_mynd

1,483 Flips | 13 Magazines | 1,327 Likes | 21 Following | 41 Followers | @_mynd | Keep up with _mynd on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “_mynd”

How a Tiny Dot Lets Criminals Impersonate Most Banks Online | Inc.com

A small, rarely used special character is potentially helping criminals trick people into falling prey to all sorts of online scams, and businesses -- including some of the world's leading media companies and financial institutions -- appear to be woefully unprepared.<p>Here is what you need to know …

IT security

NASA is going back to the moon — if it can figure out how to get there

NASA is going back to the moon — somehow, someway. The White House has ordered the agency to put American boots back on the lunar surface. The major unknowns at this point include the when, how, scale of the operation and cost. Also unclear is what exactly NASA would accomplish with such a mission …

CPU bug patch saga: Antivirus tools caught with their hands in the Windows cookie jar

You're fondling our kernel wrong, grumbles MicrosoftMicrosoft's workaround to protect Windows computers from the Intel processor security flaw dubbed …

Ads don't work so websites are using your electricity to pay the bills

With the continuing collapse in online advertising revenues, websites are turning to other methods to pay their hosting bills – including using visitors’ computers and phones to mine cryptocurrency.<p>It’s a controversial practice, with some likening it to running malware on visitor’s computers, but …

Ad Blocking

Security flaw found in Broadcom chipset allows hackers to hijack WiFi connected iPhones

According to a report from Google Project Zero, a security flaw has been found in iPhones and other devices that use Broadcom Wi-Fi chips. The …

Research in Focus: Deep Learning Research and the Future of AI

Overview<p>AI deep learning expert and University of Montreal Professor Yoshua Bengio talks about deep learning—what it is, how it got there, where it’s …

Court rules Stingray use without a warrant violates Fourth Amendment

Today, the Washington DC Court of Appeals overturned a Superior Court conviction of a man who was located by police using a cell-site simulator, or Stingray, <i>CBS News</i> reports. The court ruled that the defendant's Fourth Amendment rights were violated when law enforcement tracked down the suspect …

Surveillance

How Pants Went From Banned to Required in the Roman Empire

Six hundred years in the history of trousers.<p>Go to a meeting with any male politician today and you’re almost certainly going to be standing in front …

iOS 11's Control Center doesn't let you turn off Wi-Fi or Bluetooth

The Control Center toggles don’t do what users may think they do<p>Apple’s new Control Center in iOS 11 is a lot more fully featured, with a customizable layout and a number of new added controls accessible with Force Touch. One aspect of it that may have, at least at first, appeared like a big plus …

Someone finally made an app to detect credit card skimmers at the gas pump

In less than 30 seconds a hacker can install a $10 piece of pre-built hardware – easily purchased online – into a gas pump. This device is called a skimmer and it’s designed to get your credit card number when you use it at the pump.<p>A clever developer came up with a somewhat simple approach to …

Identity Theft

Satya Nadella Rewrites Microsoft’s Code

Microsoft’s CEO has stopped infighting, restored morale, and created more than $250 billion in market value. All it took was focusing on what matters most.<p>Satya Nadella’s corner office, on the fifth floor of Building 34 at Microsoft’s Redmond, Washington, headquarters, features a can’t-miss 84-inch …

Do a 15 minute cybersecurity makeover to start the year

You had plenty of reminders last year that hackers are out in force, making your data vulnerable. What will be the equivalent of the Equifax breach this year?<p>Before we find out, there's are shortcuts to locking down your private data. Consider it a 15 minute cybersecurity tune-up for the new …

The Amazing Ways Coca Cola Uses Artificial Intelligence And Big Data To Drive Success

The Coca Cola Company is the world’s largest beverage company selling more than 500 brands of soft drink to customers in over 200 countries. Every single day the world consumes more that 1.9 billion servings of their drinks including brands like Coca Cola (including Diet and Zero) as well as Fanta, …

Artificial Intelligence

Amazon just made a huge change to its $12 billion cloud computing juggernaut

No longer would programmers have to buy, build, and maintain their own servers. Now, developers could pay Amazon by the hour to access exactly the amount of supercomputing power they needed. It totally changed the economics of building software, making it possible for a new breed of companies like …

Rackspace Grows Its Cloud Infrastructure Business by Acquiring Datapipe

The acquisition, largest in Rackspace’s 19-year history, brings new capabilities and will enable the company to better serve customers of all …

As NFV Displaces Dedicated Network Functions, Who is Managing Service Levels?

