Luther Nygma

256 Flips | 4 Magazines | 34 Likes | 2 Following | 1 Follower | @LutherJolliff | "It doesn't matter who we are...what matters is our plan"

What we know about the U.S. airstrikes on Syria

The U.S. led airstrikes in a coordinated attack with U.K. and French allies against the regime of Syrian dictator Bashar Assad.<p>Here's what we know about the attack:<p>What happened?<p>Precision missile strikes targeted three Syrian chemical weapons facilities: a scientific research center near Damascus, …

Middle East

Mind-bending new screen technology uses ‘magic pixel’ to display different content to multiple people

Walking through the airport, you look up at the big screen to find your gate. But this is no ordinary public display. Rather than a list of arrivals …

Public trust in Facebook fades in light of privacy concerns

The recent privacy scandals regarding Facebook and Cambridge Analytica are starting to take a toll on the company’s reputation. Reuters reports that …

Social Media

Spanish police arrest suspected mastermind of $1 billion bank hacks

AMSTERDAM (Reuters) - Spanish police have arrested the suspected leader of a gang of cyber criminals who stole up 1 billion euros ($1.2 billion) from banks by altering account balances and instructing automatic teller machines to issue cash, Europol said on Monday.<p>The person suspected of being …

These AR Goggles Are Making Faster Fixes in Oil Fields

Replacing parts of an outdated Baker Hughes turbine at a petrochemical plant in Johor Bahru, Malaysia, is about as fun as it sounds. The chore was …

The Battle to Replace the Smartphone

What will knock out our prized possession?<p><b>Mobile World Congress</b> begins in Barcelona this week and promises all the wonder and excitement of <i>fin de siècle</i> <b>Comdex</b>, the definitive PC industry expo that used to occur in Las Vegas. Which is another way of saying: Zzzzzzzzzzzzzzzzz.<p>I mean honestly, can you …

Cellular Networks

Hacker Group Makes $3 Million by Installing Monero Miners on Jenkins Servers

A hacker group has made over $3 million by breaking into Jenkins servers and installing malware that mines the Monero cryptocurrency. [...]

Smart meters could leave British homes vulnerable to cyber attacks, experts have warned

New smart energy meters that the Government wants to be installed in millions of homes will leave householders vulnerable to cyber attacks, ministers have been warned.<p>The intelligence agency GCHQ is said to have raised concerns over the security of the meters, which could enable hackers to steal …

Elon Musk gets permission to do a little digging for his Hyperloop

It's been far easier for Elon Musk to send a rocket to the Mars than move a pebble in Washington, D.C.<p>That could be changing, according to <i>The</i> …

Elon Musk

'I didn't even meet my potential employers'

<b>As companies rely more on machine learning and artificial intelligence (AI) to find the right job candidates, is recruitment in danger of losing that personal touch?</b><p>Peter Lane, a 21-year-old who graduated last summer from Cardiff University with a degree in History, is hoping to get into business …

A fast-evolving new botnet could take gadgets in your home to the dark side - MIT Technology Review

There’s a new botnet in town. Since December, security researchers have been tracking an insidious piece of malware called Satori, which hijacks …

Cybersecurity

Dog-walking startup Wag got a whopping $300 million from SoftBank and hired a new CEO

Dog-walking-on-demand startup Wag is getting a new CEO and a big infusion of cash.<p>On Tuesday, the company announced it's received a $300 million investment from Japanese telecom giant SoftBank. It also announced that veteran tech executive Hilary Schneider will be taking over as its CEO.<p>Schneider, …

Ransomware crooks test a new way to spread their malware

A new form of ransomware has emerged, which is being distributed via two separate exploit kits.<p><i>Video: Why rising bitcoin prices are not all good news</i> …

North Korea is barely wired. How did it become a global hacking power?

North Korea is one of the least wired nations on Earth. It has two internet connections to the outside world, one that crosses the Yalu River into …

Canada's blockchain trial adds transparency to government funding

Decentralized Funding<p>The Canadian government is testing out the use of blockchain tech to improve transparency in government funding.<p>Specifically, …

Facebook tries giving chatbots a consistent personality

Dig into the personalities of chat bots and you'll find that they're about as shallow as they were in the days of Eliza or Dr. Sbaitso. They respond with canned phrases and tend to be blithely unaware of what you've said. Facebook wants to fix that. Its research team has tested a new approach that …

Fitness App's 'Anonymized' Data Dump Accidentally Reveals Military Bases Around the World

People around the world use the app Strava on their smartphones and Fitbits to track how far they run. But researchers have discovered that an …

Security

Trump security team sees building U.S. 5G network as option

WASHINGTON (Reuters) - President Donald Trump's national security team is looking at options to counter the threat of China spying on U.S. phone calls that include the government building a super-fast 5G wireless network, a senior administration official said on Sunday.<p>The official, confirming the …

Dutch tax authority, banks face coordinated cyberattack

The Dutch taxation authority, as well as several banks, faced a series of distributed denial-of-service attacks on their networks Monday, in what …

First ATM 'Jackpotting' Attacks Hit US

sponsored by<p>Cash-Out Malware Called 'Ploutus' Migrates North From Mexico Jeremy Kirk (jeremy_kirk) • January 29, 2018<p>Five years ago, security …

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core

WASHINGTON — Jake Williams awoke last April in an Orlando, Fla., hotel where he was leading a training session. Checking Twitter, Mr. Williams, a cybersecurity expert, was dismayed to discover that he had been thrust into the middle of one of the worst security debacles ever to befall American …

Cybersecurity

This Is What A 21st-Century Police State Really Looks Like

Far from the booming metropolis of Beijing, China is building a sprawling system that combines dystopian technology and human policing. “It’s a kind of frontline laboratory for surveillance.”<p>KASHGAR, China — This is a city where growing a beard can get you reported to the police. So can inviting …

Ad networks let you easily and quickly make a botnet

The coder and artist Brannon Dorsey (previously) wondered about the potential of "browser based botnets" -- running Javascript on tons of machines, …

Triton malware: Next-gen cyberweapon that can shut down power plants accidentally leaked online

Triton malware, considered to be an advanced variant of Stuxnet, was used to shut down a Middle East oil and gas facility.<p>A powerful malware, dubbed …

China has been killing CIA informants – now the FBI has caught the mole responsible

According to a Department of Justice release Tuesday, the FBI has captured a mole that they believe had been revealing top secret identities of CIA informants to the Chinese.<p><b>“A systematic dismantling”</b><p>The New York Times reports that China began killing informants to the CIA in 2012 in what is …

U.S. Department of Justice

22 States File Lawsuit Against FCC In Fight To Protect Net Neutrality

Attorney Generals from 21 states, Washington D.C., and public interest groups filed the first major lawsuit Tuesday to block the Federal …

Upskill Is the Coolest AR Startup You Haven't Heard of Yet

In mid-2010, the US military was looking to develop new head-up display technology for soldiers in the field. A company called Battlefield Telecommunications Systems (BTS) was tasked as the government's software provider for biometric force predictions, meaning real-time data displayed to a …

No, machines can’t read better than humans

Headlines have claimed AIs outperform humans at ‘reading comprehension,’ but in reality they’ve got a long way to go<p>Computers are built to process data, but there’s a particular form of information so rich and dense in meaning that it’s beyond the full comprehension of even the most advanced AI. …

Cloudflare Access aims to replace corporate VPNs

If you’re part of a reasonably big company, chances are there are certain resources that are only available via the intranet, internal network, or whatever your company calls it. A common way to access these from outside company property is a VPN, but VPNs are rather a clumsy solution — one …