Truths And Myths About Microchip Implants

Truths And Myths About Microchip Implants

Truths And Myths About Microchip Implants. A human microchip implant is typically an identifying integrated circuit device or radio-frequency identification (RFID) transponder encased in silicate glass and implanted in the body of a human being. This type of subdermal implant usually contains a unique ID number that can be linked to information contained in an external[…]

Read more
Cyberwarfare Makes Cold Wars Hotter

Cyberwarfare Makes Cold Wars Hotter

Cyberwarfare Makes Cold Wars Hotter. Cyberspace, a domain created not by nature but by human beings, has emerged to provide tremendous benefits, but also to present new risks. Recently, cyber security has become a national policy issue. Driven predominantly by national security concerns, democracies have formulated national cyber strategies. Cyberspace[…]

Read more
Algorithms Can Tell Lies

Algorithms Can Tell Lies

Algorithms Can Tell Lies. A former Wall Street quant sounds an alarm on the mathematical models that pervade modern life — and threaten to rip apart our social fabric. We live in the age of the algorithm. Increasingly, the decisions that affect our lives—where we go to school, whether we get[…]

Read more
Increase In Credit Card Fraud

Increase In Credit Card Fraud

Increase In Credit Card Fraud. Just released data from Radial’s leading eCommerce Fraud Technology Lab adds another alarming statistic for retailers to contend with when delivering a seamless customer experience. To date in May 2017, data shows a 200-percent increase in credit card testing, a tactic used by fraudsters to[…]

Read more
Dismantling A Nuclear Power Plant

Dismantling A Nuclear Power Plant

Dismantling A Nuclear Power Plant. Nuclear decommissioning is the process whereby a nuclear facility is dismantled to the point that it no longer requires measures for radiation protection. This fascinating article runs us through how an outdated nuclear power plant is decommissioned and taken apart piece by piece. Not an everyday job, but becoming[…]

Read more

Why Printers Add Secret Tracking Dots

Why Printers Add Secret Tracking Dots. The Electronic Frontier Foundation (EEF) is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. They work to ensure that rights[…]

Read more
A Guide To Online Privacy

A Guide To Online Privacy

A Guide To Online Privacy. Geoffrey Fowler writes for The Wall Street journal on the perennial issue of online privacy and provides us with some practical advice. Here is his introduction: ”You wouldn’t walk naked through Times Square. Stop being naked online. Your laptop and that smartphone grafted to your[…]

Read more
The Fight For Net Neutrality

The Fight For Net Neutrality

The Fight For Net Neutrality. On 18 May 2017, the Federal Communications Commission (FCC) will take a vote to abolish net neutrality. What is net neutrality? Net neutrality is the principle that Internet service providers and governments regulating the Internet should treat all data on the internet the same, not discriminating or charging differentially[…]

Read more
Tips For Better Passwords.

Tips For Better Passwords

Tips For Better Passwords. This article from Consumer Reports gives us some handles for crafting better passwords. If you are into social media and the internet, generating passwords for access to your various apps or programmes would be a familiar activity. However, generating a good password may be a bit[…]

Read more
Mapping Unchartered Territories

Mapping Unchartered Territories

Mapping Unchartered Territories. The word “mapping” has gone beyond its original cartographical reference point, as its mooring now are much broader than just limited to geographical data collection. This lengthy article describes pioneering surveys beyond geography into where diseases begin and how they eventually spread through the population and environment,[…]

Read more
secure connection II

Secure Connection II

Secure Connection II. I am glad to inform you that the problem regarding “an error alert to an insecure SSL Certificate” disrupting your access to my Blog, if you had been using an Android device earlier, has thankfully been resolved on Friday, 20 January 2017. You should now be able through[…]

Read more
secure connection II

Secure Connection

Secure Connection. If you had been accessing my blog on an Android device or via Microsoft Explorer, it is likely you will get a response warning you that your connection to my site is not private, followed by an explanation. Just ignore it, as it is actually a valid Comodo SSL (secure[…]

Read more
A New Tomb For Chernobyl.

A New Tomb For Chernobyl

A New Tomb For Chernobyl. The Chernobyl nuclear accident on 26 April 1986 destroyed the Chernobyl 4 reactor. One person was killed immediately and a second died in hospital soon after, as a result of injuries received. Another person was reported to have died at the time from a coronary thrombosis. Acute[…]

Read more
Securing the Digital City

Securing The Digital City

Securing The Digital City. While the IT systems of critical infrastructure providers face the same level of risk from cyber-attacks as do other enterprises in the private and public sectors, a cyber-attack on critical infrastructure can have much broader and deeper consequences for society and the economy. This puts added pressure on[…]

Read more
Algorithms Aren’t Biased, But the People Who Write Them May Be

Algorithms Aren’t Biased, But the People Who Write Them May Be

Algorithms Aren’t Biased, But the People Who Write Them May Be. In mathematics and computer science, an algorithm is a self-contained step-by-step set of operations that performs calculation, data processing, and automated reasoning tasks. With the advent of the computer age, most softwares and applications have algorithms inserted as part of its programme. Its neutrality is obviously compromised[…]

Read more
Cyber Attack

Cyber Attack

Cyber Attack. Yesterday, Twitter, Paypal, Spotify, Mashable, CNN, the New York Times, the Wall Street Journal, Yelp, and Amazon sites were hacked in the USA and Europe. Nearly 500,000 computer connected and other devices were infected with a Mirai botnet and used to initiate a distributed denial of service attack.[…]

Read more