136 private links
Sensoria and Genesis Rehab Services will work together on products to monitor the daily activity of older adults, accelerate rehab and help with fall prevention.
Sensoria is a world leader in smart garment technologies. Genesis Rehab Services, a subsidiary of Genesis HealthCare, is a leading provider of physical therapy, occupational therapy, speech therapy, respiratory therapy and wellness services.
Sensoria will be using its digitally enhanced footwear to detect and predict fall scenarios. Genesis Rehab Services, on the other hand, will provide clinical validation of the data in rehab and activity monitoring.
If you were an Imgur user in 2014, you might want to consider changing your password. Yesterday, the photo-sharing site revealed that it learned of a security breach in 2014 that compromised the e-mail addresses and passwords of approximately 1.7 million users.
Computers are smart and, thanks to artificial neural networks, they are getting smarter. These networks, modelled after real neurological systems, allow computers to complete complex tasks such as image recognition. Until now, they have been impressively tough to fool. But one group of researchers claims to have found a way to reliably trick these networks into getting it wrong.
TLDR is what Linux man pages always should have been.
Wer mit verschnupfter Nase in die Apotheke geht, wird gefilmt: So läuft es derzeit in zwei österreichischen Apotheken, in denen der Pharmakonzern Bayer Austria testweise Gesichtsscanner einsetzt. Lässt ein Kunde sein Gesicht erfassen, zeigen Displays Werbung, die zu seinem Geschlecht und Alter passen.
Das ist krass: 12 der 13 getesteten Smartwatches oder Fitnessbänder geben deine intimsten Daten an große Firmen weiter. Und das kannst du nicht einmal unterbinden. Ansonsten bieten sie alle coole Technik
As misconfigured Amazon servers continue to leak sensitive data Australian Broadcasting Corporation (ABC) is the latest culprit of administrators not properly securing their cloud servers.
ICE officials have invited tech companies, including Microsoft, to develop algorithms that will track visa holders’ social media activity.
Texas Rangers have served Apple with a search warrant for data from deceased Sutherland Springs gunman Devin Patrick Kelley, who killed 26 people in a Texas church earlier this month.
Sarah Sims of Norfolk, West Virginia said school officials did nothing to stop her 9-year-old daughter from being bullied at school. So she put a digital audio recorder in her daughter's backpack to catch the bullying. The school found the recorder and police charged Sims with felony use of device to intercept oral communication and misdemeanor contributing to the delinquency of a minor. She faces five years in prison on the felony charge.
Anonymity and privacy researcher Sarah Jamie Lewis realized that a connected sex toy's "email a blowjob" feature had significant security vulnerabilities and has produced an entertaining and delightful Twitter thread explaining how she was able to both fingerprint electronic blowjob description files and disrupt them with code-injection attacks.
Fitness- und Wellness-Apps sind weitverbreitet. Doch was passiert, wenn man die Anbieter fragt, was sie speichern und an wen sie Daten weitergeben? Die Verbraucherschutzzentrale Nordrhein-Westfalen hat das bei zwölf Anbietern getestet. Nun hagelt es Abmahnungen sowie eine Klage gegen Apple.
Now that I’ve provided you with an introduction to Git and a brief overview of using Git with GitHub, it’s time to build on that knowledge by taking a closer look at one workflow often used when collaborating with Git. The “fork and branch” workflow is a common way of collaborating on open source projects using Git and GitHub. In this post, I’m going to walk through this workflow (as I understand it—I’m constantly learning), with a focus toward helping those that are new to this sort of thing.
In 2017, a flaw causing vulnerabilities in millions of encryption keys, including national Estonian electronic ID (eID) cards, was discovered. A month and a half after the discovery, the Estonian Police publicly announced the vulnerability, but stated that the eID cards “are completely secure”.
Our article on the problems with the Estonian eID card attracted some criticism and non-specific allegations of inaccuracies. We recognise the sensitivities of the Estonian authorities on this issue, but stand behind the article.
Österreichische Mitglieder der genannten Fraktionen stimmten loyal zur Fraktionslinie – also ÖVP, FPÖ und Neos für Netzsperren, Grüne dagegen. Die sozialdemokratischen Abgeordneten aus Österreich enthielten sich. Vor der Nationalratswahl hatten sich alle Parteien außer der ÖVP gegen Netzsperren ausgesprochen.
@sonstwer: Warum macht ihr das @neos_eu ?
@neos_eu: schwurbel
@stefankasberger: Kurz zusammen gefasst also: Konsument vor Bürger, right?
Fehlinformationen, Sexfallen, gezielte Rufschädigung: Die Methoden, mit denen der britische Geheimdienst die Kommunikation im Internet manipulieren will, sind nicht zimperlich. Auch Unverdächtige sind im Visier der Agenten.
Researchers working on browser fingerprinting found themselves distracted by a much more serious privacy breach: analytical scripts siphoning off masses of user interactions.
Wer eine Pornoseite öffnen will, bekommt stattdessen religiöse Gesänge oder motivierende Ansprachen von Politikern angezeigt. So soll das Verhalten der Nutzer geändert werden.
Russland beantwortet US-Sanktionen mit Auflagen gegen Voice of America und Radio Liberty. Die wegen angeblicher Spionage ebenfalls von Sanktionen bedrohte russische Anti-Viren-Firma Kaspersky dreht den Spieß um und blamiert die NSA.