Ayasdi came out of stealth mode and told the world it had a new way to analyze big data, and I think the implications for CRM and social are very large indeed. The new way is called "topological data analysis" and hearing about it has the feel of hearing about relativity for the first time and lea...
Researchers at MIT's Center for Bits and Atoms have created milli-motein -- a manifestation of raw digital data that could create transformable robots. However, instead of pop-culture robots that can transform into giant cars or airplanes, these could result in material changes that might one day tr...
When Paul Steiner published his 1993 cartoon in The New Yorker with the caption, "On the Internet, no one knows you're a dog," little did he know it would become a mantra among security professionals, especially those concerned about authenticating identities on the Net. The job of finding ways to i...
Someone with the Twitter handle @AnonymousOwn3r made a grab for 15 minutes of fame last week by claiming responsibility for taking down the network for Internet's largest registrar, GoDaddy. GoDaddy discredited that claim. "The service outage was not caused by external influences," CEO Scott Wagner ...
Once upon a time, security shiners involving Apple were as rare as Windows Vista lovers, but now it seems that a week doesn't go by without the name of Steve Jobs' baby being dragged through the digital mud. Last week's episode involved the hacktivist group AntiSec and the FBI. AntiSec claimed it co...
Oracle acted swiftly last week to close a zero-day vulnerability in its Java technology, but given Java's track record, that patch is just one hit in a long game of wackamole played with hackers. A number of security companies discovered the vulnerability over the weekend of Aug. 25. They noticed th...
Research released last week fingered the iPhone as the source of a text messaging exploit that could be used to steal sensitive information from smartphone users or work mischief on their hardware. The flaw, revealed by a well-known security researcher and jailbreaker of iPhones, involves the "reply...
Advanced penetration testing product maker Pwnie Express has unveiled a new tester that looks just like a power strip. The Power Pwn is a fully integrated enterprise-class device that can be used over Ethernet, wireless or Bluetooth connections. It is priced at $1,300 and is currently available for ...
The Defense Advanced Research Projects Agency has issued an open call to the robotics industry soliciting expert proposals to create more power-efficient robots. The agency aims to maximize robotic technology potential and improve the power efficiency of current robots by 2,000 percent. Robots are h...
Despite the hundreds of millions of dollars the U.S. federal government spends on cybersecurity, it seems that shoestring-budget attackers are still often able to get a foot in the door. At a security colloquium in North Virginia on Monday, the Defense Advanced Research Projects Agency told reporter...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.