As NFV gains mainstream production status across carriers and service providers worldwide, important facts about the realities of a software-defined …

Scientists Link ‘Cat Parasite' to Common Human Neurological Disorders

A new study shows that <i>Toxoplasma gondii</i>—a brain parasite often transmitted to humans by cats—triggers various changes in the human brain which …

Investigators cite Tesla Autopilot limits in fatal crash

WASHINGTON (AP) — Design limitations of the Tesla Model S's Autopilot played a major role in the first known fatal crash of a highway vehicle …

Deception: A Convincing New Approach to Cyber Defense

How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers …

New Bluetooth vulnerability can hack a phone in 10 seconds

Security company Armis has found a collection of eight exploits, collectively called BlueBorne, that can allow an attacker access to your phone without touching it. The attack can allow access to computers and phones, as well as IoT devices.<p>“Armis believes many more vulnerabilities await discovery …

There's Blood In The Water In Silicon Valley

The bad new politics of big tech.

One of the states hit hardest by the opioid crisis shows us what’s wrong with how we’re fighting it

A study of addiction treatment programs in Ohio shows many of the problems with the current approach to the US opioid crisis.<p>The study, conducted by nonprofit Treatment Research Institute, looked at 25 drug courts in Ohio in 2016 to determine the effectiveness of giving medication-assisted …

Drug Addiction

The Quartz guide to artificial intelligence: What is it, why is it important, and should we be afraid?

What is artificial intelligence? Why is it important? Why is everyone talking about it all of a sudden? If you skim online headlines, you’ll likely read about how AI is powering Amazon and Google’s virtual assistants, or how it’s taking all the jobs (debatable), but not a good explanation of what …

Artificial Intelligence

Catching the hackers in the act

<b>Cyber-criminals start attacking servers newly set up online about an hour after they are switched on, suggests research.</b><p>The servers were part of an experiment the BBC asked a security company to carry out to judge the scale and calibre of cyber-attacks that firms face every day.<p>About 71 minutes …

That Instagram hack is shaping up to be way bigger than anyone thought

Turns out we all may be "high profile" in the eyes of Instagram.<p>A bug in the social media company's API reportedly allowed hackers to gain access to …

Facebook has mapped the population of 23 countries in incredible detail (updated)

In its research into the best way to provide the internet to the entire world, Facebook has mapped where all 7.5 billion people on the planet live. By combining government census data and satellite images along with some help from Facebook's image recognition neural network, the company can now …

Machine Perception

Dr Con Man: the rise and fall of a celebrity scientist who fooled almost everyone

Scientific pioneer, superstar surgeon, miracle worker – that’s how Paolo Macchiarini was known for several years. Dressed in a white lab coat or in surgical scrubs, with his broad, handsome face and easy charm, he certainly looked the part. And fooled almost everyone.<p>Macchiarini shot to prominence …

Nicolas Sarkozy

The Internet Of Things’ Massive Security Problem, Visualized

Earlier this year, the usernames and passwords for more than 8,000 internet of things devices were posted online so hackers could easily access them. The security breach was a perfect illustration of the IoT’s security problems: Of the 8,000+ username and password combinations, only 142 were …

GoT's Dinklage presents miserable, threatening world for Cisco

Commentary: A new Cisco ad has Tyrion Lanister explain how the company is fighting cyberthreats. It's all a little scary.<p><i>Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives.</i><p>You're probably worried about whose turn it is to die on "Game of Thrones" this …

Artificial intelligence cyber attacks are coming – but what does that mean?

The next major cyberattack could involve artificial intelligence systems. It could even happen soon: At a recent cybersecurity conference, 62 …