Google's plan is to turn off Flash and use HTML5 for all sites. Where HTML5 isn't supported, Chrome will prompt users and ask them if they want to run Flash to view multimedia content. The user's option would be remembered for subsequent visits, but to avoid overprompting, Chrome 55 will use a system called Site Engagement (chrome://site-engagement).
Failing to prioritize skills like empathy, communication, and collaboration and the people who have them (regardless of their gender) and focusing on "hard skills" (technical expertise) "limits our conceptions of security solutions and increases risks to our systems and users."
The problem goes beyond phishing attacks and social engineering, too. “Studies have shown that projects that embrace diversity are more successful. It’s a simple truth that people with different life backgrounds and life experiences bring unique perspectives to problem-solving,” says Amie Stepanovich, the U.S. policy manager at Access Now.
In short: "when we keep hiring technologists to solve problems, we get keep getting technical solutions." Too often, such technical fixes fail to account for the human environment in which they will be deployed. “It’s prioritizing a ‘tech first’—not a ‘human first’ or ‘empathy first’—perspective,” says Dr. Sara “Scout” Sinclair Brody, the executive director of Simply Secure.
This isn’t the first article to raise a red flag over the technology sector's glaring shortage of empathy. (http://www.newyorker.com/business/currency/silicon-valley-has-an-empathy-vacuum).
And while instilling empathy and compassion in adults who lack it might seem like a tall order, the piece argues that it isn't an unsolvable problem: there are entire fields—like user experience and human-centered design—dedicated to improving the way humans and technology interact. “Shockingly little of that,” says Brody, “has made it into the security domain.”
The key to this career upgrade and cross-country move? CodeFights, an online game that offers programmers the chance to improve their skills and get noticed by Silicon Valley titans like Uber and Dropbox.
Johnston told CNNMoney he discovered the game through a Facebook ad in June.
The Intercept contacted nine of the most prominent such firms, from Facebook to Booz Allen Hamilton, to ask if they would sell their services to help create a national Muslim registry, an idea recently resurfaced by Donald Trump’s transition team. Only Twitter said no.
This leads me to the question:
Have any of you worked or with through TAOCP or are you perhaps working through it? And is it worthwhile? I mean not just for bragging rights. And how long can it reasonably take? A few years?
Please share your experiences with TAOCP below. Thank you.
"The USB Killer is shockingly simple in its operation. As soon as you plug it in, a DC-to-DC converter starts drawing power from the host system and storing electricity in its bank of capacitors (the square-shaped components). When the capacitors reach a potential of -220V, the device dumps all of that electricity into the USB data lines, most likely frying whatever is on the other end. If the host doesn't just roll over and die, the USB stick does the charge-discharge process again and again until it sizzles.
Since the USB Killer has gone on sale, it has been used to fry laptops (including an old ThinkPad and a brand new MacBook Pro), an Xbox One, the new Google Pixel phone, and some cars (infotainment units, rather than whole cars... for now). Notably, some devices fare better than others, and there's a range of possible outcomes—the USB Killer doesn't just nuke everything completely."
Fraudsters use a so-called Distributed Guessing Attack to get around security features put in place to stop online fraud, and this may have been the method used in the recent Tesco Bank hack.
According to a study published in the academic journal IEEE Security & Privacy, that meant fraudsters could use computers to systematically fire different variations of security data at hundreds of websites simultaneously.
Within seconds, by a process of elimination, the criminals could verify the correct card number, expiry date and the three-digit security number on the back of the card.
Mohammed Ali, a PhD student at the university's School of Computing Science, said: "This sort of attack exploits two weaknesses that on their own are not too severe but, when used together, present a serious risk to the whole payment system.
The idea expands the concept of a habitable zone to include a vast population of worlds that had previously gone unconsidered. “You don’t necessarily need to have a terrestrial planet with a surface,” says Jack Yates, a planetary scientist at the University of Edinburgh in the United Kingdom, who led the study.
“In the Facebook News feed, which is optimized for engagement, the consequence is that the most controversial and provocative stories tend to be shared more than real news reporting, and Facebook has not had a way to make verification and authenticity an important part of the algorithm and then Facebook started trending false news stories on a regular basis.” That, Etlinger told Cities of the Future, “is an example where a machine has too much responsibility.”
When asked about the possibility of people using data and AI to influence political decisions and distort information to the public, Etlinger is outspoken:
“We don’t even know the level of intentional misinformation that has been shared.” Etlinger says. “Obviously the US news media, as an example, is full of conspiracy theories right now. The reality is [AI] is an incredibly powerful technology, even more because it is very difficult, and in some cases impossible, to go back and understand exactly what happens in an algorithm, and AI.”