Officially, CES® 2017 runs from January 5 through January 8, 2017. That's Thursday through Sunday, so Las Vegas weekend rates apply. To maximize your CES investment (and to help you financially justify a weekend in Vegas), here are five reasons CES 2017 will be awesome!
Anything that can be hacked will be hacked. Electronic voting machines are no exception. Which raises the question, "Could you hack enough electronic voting machines to influence (rig) the outcome of the upcoming presidential election?"
Yahoo recently reported the largest hack in history, WikiLeaks is releasing hacked DNC emails at an alarming rate, and according to NBC News "the Obama administration is contemplating an unprecedented cyber covert action against Russia in retaliation for alleged Russian interference in the American presidential election." Are we on the brink of the First Cyber World War?
Experts are debating whether the Democratic National Committee’s (DNC) email system was hacked by the Russian military intelligence service (G.R.U.) or Guccifer 2.0, a lone wolf Romanian hacker. While this is a very important question, the answer will not change the results: over 20,000 DNC emails ended up on WikiLeaks. How did this happen? How likely is it to happen to you or your company? What can you do to protect your email system from a similar fate?
Opining about the future of AI at the recent Brilliant Minds event at Symposium Stockholm, Google Executive Chairman Eric Schmidt rejected warnings from Elon Musk and Stephen Hawking about the dangers of AI, saying, "In the case of Stephen Hawking, although a brilliant man, he's not a computer scientist. Elon is also a brilliant man, though he too is a physicist, not a computer scientist." This absurd dismissal of Musk and Hawking was in response to an absurd question about "the possibility of an artificial superintelligence trying to destroy mankind in the near future." However, in Commander #1's immortal words, "We've analyzed their attack, sir, and there is a danger."
Apple v. FBI has started a serious debate about the line between security and privacy. The FBI says this is a case about the contents of one specific iPhone 5c. Apple says this is a case about securing data for everyone. Since current vintage iPhones (5s, 6, 6s) can not be hacked the same way, we should not be talking about a particular phone; we should be talking about encryption writ large, and how it is used in our daily lives.
Apple v. FBI is headed for the Supreme Court. The problem is, I don't want the Supreme Court (or any court) empowered to make policy – that's a job for the Legislative branch. Regardless of what you think of Congress, they’d better get this one right. What it means to be a digital citizen and identifying the border between security and privacy are two of the most important issues of our time.
Hello Barbie! is an IoT-enabled Barbie Doll with blonde hair, blue eyes and a built-in surveillance system. She's not the first of her kind (and she won't be the last), but here's what you should know about bringing it, or any connected device, into your home.
With 20,000 new product announcements and 2.1 million square feet of floor space, it was hard to find the signal in the noise at CES 2016. Here are my top 10 favorite products (with one honorable mention).
Information warfare is ongoing, intensifying and global. This is not new, but it is newly relevant because the Internet (and associated technologies) fully democratize the weapons. While we are fighting an asymmetrical physical war, the information war being fought on a much more level playing field. Or is it?