What does the government think of AI?

Artificial intelligence will be essential to the future economic growth of the United States, but if education and social services aren’t improved, American workers could lose millions of jobs. That’s the conclusion of a new report from the White House examining the economic impact of artificial intelligence and increasing automation. The report, released by the…

Details

ransomware payDOS command prompt

Two ransomware variants have entered the market

Avast malware analyst Jakub Kroustek recently discovered two batch file ransomware variants that run within the Windows command prompt: payDOS and Serpent. While both demand a ransom, neither actually encrypt your data like traditional ransomware. Instead, they rename your files making opening the files you need incredibly frustrating. If you run a business, this kind…

Details

neuromorphic computing

Future computers will look more like our brains

Despite all the technological advancements that we see, nothing comes close to the human brain – which explains why future computers might start looking like what’s inside our heads. The brain’s performance is way ahead of any supercomputer we have, and it requires less space and energy. Researchers therefore are looking at neuromorphic computing, a…

Details

data breaches

The differences between different kinds of data breaches

In a standard breach notification, you’ll often get some information about how the company stored your data before hackers stole it. It may seem like a foreign language, but not once you get the hang of it. Plain Text — If your information was stolen in plain text, that means it can be read by…

Details

artificial intelligence

If my big-data is big enough can I create intelligence?

As the amount of news about machine learning may make you wonder if we just discovered something profoundly new, artificial intelligence, the reality is that the technology is almost as old as computing itself. It is no coincidence that Alan Turing, who is one of the most significant computer scientists of all time, began his…

Details

virtual servers

How virtual servers are a data nightmare

Virtual servers: a new wave of IT technology that is taking the world by storm.  The idea of virtual servers is a logical and natural development; everyday physical servers are usually assigned to only one task or application to optimize their performance, but they are capable of much more.  Virtual servers capitalize on this latent…

Details

security breaches

Why you should be worried about security breaches

Security breaches are all around us . . . one cannot turn to the news without seeing some big-name entity hacked and customer data being revealed. If it happens to the Big Guys, what can smaller going concerns do? One thing that must be done is to properly assess the risk, look at the digital…

Details

Windows zero-day vulnerability

Google has disclosed a Windows zero-day vulnerability

When Google vendors discover a security flaw in a product that has already been exploited, they have seven days to issue a patch. Google has just disclosed a zero-day vulnerability after Microsoft failed to do so before that deadline. Recently, Google researchers found that the Windows kernel is affected by a local privilege escalation which allows attackers to escape…

Details

quantum encryption

China is racing to achieve quantum encryption

Last month, China launched the world’s first quantum satellite. Now, the country is working on another major feat: a 2,000-kilometer fiber-optic line for ferrying quantum encryption keys. It’s the beginning of real quantum encryption technology. Why China? Even though the Chinese have been behind some fairly high profile attacks recently, they don’t compare at all to…

Details

data encryption is more than just a lock

Data encryption has its limits

Does privacy exist anymore? In the age of the NSA, frequent ransomware attacks, and cyber stalking, it seems as though nothing we post online anymore is for our eyes alone. So it makes a lot of sense that encryption has become the method of choice for anyone wanting to protect their files. But is it…

Details