Mervin Pearce

353 Flips | 2 Magazines | 14 Likes | 1 Following | 109 Followers | @mervinpearce | Keep up with Mervin Pearce on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Mervin Pearce”

How to Tell If Someone is Lying, According to Behavioral Experts

Nonverbal clues that someone isn’t telling the truth.<p>If you claim that you never lie, well, you’re a liar.<p>Those little white lies are slipping out more often than you realize: One study found that Americans, on average, tell about 11 lies per week. Other research shows that number is on the …

Psychology

It's shockingly easy for hackers to remotely scan and clone your work security badge

You're riding the subway to work, or taking a smoke break outside the office, or simply strolling down the street. Someone with a backpack is …

Google is closer than ever to a quantum computing breakthrough

Its 20-qubit processor is currently undergoing tests, and the company appears to be on schedule to have its working 49-qubit chip ready by the end of 2017 as promised. Until it began trialing the 20-qubit chip, Google's most powerful quantum chip was the 9-qubit effort from 2015.<p>Traditional …

Cyber Attack At Honda Stops Production After WannaCry Worm Strikes

The WannaCry worm is still alive. Honda said this week that it was forced to halt production for one day at its Sayama plant near Tokyo after finding the WannaCry ransomware in its computer network.<p>This virus is the same one that infected over one million machines worldwide after taking advantage …

Cybersecurity

Why 'DIY Deep & Dark Web Intelligence' is a Bad Idea

<b>Trying to Gather Threat Intelligence From the Deep & Dark Web Creates a Substantial Risk for Organizations</b><p>The Deep & Dark Web (DDW) remains the key …

Intel patched a nine-year-old vulnerability that allowed remote control of enterprise PCs

Silicon manufacturing giant Intel has come under fire after it’s emerged that the company had sold workstation and server chips with a flaw that could see a remote attacker gain absolute control over the machine.<p>The bug is found in Intel Active Management Technology (AMT), Intel Standard …

Beware This New Gmail Scam That Is Tricking Even Tech-Savvy Users

Here is what you need to know in order to stay safe from a new, sophisticated phishing attack.<p>Hackers have launched a new phishing attack that is tricking even tech-savvy users. Here is what you need to know in order to protect yourself.<p>The attack works like this: Hackers who have breached …

Identity Theft

Massive cyber-attack grinds Liberia's internet to a halt

The attack was a distributed denial of service, in which a network of infected computers is directed to bombard its target with traffic and overload its servers<p>The entire internet infrastructure of the African nation of Liberia has been brought to a grinding halt after it was targeted by hackers …

Cyber-attacks

CIA reportedly plans to launch a cyberattack against Russia

The United States is preparing to launch an unprecedented cyber attack against Russia, according to <i>NBC News</i>. Sources told the publication that the White House asked the CIA to present it with several "clandestine" cyber operation tactics that the administration can choose from. The cyber strike's …

Connascence: How to Measure Coupling with Nick Hodges (Webinar Replay)

Why Cyber Attacks Remain A Challenge For U.S.

Here’s an alarming assessment: The U.S. government isn’t very good at protecting federal agencies from cyber attacks.<p>Senior Federal Government and industry leaders admit that not enough is being done to keep sensitive information safe from hackers and other malicious intrusions. Cyber attacks on …

Nation

PETALING JAYA: On a regular business day in June, boxes of what appeared to be anti­virus software were delivered to two branches of a remittance …

Remotely accessing an IP address inside a target computer is a search

Last week, I wrote a post on the Playpen warrant currently being litigated in federal courts around the country. My post included a section, “Retrieving IP Addresses is Clearly a Search,” that said the following:<p>A significant amount of media attention about the Playpen cases has focused on a …

Man Arrested For Allegedly Stealing Classified Documents From NSA Left Trail Of Questions

Who was Hal Martin? “You could say he liked to show off what he knew.”<p>SAN FRANCISCO — How did Harold Martin go from being an “intense but sweet man” who friends and colleagues describe as deeply, almost obsessively focused on his work, to being dragged, stricken and pale, from his house in Glen …

