Ghost In The Shell

•September 22, 2016 • Comments Off on Ghost In The Shell

http://ift.tt/2d023z1

Putting a computer in your brain is no longer science fiction

•August 19, 2016 • Comments Off on Putting a computer in your brain is no longer science fiction

http://ift.tt/2b7vcHo

Present Tense

•August 15, 2016 • Comments Off on Present Tense

It makes much more sense…
https://g.co/kgs/dNvCb4

Google’s mysterious new Fuchsia operating system could run on almost anything

•August 15, 2016 • Comments Off on Google’s mysterious new Fuchsia operating system could run on almost anything

http://ift.tt/2aUiLOR

The Windows 10 Anniversary update is here. Best feature? Linux Bash shell with native access to the Windows file system! SSH without Putty?!?

•August 11, 2016 • Comments Off on The Windows 10 Anniversary update is here. Best feature? Linux Bash shell with native access to the Windows file system! SSH without Putty?!?

from Facebook
via IFTTT

Hackers Make the First-Ever Ransomware for Smart Thermostats

•August 8, 2016 • Comments Off on Hackers Make the First-Ever Ransomware for Smart Thermostats

http://ift.tt/2aYq0td

Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge

•August 5, 2016 • Comments Off on Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge

“The idea is, of course, to produce systems that can patch themselves, watch for intrusions, and so on, with minimal human interaction. It’d be nice to know that your computer is looking out for itself.”
http://ift.tt/2aAc9VM

“Come play with us Danny…forever…and ever…and ever…”

•August 3, 2016 • Comments Off on “Come play with us Danny…forever…and ever…and ever…”
via Facebook http://ift.tt/2b3V8Fi

“Come play with us Danny…forever…and ever…and ever…”

•August 3, 2016 • Comments Off on “Come play with us Danny…forever…and ever…and ever…”

from Facebook
via IFTTT

www.symantec.com

•July 24, 2016 • Comments Off on www.symantec.com

“Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up.”
http://ift.tt/2a56NFS