Toggle light / dark theme

I believe there are good advances in AI due to the processing performance; however, as I highlighted earlier many of the principles like complex algorithms along with the pattern & predictive analysis of large volumes of information hasn’t changed much from my own work in the early days with AI. Where I have concerns and is the foundational infrastructure that “connected” AI resides on. Ongoing hacking and attacks of today could actually make AI adoption fall really short; and in the long run cause AI to look pretty bad.


A debate in New York tries to settle the question.

By Larry Greenmeier on March 10, 2016.

Read more

Let’s just hypothesize a little on this topic: let’s say Apple goes ahead and gives in to the US Government and enables government to access the phone’s info. Does Apple have any protection in the future from lawsuits from it’s customers in situations where their own customers information is hacked by criminals and published to the world or used for illegal activities? Because I do see in the future more lawsuits coming at the tech companies for not ensuring their platforms and devices are un-hackable. So, if the government has its way; what protections does tech have now with any future lawsuits by consumers and other businesses?


His comments come during the ongoing legal battle over an iPhone used by Syed Farook, one of the individuals responsible for the San Bernardino, Calif. mass shooting December 2. “I don’t think requiring backdoors with encryption is either going to be an effective way to increase security or is really the right thing to do for just the direction that the world is going to”.

This is because First Amendment treats computer code as speech and according to Apple, meeting the demands of the government would be equivalent to “compelled speech and viewpoint discrimination”.

The Electronics Frontier Foundation (EFF) has said it will be filing an amicus brief in support of Apple with the courts.

Read more

U.S. Defense Secretary Ash Carter said the National Guard’s cyber squadrons will play an increasingly important role in assessing the vulnerabilities of U.S. industrial infrastructure and could be asked to join the fight against Islamic State.

The National Guard – a reserve military force that resides in the states but can be mobilized for national needs – is a key part of the military’s larger effort to set up over 120 cyber squadrons to respond to cyber attacks and prevent them.

One such unit, the 262nd squadron, is a 101-person team that includes employees of Microsoft and Alphabet’s Google. The unit is “famous throughout the country” for several high profile vulnerability assessments, Carter said at the Joint Base Lewis-McChord in Tacoma, Washington late on Friday.

Read more

Reserve you calendars for March 9th because New America’s Cybersecurity Initiative is hosting its annual Cybersecurity for a New America Conference in Washington, D.C.


On Wednesday, March 9, New America’s Cybersecurity Initiative will host its annual Cybersecurity for a New America Conference in Washington, D.C. This year’s conference will focus on securing the future cyberspace. For more information and to RSVP, visit the New America website.

So, what does cyberwar mean anyway?

At core, when we talk about cyberwar, we’re just talking about warfare conducted through computers and other electronic devices, typically over the Internet. As the very ’90s prefix cyber– (when was the last time you heard someone talk about cyberspace with a straight face?) suggests, it’s been part of our cultural and political conversations since the early ’80s. In recent years, however, such conversations have picked up as those in power become more conscious of our reliance on computers—and our consequent vulnerability. Perhaps more importantly, information like that disclosed by Edward Snowden has demonstrated that governments have already made preparations for virtual conflict, whether or not they’re actively engaging in it now. (Click here for a cheat sheet.)

Read more

Adding insult to injury.


From Russia with Love : Cerber Ransomware first encrypts your files and then reads out the ransom note.

Malware authors are know to be a ingenious lot and trust them to come with a Ransomware that actually reads out the ransom note to the victim.

Cerber is a latest ransomware which encrypts target victim’s files and then provides a TTS (text-to-speech) feature that reads out the ransom note.

Read more

There finally comes a point that you have to question why even have unique identity cards or numbers anymore.


The United States Internal Revenue Services have been battling a huge hacking scandal for nearly a year now. In the month of May last year, the Internal Revenue Services discovered that their security system shad been compromised along with the account details and personal information of over 100,000 people.

Read more