The American intelligence service – NSA – infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.
This is Game 1 of the 1997 rematch Kasparov vs Deep Blue. IBM’s Man vs. Machine event was held in May of 1997 in New York City, New York. This rematch between World Chess Champion Garry Kasparov and IBM supercomputer Deep Blue has been called “the most spectacular chess event in history”.
Torvalds was also asked if he had ever been approached by the U.S. government to insert a backdoor into Linux. Torvalds responded “no” while nodding his head “yes,” as the audience broke into spontaneous laughter.
Maintainers of Linux still haven’t delivered promised autopsy of serious breach.
More than two years after unknown hackers gained unfettered access over multiple computers used to maintain and distribute the Linux operating system kernel, officials still haven’t released a promised autopsy about what happened.
The compromise, which began no later than August 12, 2011, wasn’t detected for at least 16 days, a public e-mail and interviews immediately following the intrusion revealed. During that time, attackers were able to monitor the activities of anyone using the kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The self-injecting rootkit known as Phalanx had access to a wealth of sensitive data, possibly including private keys used to sign and decrypt e-mails and remotely log in to servers. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers.
A revolutionary new computer based on the apparent chaos of nature can reprogram itself if it finds a fault
OUT of chaos, comes order. A computer that mimics the apparent randomness found in nature can instantly recover from crashes by repairing corrupted data.
Dubbed a “systemic” computer, the self-repairing machine now operating at University College London (UCL) could keep mission-critical systems working. For instance, it could allow drones to reprogram themselves to cope with combat damage, or help create more realistic models of the human brain.
Everyday computers are ill suited to modelling natural processes such as how neurons work or how bees swarm. This is because they plod along sequentially, executing one instruction at a time. “Nature isn’t like that,” says UCL computer scientist Peter Bentley. “Its processes are distributed, decentralised and probabilistic. And they are fault tolerant, able to heal themselves. A computer should be able to do that.”
Genetic system performs logic operations and stores data in DNA.
Synthetic biologists have developed DNA modules that perform logic operations in living cells. These ‘genetic circuits’ could be used to track key moments in a cell’s life or, at the flick of a chemical switch, change a cell’s fate, the researchers say. Their results are described this week in Nature Biotechnology1.
Synthetic biology seeks to bring concepts from electronic engineering to cell biology, treating gene functions as components in a circuit. To that end, researchers at the Massachusetts Institute of Technology (MIT) in Cambridge have devised a set of simple genetic modules that respond to inputs much like the Boolean logic gates used in computers.
What happens if you give a thousand Motorola Zoom tablet PCs to Ethiopian kids who have never even seen a printed word? Within five months, they’ll start teaching themselves English while circumventing the security on your OS to customize settings and activate disabled hardware. Whoa.
The One Laptop Per Child project started as a way of delivering technology and resources to schools in countries with little or no education infrastructure, using inexpensive computers to improve traditional curricula. What the OLPC Project has realized over the last five or six years, though, is that teaching kids stuff is really not that valuable. Yes, knowing all your state capitols how to spell “neighborhood” properly and whatnot isn’t a bad thing, but memorizing facts and procedures isn’t going to inspire kids to go out and learn by teaching themselves, which is the key to a good education. Instead, OLPC is trying to figure out a way to teach kids to learn, which is what this experiment is all about.
Police have been unable to recover data from gunman Adam Lanza’s computer after the 20-year-old deliberately sabotaged the machine’s hard-drive, investigators have said.
Forensic experts revealed the software had been smashed so extensively that attempts to retrieve potentially crucial evidence such as emails had failed.
A joint effort to piece together the remains of the hard-drive, reported to have been damaged with a screwdriver or hammer, was undertaken by both Connecticut State police and the Federal Bureau of Investigation.