136 private links
This conference is aimed at presenting the main findings of the ‘Study on B2B data sharing in Europe’ commissioned by the European Commission, DG CONNECT. Selected companies will showcase their experiences with regard to data sharing in B2B relations. To follow up and leverage on these findings, it will include a workshop to discuss the way forward in relation to fair principles to B2B data sharing.
Through the Hilton Honors app, guests in a Connected Room will be able to control the temperature, lighting, TV, and window coverings. It's a travel experience for guests "where the room knows them, and they know their room," according to Hilton.
However, in its brief for the appeal case, filed yesterday (PDF), the DoJ repeated its argument that Microsoft could comply with the warrant “by undertaking acts entirely within the United States”.
It also said that Microsoft “has never stated that it would be subject to liability under the laws of Ireland or the European Union for disclosing in the United States any communications stored at its Dublin datacenter”.
Of the many reasons why social media platforms should resist pressure to “voluntarily” censor their users, one stands out: history shows that they will do it badly, taking down valuable and lawful content in the name of enforcing community standards. The result: practical speech discrimination.
Facebook’s adult content policy is a textbook example. Since its early days, the platform has banned nearly all forms of nudity. But from day one, it has created reporting processes that conflate mere nudity with sexuality, and sexuality with pornography, and has applied different standards to feminine bodies than to masculine ones.
Interior ministers of Germany's states are discussing whether authorities should be able to bypass the security mechanisms in smart homes and connected cars -- but not, the federal interior ministry says, by installing backdoors in those mechanisms.
A vulnerability in the mobile apps of major banks could have allowed attackers to steal customers' credentials including usernames, passwords, and pin codes, according to researchers.
The flaw was found in apps by HSBC, NatWest, Co-op, Santander, and Allied Irish bank. The banks in question have now all updated their apps to protect against the flaw.
Nearly $64m in bitcoin has been stolen by hackers who broke into Slovenian-based bitcoin mining marketplace NiceHash.
The marketplace suspended operations on Thursday while it investigated the breach, saying it was working with law enforcement as “a matter of urgency” while urging users to change their passwords.
The hack was “a highly professional attack with sophisticated social engineering” that resulted in approximately 4,700 bitcoin being stolen, worth about $63.92m at current prices, said NiceHash head of marketing Andrej P Škraba.
The European Commission has warned Facebook, Google, YouTube, Twitter and other internet technology companies that they must do more to stem the spread of extremist content or face legislation.
Growing pressure from European governments has meant progress has been made by companies in significantly boosting their resources dedicated to help take down extremist content as quickly as possible.
But on Wednesday the EU security commissioner Julian King said: “We are not there yet. We are two years down the road of this journey: to reach our final destination we now need to speed up our work.”
Emotion analytics software can see right through your poker face. Its algorithms can analyze video and identify involuntary microexpressions that can be as fast as a twenty-fifth of a second and invisible to your eye. The technology can be used to assess job candidates. You're trying to present confidence, but this emotion recognition software is detecting uncertainty.
Microsoft hat aus Versehen einen privaten Schlüssel für seinen Clouddienst Dynamics 365 veröffentlicht - und schaffte es über Monate nicht, auf Hinweise zu reagieren. Zwischenzeitlich empfahl der Support sogar, eine Krisenreaktionsfirma aus der Ölindustrie anzurufen, um das Problem zu beseitigen.
It’s a urinal, with a small screen on top that companies can manage remotely to serve ads to customers. The Mr.Friendly urinals aren’t just dumb screens. No, no, they’re equipped with sensors to detect when you’re taking a leak, and only show you the ads then. Because it’s a smart urinal.
Apple’s had a bad couple weeks of software issues, and its latest problem is a HomeKit vulnerability that apparently let hackers take control of a person’s smart home gadgets. 9to5Mac broke news of the exploit and seems to have nudged Apple into patching the bug immediately — Apple was reportedly told of the issue in late October.
But make no mistake, the $250 Amazon Key isn’t just about stopping thieves. It’s the most aggressive effort I’ve seen from a tech giant to connect your home to the Internet in a way that puts itself right at the center.
Comparatively speaking, young people in the United States and England do not move much. Studies indicate that most children reach their activity peak at about age 7 and become more sedentary throughout adolescence. Many parents probably hope that shiny new technologies, such as Fitbits and other physical-activity monitors, might inspire our children to become more active.
But a recent study published in The American Journal of Health Education finds that the gadgets frequently have counterproductive impacts on young people’s attitudes about exercise and the capabilities of their own bodies.
"We can't be a Blockbuster government when serving a Netflix citizenry," said Treasury Board president Scott Brison, who was on hand for the announcement.
The kiosks ask travellers to scan their passports, and then take pictures of the travellers' faces. The machines use facial recognition technology to compare the photos. A human border officer is responsible for doing a final check of the machines' work.
The CBSA also says travellers can use a smartphone app called eDeclaration along with the white kiosks to get the fastest service.
Wish lists this year will have more connected devices than ever. How do you know if that gift comes with privacy included? We did the research to help you decide. Because Santa should be the only one watching you this holiday season.
I just learned of this dispicable Comcast practice today and I am livid. Comcast began injecting 400+ lines of JavaScript code in to pages I requested on the internet so that when the browser renders the web page, the JavaScript generates a pop up trying to up-sell me a new modem. When you call the number in the popup, they're quick to tell you that you need a new modem, which in my case is not true. I later verified with level-2 support that my modem is pefectly fine and I don't need to upgrade. As deceptive as that is however, my major complaint is that Comcast is intercepting web pages and then altering them by filling them with hundreds of lines of code. Even worse is that I've had to speak to 7 different supervisors from all areas of Comcast and they have either never heard of the process, or those who were aware of the practice don't know how to turn it off.
HP had a keylogger in the keyboard driver. The keylogger saved scan codes to a WPP trace. The logging was disabled by default but could be enabled by setting a registry value (UAC required
0
Security researchers this week revealed three vulnerabilities that allowed one of the most popular Bluetooth gun safes to be exploited and opened remotely.
Slowenischer Handelsplattform wurden rund 4.700 Bitcoins gestohlen – NiceHash rief Benutzer zu Änderung der Passwörter auf