Rei Daltro

137 Flips | 2 Magazines | 3 Likes | 5 Following | 1 Follower | @ReiDaltro | Tecnologia, ciência, política e muito Rock and Roll é tudo o que eu procuro aqui!

Still don't understand the blockchain? This explainer will help

The world has been captivated by the drama surrounding Bitcoin’s meteoric rise and subsequent collapse. In December, the price of a single coin …

Por que não é uma boa ideia sair fazendo testes do Facebook

Vira e mexe aparecem novos aplicativos no Facebook com testes divertidos. Quizzes, montagens, revelação de quantas mensagens você trocou com alguém. …

How to Protect Your Smart TV From Getting Hacked

I’ve said it before and I’ll say it again, smart TVs are the worst. The extra software is usually clunky enough to get in the way of whatever you …

Why AI Is the ‘New Electricity’

Just as electricity transformed the way industries functioned in the past century, artificial intelligence has the power to substantially change …

Artificial Intelligence

Google’s self-training AI turns coders into machine-learning masters - MIT Technology Review

Google just made it a lot easier to build your very own custom AI system.<p>A new service, called Cloud AutoML, uses several machine-learning tricks to …

Machine Learning

Ferramenta do Google facilita a criação de redes de inteligência artificial

Depois de surpreender os consumidores com seus truques de <b>inteligência artificial</b>, a Google espera convencer o mercado de seus talentos com uma nova …

Here's how technology is shaping the future of education

New technologies like AI, machine learning, and educational software aren't just changing the field for students, they're shaking up the role of educators, creating philosophical shifts in approaches to teaching, and remodeling the classroom.<p>With an influx of new learning models available, …

Google Researchers Have a New Alternative to Traditional Neural Networks

Say hello to the capsule network.<p>AI has enjoyed huge growth in the past few years, and much of that success is owed to deep neural networks, which …

Deep Learning

The Times of the Global Screen and the Posthuman Subjectification - OpenMind

A long tradition links the birth of modern subjectivity to factors such as the arrival of Gutenberg’s printing press which printed the first book, …

Singularity

The Secrets of Facial Recognition - OpenMind

The iris scanner found in the Samsung Galaxy 8 is an example of a security tool based on facial recognition, a different version of which has also …

Mobile Technology

Spear Phishing 101

Spear phishing is one of the most useful tools available to gain initial access in an environment. At its core Phishing is essentially a form of …

Um em cada quatro bancos tem dificuldades para verificar a identidade de clientes no Internet banking - TI INSIDE Online

Postado em: 04/05/2017, às 21:53 por Redação<p>De acordo com a recente pesquisa de riscos à segurança de instituições financeiras, 24% dos bancos de …

The No More Ransom Project

This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera

A Chinese infosec researcher has reported about an "almost impossible to detect" phishing attack that can be used to trick even the most careful …

Phishing

5 April 2017

Five Key Risk and Security Considerations for Internet of Things<p>The Internet of Things (IoT) exponentially expands the threat and vulnerability …

Cybersecurity

Over 85% Of Smart TVs Can Be Hacked Remotely Using Broadcasting Signals

The Internet-connected devices are growing at an exponential rate, and so are threats to them. Due to the insecure implementation, a majority of …

Cyber-attacks

Como as empresas brasileiras estão trabalhando com inteligência artificial

A inteligência artificial chegou para revolucionar o mundo, e os negócios, é claro, também foram afetados pela tecnologia. Por aqui, já sabemos …

How Hackers Steal Passwords on a Local Area Network using the SEToolkit

Welcome back my fellow hackers! In the past few articles we’ve been preparing to steal credentials from users on our local network, and today we’re …

Why Home Network Is 192.168.1.1 AS Default Gateway

It’s been like ages that we are using computers and its peripherals for most of the work that we do in our day-to-day life. It has created a …

Wi-Fi

Robots can be hacked, exploit to kill people, spy on military secrets: Researchers

There are a lot of conspiracy theories about robots taking over our jobs or killing the humanity. In fact, famous physicist Professor Stephan Hawking …

What blockchain means for the Internet of Things

February 10, 2017 | Written by: Chris O'Connor<p>Categorized: Business | Security<p>Share this post:<p>Why is everyone so interested in blockchain, and what …

GSMA - CONEXÕES 4G NA AMÉRICA LATINA CRESCERAM 121% NO ÚLTIMO ANO

GSMA – CONEXÕES 4G NA AMÉRICA LATINA CRESCERAM 121% NO ÚLTIMO ANO<p><b>GSMA Intelligence</b><p><i>As conexões 4G da América Latina superaram os 100 milhões em 2016 e</i> …

Financial Phishing and Banking Malware Surges in 2016

Nearly half of all phishing attacks are now designed to steal the victim’s money – an all-time high, according to new data from Kaspersky Lab.<p>The …

What Happens When Robots Become Role Models - MIT Technology Review

When you spend a lot of time with someone, their characteristics can rub off on you. But what happens when that someone is a robot?<p>As artificial …

Symantec revela que dezenas de bancos globais sofreram ataques com novos malwares

Organizações em 31 países foram alvo de uma nova onda de ataques que está em andamento desde, pelo menos, outubro de 2016. Os atacantes usaram sites …

Nowhere to hide: 9 new hacks coming to get you

Securitywise, the internet of things is going as badly as most computer security experts predicted. In fact, most vendors don’t fully appreciate the …

Internet of Things

Certified Malice

One unfortunate (albeit entirely predictable) consequence of making HTTPS certificates “fast, open, automated, and free” is that both good guys and …

20 Silly SEO Techniques That Will Get Your Site Penalised by Google

Have you got an SEO strategy in place to improve your ranking on Google? Were you aware that certain SEO practices could get you into trouble?<p>Google …

Verizon Data Breach Digest: How to protect your business from Fraud, Doxxing & Insider Threats

Rarely does a dull moment pass when you’re dealing with cyber security, mainly because it feels as though a new threat or data breach is just around …