Preston Hathaway

943 Added | 12 Magazines | 6 Likes | 4 Following | 298 Followers | @prestonhathaway | Keep up with Preston Hathaway on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Preston Hathaway”

How to Refresh Your Brain In a Matter of Seconds When You're Stressed

Experiencing a massive brain shutdown? Try these 3 ways to restore your higher-level thinking.<p>Your rational brain can process about six bits of data at once.<p>For example, let's say you're in a meeting with someone. You could be processing:<p>what happened in your last meeting with her;<br>• the concerns that …

The Brain

Israel’s Strategy Shift Bears Fruit

Israel<p>Israel’s Strategy Shift Bears Fruit<p>Evelyn Gordon / July 22, 2016<p>A<p>Wednesday’s announcement that Guinea is resuming ties with Israel almost half …

Gun Control

Geohot will discuss the hacking hardware and the auto industry’s self-driving future at Disrupt SF

When he was seventeen, George “geohot” Hotz became the first person to jailbreak an iPhone, back when Apple really didn’t take too kindly to such things. Three years later, he moved his unlocking efforts over to the PlayStation 3. Again, Sony wasn’t feeling it.<p>The young hacker has since joined …

Disrupt NY

Chatbooks: Capturing Your Life in a Gorgeous Photo Book

Roughly 15 years ago, I was rummaging through a pile of photo scrapbooks. None were the same size, some had photos sticking out of the top, and they frankly looked unsightly on our family room bookshelf. That’s when I came up with this ahead-of-its-time idea: Someone should start a printing service …

Google Play

An Israeli startup is using the ancient art of military deception to trap hackers everywhere

That's because the firm's technology — which tracks a hacker should they make one wrong move — is steeped in the idea that deception on the battlefield can be used in the digital space.<p>"Looking at this from [the perspective of a military], this particular solution scares us," Gadi Evron, the CEO of …

Cybersecurity

13 Sneaky Ways to Keep Your Kids Learning This Summer (Straight from a Homeschooling Mom)

Learn the stealthy ways a homeschooling mom keeps her kids "accidentally" learning all summer long.<p>According to the National Summer Learning Association, if kids take a break from learning all summer, they not only miss out on new information and skills, they can lose up to three months' worth of …

10 things in tech you need to know today

<b>1. Facebook made a huge U-turn and says it doesn't use location data to suggest friends after all.</b> The social media platform says it is a case of crossed wires.<p><b>2. Google wants permission to track you more so that it can show you better ads.</b> Over the next few weeks, all Google users will see a …

Mark Zuckerberg

Appealing Logo and Simple Web Design Your Flight of Steps to Success

A simple web design does sounds odd, every web designer and web design agency tends to bring in something creatively awesome and new. But have you …

Snowden denounces Russia's 'unjustifiable' surveillance bill

Edward Snowden has condemned a “dangerous” package of anti-terrorism legislation passed by Russia’s parliament last week, in a rare criticism of the authorities in his host country.<p>Mr Snowden, who fled to Russia in 2013 after exposing an surveillance programme run by the US National Security Agency …

7 Ways the Cops Will Bust You on the Dark Web

The dark web isn’t as dark as some criminals would like.<p>Because users are protected by a veil of technological anonymity, the dark web is often portrayed as a space beyond the reach of law enforcement, where criminals can run amok without fear of prosecution.<p>That couldn't be more wrong.<p>In fact, …

Dark Web

China's Cyber Spying on the U.S. Has Drastically Changed

Last year United States President Barack Obama and Chinese President Xi Jinping entered into a dubious agreement during Xi’s first state visit: No …

Cybersecurity

Hackers are using this nasty text-message trick to break into people's accounts

It requires a second level of proof of who you are — typically a code sent to your phone — before you can log in. This prevents anyone from gaining unauthorised access to your account, even if they manage to get hold of your password.<p>However, hackers and hijackers are managing to find ways around …

