How Machine Learning Can Speed The Spread Of Solar-Powered Homes
A California startup is using big data to predict who is literally ready to go off the grid—so it can convince them to buy solar panels.For all its promise of delivering a bold future, the green energy...
View ArticlePinterest Is Using Machine Learning To Help You Find What You'll Pin Next
The social-sharing platform uses cutting-edge techniques to tailor recommendations to each user and boost engagement.With 100 million users active on its platform every month, Pinterest is increasingly...
View ArticleMIT Scientists Learn To Track Emotions Using Wireless Signals
The scientists can remotely read emotions by scanning heart and breathing rates, but what does it mean for privacy?Researchers at the Massachusetts Institute of Technology say they've developed the...
View ArticleThe Anti-Drone Arms Race Is Taking Off
On the margins of technology and the law, companies and governments are hacking unmanned vehicles and putting up their drone shields.Last week, the director of the Federal Aviation Administration...
View ArticleHow This Cloud-Based Security Tool Protected The Super Bowl From Hackers
ProtectWise says handling security analytics in the cloud lets it store more data and move faster than its competitors.When football fans checked their email and uploaded photos from Super Bowl 50 this...
View ArticleYahoo Hack, Among Largest Ever, Could Be Work of China, Experts Say
It's still unclear when Yahoo learned of the breach or what it will mean for its planned $4.8 billion asset sale to Verizon.A day after Yahoo announced that login credentials for at least 500 million...
View ArticleHow IBM's Bluemix Garages Woo Enterprises And Startups To The Big Blue Cloud
The locations let IBM teach both startups and big companies how to harness its cloud services.At one time, a tech industry truism held that "nobody ever got fired for buying IBM." The company was...
View ArticleEven In The Tech Industry, Sticky Tape Remains A Preferred Security Measure
Preventing hackers from spying through digital webcams and microphones often involves surprisingly analog solutions.Although they presumably have access to cutting-edge security tools and first-rate...
View ArticleThe Feds Want To Stop Election Hackers, But States And Voters Are Wary
Cyber threats to U.S. elections are real—and so is distrust in the federal government.After hackers said to be linked to Russia stole data from voter registration systems in Arizona and Illinois...
View ArticleTwitter Met With Senate Staffers To Discuss Concerns Over Russian Propaganda
Among the concerns was that Russia could be using social media to spread misinformation designed to sway the U.S. presidential election.Representatives from Twitter have met with Senate staffers to...
View ArticleAs Airlines Digitize, They Are Confronted With Increased Cybersecurity Risks
As aviation systems increasingly resemble standard computer networks, airlines are learning to deal with familiar cybersecurity risks.Since the start of last year, major airlines including United,...
View ArticleOld-Fashioned Stings Nab Weapons Buyers As Illicit Markets Move Online
Encryption on dark websites is no match for a tried-and-true law enforcement technique: impersonating vendors of illegal merchandise.According to prosecutors, a Houston man arrested last month on...
View ArticleTech Support Scams Are Getting More Sophisticated
Scammers selling bogus tech support services have moved from cold calls to targeted pop-ups and malware, according to security researchers.For years, scammers have phoned unsophisticated computer users...
View ArticleAfter Years Of Warnings, Internet Of Things Devices To Blame For Big Internet...
Hundreds of thousands of cameras, routers, and DVRs have been hijacked by malware for use in massive denial of service attacks.On Friday, a series of massive distributed denial of service attacks...
View ArticleWhy Verizon's Due Diligence May Not Have Caught Yahoo's Massive Security Breach
Cyber due diligence typically looks at overall policies and broad risk rather than scouring networks from top to bottom, experts say.After Yahoo announced its users had been the victims of one of the...
View ArticleIBM Will Learn How You Interact With Your Bank Site To Detect Fraud
IBM is betting that automatically learning how you move the mouse will help detect unauthorized logins.Traditionally, banking websites have relied primarily on passwords and PIN codes to make sure...
View ArticleNASA Is Harnessing Graph Databases To Organize Lessons Learned From Past...
The space agency has a new tool to discover unexpected patterns in past projects.NASA famously maintains a "lessons learned" database containing valuable information from its past programs and...
View ArticleAmid Security Skills Shortage, Intel's McAfee Moves Toward Data Sharing And...
The company is adding machine learning, automation, and interoperability features to ease the load on overburdened security engineers.As hacking attacks become more prevalent and the cybersecurity...
View ArticleThis Simulation Of Chess Champion Magnus Carlsen Is Ready To Checkmate You
A smartphone app called Play Magnus mimics Carlsen's playing style at different stages in his career, beginning at age 5.As world chess champion Magnus Carlsen defends his title against Russian...
View ArticleA New Way To Pay To Get Hacked: Battalions Of Freelance Hackers
Synack, whose clients include the federal government, limits hack attempts to prescreened researchers working through logged connections.Bug bounty programs have become an increasingly common tool in...
View Article