German Regulators Ban Facebook From Collecting WhatsApp Data

Earlier this year, WhatsApp betrayed its longstanding commitment to privacy when it announced that it would share user data with its parent company …

6 Illusions Execs Have About Big Data

Big data has become a buzzword so prevalent that it's practically meaningless.<p>8 min read<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>A decade ago, I thought I understood big data. I had worked in information technology for more than a decade and had run a department that handled …

Big Data

Hacker claims to be selling stolen NSA spy tools

The NSA develops high-powered hacking tools. Now a hacker claims to be selling a stolen batch of them.<p>On Saturday, a load of computer code -- whose purpose is to break into other computers -- was leaked to the public by an anonymous entity called "The Shadow Brokers."<p>The same mysterious entity also …

New York University

Black Hat USA 2016

Arsenal<p>presentation<p>source<p>.NET Security Guard is a code analyzer using the brand new Roslyn API, a framework built to develop analyzers, refactorings …

5 Recent Phishing Lures That Could Snag You

A recent study found that 70% of teens text and drive, largely due to FOMO (fear of missing out). These kids are ripe for phishing. But so are many of us. The distractions of life are a phishing campaign's stock in trade. And while getting got by cybercrime will never be entirely avoidable, …

Microsoft announces professional degree program to fill the skills gap

Microsoft wants more data scientists in the job market. But some young people need to acquire their knowledge starting completely anew, while mid-career professionals need to build on their previous experience.<p>To plug the skills gap for both categories, Microsoft launched a series of classes in …

Online Education

New iPhone 7 Leak Will Anger Everyone

Apple is criticised for many things, but design is rarely one of them. At least until the iPhone 7…<p>In recent months a series of leaks have revealed Apple’s new iPhone will look almost identical to the iPhone 6 and iPhone 6S, but that isn’t the big problem. What the iPhone 7 surprisingly does <i>worse</i> …

The Very Strange -- And Fascinating -- Ideas Behind IBM's Quantum Computer

In 1952, Remington Rand’s UNIVAC computer debuted on CBS to forecast the 1952 election as early results came in. By 8:30, the “electronic brain” was predicting a landslide, with Eisenhower taking 438 electoral votes to Stevenson’s 93. The CBS brass scoffed at the unlikely result, but by the end of …

Google is working to safeguard Chrome from quantum computers

Using software called the New Hope algorithm<p>Google is working on safeguarding Chrome against the potential threat of quantum computers, the company announced today. It's doing so by implementingpost-quantum cryptography in an experimental version of the browser. While there exist hardware defenses …

The Facebook Messenger bug highlights the importance of security

A team of security researchers from Check Point has exposed a vulnerability on the Messenger for Android app, according to a note posted Tuesday on Facebook's blog.<p>The bug, originally discovered in May, gave hackers the ability to spread malware and modify or remove parts of conversations between …

The gaming industry can become the next big target of cybercrime

Ben Dickson Contributor<p>Ben Dickson is a software engineer and the founder of TechTalks.<p>More posts by this contributor:<p>Unlocking the potential of eye tracking technology<br>• Can you trust crypto-token crowdfunding?<p>Video-game-related crime is almost as old as the industry itself. But while illegal copies …

Yet Another 'Free Mercedes Benz' Scam Hitting Facebook - Hoax-Slayer

<b>Outline:</b><br>Facebook Page calling itself ‘Mercedes Benz 2016’ claims that you can get a chance to win a Mercedes Benz by liking, sharing, commenting, and …

Stop Facebook's targeted ads from stalking you around the Internet

Facebook is now using your Facebook ad preferences -- your information, interests and browsing history -- to show you targeted ads both on and off of Facebook.<p>And for those of you patting yourself on the back for staying off Facebook, not so fast -- Facebook is also tracking you (through your …

Internet

5 Cloud, Big Data, and Networking Platforms to Kickstart Your Open Source Career

A decade ago, Red Hat CEO Jim Whitehurst predicted that open source tools and platforms would become pervasive in IT. Fast-forward to today, and that …

Big Data

As IoT and big data increase cyber risks, industry on the defensive

The time isn’t far away when everything in our lives, from furniture to coffee pots, will have the ability to be “smart.” Various reports estimate …