Authentication

The lack of women in tech is more than a pipeline problem

Swati Mylavarapu Contributor<p>Swati Mylavarapu, a partner at at venture capital firm Kleiner Perkins Caufield & Byers, focuses on venture-stage companies developing digital health and consumer technologies and businesses.<p>More posts by this contributor:<p>Nest Co-Founder Matt Rogers On The Secrets To …

Computer Science

Getting Started With Raspberry Pi – Installing And Booting An Operating System (Part – 3)

<i>In the third article of the Getting Started With Raspberry Pi series, Ill tell you how to install a basic operating system on your Raspberry Pi and</i> …

sheet pan chicken tikka

In the game of weeknight cooking — which I feel, at best, is rigged and not in our favor especially if you (or you and your partner) are out working …

Curries

This text line is helping teens talk about mental health without saying a word

"He won't stop raping me. He told me not to tell anyone."<p>In August 2011, teen-focused social change organization DoSomething.org received this …

Bumblebees' Little Hairs Can Sense Flowers' Electric Fields

Flowers generate weak electric fields, and a new study shows that bumblebees can actually sense those electric fields using the tiny hairs on their fuzzy little bodies.<p>"The bumblebees can feel that hair bend and use that feeling to tell the difference between flowers," says Gregory Sutton, a Royal …

Research

North Korea-linked 'Lazarus' hackers hit a fourth bank in Philippines

Hackers targeting the international financial system have claimed a fourth victim: a bank in the Philippines.<p>It's now clear the global banking system has been under sustained attack from a sophisticated group -- dubbed "Lazarus" -- that has been linked to North Korea, according to a report from …

Symantec

Swift network bank thefts 'linked' to Sony Pictures hack

Unique code signatures shared between malware used in multiple bank attacks suggest involvement of hacking group named ‘Lazarus’, Symantec says<p>Security researchers Symantec have found clues in the malware used as part of an attack on banks via the international financial messaging network Swift, …

Cybersecurity

Ultra-cheap Raspberry Pi 3 may get Android support

There's an entry in Google's Android Open Source Project page for the device.<p>There may soon be another reason to love the uber-affordable and portable Raspberry Pi 3.<p>An entry for Raspberry Pi 3, a $35, small and simple computer, appeared on Google's Android Open Source Project page, according to …

Android News

What Landmine-Detecting Plants Can Teach Us About Design

Some jobs are better left to rats!<p>Imagine a plant that changes color in the presence of a landmine and alerts unwary people to a danger beneath their feet. It's an idea that has inspired a number of groups, including a Danish company, which developed arabidopsis plants that turn red in the presence …

Swiss CERT publishes reveals details of defence contractor hack

Swiss defence contractor RUAG and the country's GovCERT have revealed the details of a 2014 network breach in which attackers got access to a …

Cybersecurity
Political Science

It's Not ‘Malware’ When We Have a Warrant, FBI Says

The government is trying to downplay the hacking code it used to identify thousands of anonymous Tor users under a single warrant.<p>The FBI has been in the hacking business for a long time, famously using malware to log suspects' keystrokes as early as the 1990s. But in the high-profile case …

Privacy

3 creative ways to monetize your Instagram following

Thanks to the visual social network’s growing active user base, major ROI on direct response advertising, an average annual follower growth rate among brands of 100 percent and new advertising formats and capabilities being rolled out regularly, companies are investing heavily in Instagram-based …

How Blockchain Technology Can Reinvent The Power Grid

A power pole collapses at 8 p.m. on a hot night in the remote outback of Australia. This is a problem for William and Olivia Munroe, who raise sheep …

Internet of Things
Big Data

Another Day, Another Hack: 117 Million LinkedIn Emails And Passwords

Four years later, the 2012 LinkedIn breach just got way worse.<p><i>Quite literally, every day someone gets hacked. Whether that's a telecommunications company having its customer data stolen, or another chain of businesses being ripped for all the credit cards it processes, today one hack just seems to</i> …

Security