says dev

Original URL: http://www.theregister.co.uk/2012/11/29/web_tracking/ Hey, get your tracker kit out of my trouser browser By John Leyden Posted in Security, 29th November 2012 12:57 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Web-tracking is rife on technology vendor websites, with Microsoft among the worst offenders. Tech sites serve up even more trackers than the…

Antivirus biz’s founder unmasked as noted Chinese hacker

Original URL: http://www.theregister.co.uk/2012/11/29/anvisoft_chinese_intrigue/ Blackhat once attacked US Department of Defense By John Leyden Posted in Security, 29th November 2012 09:19 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Antivirus startup Anvisoft was founded by an infamous Chinese hacker who allegedly cut his teeth exploiting Microsoft Office security holes to hack US defence contractors,…

US software firm hacked for years after suing China

Original URL: http://www.theregister.co.uk/2012/11/29/solid_oak_china_hacked_three_years/ Solid Oak nearly went under after three years of persistent attack By Phil Muncaster Posted in Security, 29th November 2012 04:05 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques A Californian software company which sued the Chinese government for pirating its flagship content filtering product has revealed how it was…