Robots could push unemployment to 50% in 30 years, prof says
In 30 years, Vardi says, computers will be able to perform almost any job that humans can. One assumes this includes working as a professor of computational engineering. Vardi foresees unemployment as surpassing 50 percent by 2045.
"If we wait 25 years, we may find ourselves in a very difficult societal change. The Industrial Revolution brought about the Russian Revolution and the Chinese Revolution, with a human cost of about 100 million lives. I hope we are wiser this time," he told me.
Cuba returns to the US 'wrongly shipped' Hellfire missile
The whole affair has been embarrassing for the Americans, who have had to ask the Cubans if they could have their highly sensitive missile back, says the BBC's Will Grant in Havana.
US officials were worried that Cuba could share the advanced technology inside the missile with countries such as North Korea, China or Russia, sources close to the investigation told the Wall Street Journal.
IoT Could Be Used by Spies, U.S. Intelligence Chief Says
James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries.
Specifically, the security issues around these various devices—from electric grids to connected and autonomous cars to household appliance—pose a threat to data privacy, data integrity and continuity of services, Clapper wrote in his report to the committee. In addition, they could become pathways for foreign countries to gain access to information.
Twitter shares drop on faltering user growth
Twitter reported a net loss of $90m (£62m) for the last three months of 2015 versus a loss of $125m a year ago.
This is the first quarter in Twitter's history that the number of monthly active users has not grown.
Investors had been anticipating the announcement of major changes to Twitter's product offerings to increase the user base.
Gmail to warn you if your friends aren’t using secure e-mail
Google has confirmed a number of changes to Gmail with the arrival of two new features that will let you know if the people you’re corresponding with aren’t hip with TLS encryption.
In 2014, the company announced that its search engine would be using HTTPS as a ranking signal. A year after, it revealed it would be adjusting its indexing system to look for more HTTPS websites.
We're going to use your toothbrush to snoop on you, says US spy boss
"Smart devices incorporated into the electric grid ... can threaten data privacy, data integrity, or continuity of services," he said. "In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials."
The data from IoT products can potentially be hugely valuable. Many include microphones and motion sensors, for example, such as new smart TVs, kids' toys and voice-controlled products like Amazon's Echo.
Was it a meteorite? Tests will determine what killed Indian man
Indian scientists will examine remains from an object that fell from the sky Saturday, causing a large explosion which killed a man, to determine if it is a meteorite, police say.
Senthil Kumari said it was yet to be confirmed whether the object that caused the blast was a meteorite, as opposed to falling space junk or some other form of debris.
Avast SafeZone Browser Lets Attackers Access Your Filesystem
While Chromodo was caught disabling a crucial security feature called Same Origin Policy (SOP), Avast's Chromium fork is much worse, bringing a series of problems, one of which allows attackers to list and read files from your computer after you click a simple malicious link.
An attacker wouldn't even need an info-stealing malware strain if they knew their target had Avast's SafeZone installed, a browser that was dumping everything out in the open.
"Additionally, you can send arbitrary *authenticated* HTTP requests, and read the responses," Mr. Ormandy also explained. "This allows an attacker to read cookies, email, interact with online banking and so on."
‘Error 53’ fury mounts as Apple software update threatens to kill your iPhone 6
Thousands of iPhone 6 users claim they have been left holding almost worthless phones because Apple’s latest operating system permanently disables the handset if it detects that a repair has been carried out by a non-Apple technician.
After installation a growing number of people have watched in horror as their phone, which may well have cost them £500-plus, is rendered useless. Any photos or other data held on the handset is lost – and irretrievable.
Could Apple’s move, which appears to be designed to squeeze out independent repairers, contravene competition rules? Car manufacturers, for example, are not allowed to insist that buyers only get their car serviced by them.
Mysterious spike in WordPress hacks silently delivers ransomware to visitors
It's still not clear how, but a disproportionately large number of websites that run on the WordPress content management system are being hacked to deliver crypto ransomware and other malicious software to unwitting end users.
People running WordPress sites should take time to make sure their servers are fully patched and locked down with a strong password and two-factor authentication.