An Elaborate Hack Shows How Much Damage IoT Bugs Can Do

The bulk of major corporate hackers follow time-tested strategies, like phishing emails that trick employees into giving up their credentials, or hackers exploiting a bug in a web portal. While effective, these strategies also open an attacker to early detecting. So increasingly, hackers have taken the scenic route–through the Internet of Things. Vulnerabilities in internet-connected […]

Continue reading

Can blockchain technology live up to the hype? Barclays analysts say no – MarketWatch

Reuters Can blockchain technology live up to the hype? Barclays analysts say no MarketWatch aDespite tremendous hype over possibilities for crypto technologies in money and financeaspecifically, blockchain and distributed ledger technologyawe see little likelihood of widespread adoption in any area in the near future, a wrote analysts at … Barclays targets technology with venture capital-style […]

Continue reading

Palantir: the’ special ops’ tech giant that wields as much real-world power as Google

Peter Thiels CI-Abacked, data-mining firm honed its crime predicting techniques against insurgents in Iraq. The same techniques are now being sold to police departments. Will they inflame already tense relations between the public and the police? In Minority Report, the 2002 movie adaptation of the Philip K Dick novel, Tom Cruise plays a police officer […]

Continue reading