Anything that can be hacked will be hacked. Electronic voting machines are no exception. Which raises the question, "Could you hack enough electronic voting machines to influence (rig) the outcome of the upcoming presidential election?"
Yahoo recently reported the largest hack in history, WikiLeaks is releasing hacked DNC emails at an alarming rate, and according to NBC News "the Obama administration is contemplating an unprecedented cyber covert action against Russia in retaliation for alleged Russian interference in the American presidential election." Are we on the brink of the First Cyber World War?
Experts are debating whether the Democratic National Committee’s (DNC) email system was hacked by the Russian military intelligence service (G.R.U.) or Guccifer 2.0, a lone wolf Romanian hacker. While this is a very important question, the answer will not change the results: over 20,000 DNC emails ended up on WikiLeaks. How did this happen? How likely is it to happen to you or your company? What can you do to protect your email system from a similar fate?
Opining about the future of AI at the recent Brilliant Minds event at Symposium Stockholm, Google Executive Chairman Eric Schmidt rejected warnings from Elon Musk and Stephen Hawking about the dangers of AI, saying, "In the case of Stephen Hawking, although a brilliant man, he's not a computer scientist. Elon is also a brilliant man, though he too is a physicist, not a computer scientist." This absurd dismissal of Musk and Hawking was in response to an absurd question about "the possibility of an artificial superintelligence trying to destroy mankind in the near future." However, in Commander #1's immortal words, "We've analyzed their attack, sir, and there is a danger."
Apple v. FBI has started a serious debate about the line between security and privacy. The FBI says this is a case about the contents of one specific iPhone 5c. Apple says this is a case about securing data for everyone. Since current vintage iPhones (5s, 6, 6s) can not be hacked the same way, we should not be talking about a particular phone; we should be talking about encryption writ large, and how it is used in our daily lives.