Robots could push unemployment to 50% in 30 years, prof says

Found on CNet News on Sunday, 14 February 2016
Browse Future

In 30 years, Vardi says, computers will be able to perform almost any job that humans can. One assumes this includes working as a professor of computational engineering. Vardi foresees unemployment as surpassing 50 percent by 2045.

"If we wait 25 years, we may find ourselves in a very difficult societal change. The Industrial Revolution brought about the Russian Revolution and the Chinese Revolution, with a human cost of about 100 million lives. I hope we are wiser this time," he told me.

That will end up in uprisings, unless the unemployed masses receive enough unemployment benefits to keep them calm; but even then it has a dangerous potential because with too much free time, some people might get the wrong ideas. Panem et circenses does not work in the long run.

Cuba returns to the US 'wrongly shipped' Hellfire missile

Found on BBC News on Saturday, 13 February 2016
Browse Various

The whole affair has been embarrassing for the Americans, who have had to ask the Cubans if they could have their highly sensitive missile back, says the BBC's Will Grant in Havana.

US officials were worried that Cuba could share the advanced technology inside the missile with countries such as North Korea, China or Russia, sources close to the investigation told the Wall Street Journal.

So they can do a surgical strike, but fail to deliver the missle to the correct country?

IoT Could Be Used by Spies, U.S. Intelligence Chief Says

Found on eWEEK on Friday, 12 February 2016
Browse Technology

James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries.

Specifically, the security issues around these various devices—from electric grids to connected and autonomous cars to household appliance—pose a threat to data privacy, data integrity and continuity of services, Clapper wrote in his report to the committee. In addition, they could become pathways for foreign countries to gain access to information.

Of course only foreign countries would use IoT devices to spy on you.

Twitter shares drop on faltering user growth

Found on BBC News on Thursday, 11 February 2016
Browse Internet

Twitter reported a net loss of $90m (£62m) for the last three months of 2015 versus a loss of $125m a year ago.

This is the first quarter in Twitter's history that the number of monthly active users has not grown.

Investors had been anticipating the announcement of major changes to Twitter's product offerings to increase the user base.

Nothing of value was lost. Investors do not care about the product and only take a look at the share values. If you make bold claims, investors will bury you under money; just tell them that the growth of your product will be unlimited.

Gmail to warn you if your friends aren’t using secure e-mail

Found on Ars Technica on Wednesday, 10 February 2016
Browse Internet

Google has confirmed a number of changes to Gmail with the arrival of two new features that will let you know if the people you’re corresponding with aren’t hip with TLS encryption.

In 2014, the company announced that its search engine would be using HTTPS as a ranking signal. A year after, it revealed it would be adjusting its indexing system to look for more HTTPS websites.

Of course, this does not enhance your privacy in any way, because the TLS encryption only scrambles the transmission itself, but not the actual content, so Google can still analyze your email for advertising. If you really want to be secure, use end-to-end encryption, like PGP/GnuPG or S/MIME.

We're going to use your toothbrush to snoop on you, says US spy boss

Found on The Register on Tuesday, 09 February 2016
Browse Technology

"Smart devices incorporated into the electric grid ... can threaten data privacy, data integrity, or continuity of services," he said. "In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials."

The data from IoT products can potentially be hugely valuable. Many include microphones and motion sensors, for example, such as new smart TVs, kids' toys and voice-controlled products like Amazon's Echo.

Still users are running towards IoT devices like moths to the flame. As usual, it will need a couple of really big scandals to change that mindset.

Was it a meteorite? Tests will determine what killed Indian man

Found on CNN News on Monday, 08 February 2016
Browse Astronomy

Indian scientists will examine remains from an object that fell from the sky Saturday, causing a large explosion which killed a man, to determine if it is a meteorite, police say.

Senthil Kumari said it was yet to be confirmed whether the object that caused the blast was a meteorite, as opposed to falling space junk or some other form of debris.

Coincidally, North Korea yesterday launched their newest rocket into space.

Avast SafeZone Browser Lets Attackers Access Your Filesystem

Found on Softpedia on Sunday, 07 February 2016
Browse Software

While Chromodo was caught disabling a crucial security feature called Same Origin Policy (SOP), Avast's Chromium fork is much worse, bringing a series of problems, one of which allows attackers to list and read files from your computer after you click a simple malicious link.

An attacker wouldn't even need an info-stealing malware strain if they knew their target had Avast's SafeZone installed, a browser that was dumping everything out in the open.

"Additionally, you can send arbitrary *authenticated* HTTP requests, and read the responses," Mr. Ormandy also explained. "This allows an attacker to read cookies, email, interact with online banking and so on."

It makes you wonder what is worse: the malware itself, or the products which claim to protect you.

‘Error 53’ fury mounts as Apple software update threatens to kill your iPhone 6

Found on The Guardian on Saturday, 06 February 2016
Browse Hardware

Thousands of iPhone 6 users claim they have been left holding almost worthless phones because Apple’s latest operating system permanently disables the handset if it detects that a repair has been carried out by a non-Apple technician.

After installation a growing number of people have watched in horror as their phone, which may well have cost them £500-plus, is rendered useless. Any photos or other data held on the handset is lost – and irretrievable.

Could Apple’s move, which appears to be designed to squeeze out independent repairers, contravene competition rules? Car manufacturers, for example, are not allowed to insist that buyers only get their car serviced by them.

Investors want more share value, and you cannot have that when your sheep go to another shepherd; or, in Apple terms, you shoot the sheep who commit such an treacherous act.

Mysterious spike in WordPress hacks silently delivers ransomware to visitors

Found on Ars Technica on Friday, 05 February 2016
Browse Internet

It's still not clear how, but a disproportionately large number of websites that run on the WordPress content management system are being hacked to deliver crypto ransomware and other malicious software to unwitting end users.

People running WordPress sites should take time to make sure their servers are fully patched and locked down with a strong password and two-factor authentication.

How? The problem is that they are running Wordpress. It's a big attack vector and home to lots of bugs and holes.