Categories

A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

NASA and Google Team up on Quantum Computing

NASA’s Ames Research Laboratory, in collaboration with Google and the Universities Space Research Association (USRA), has announced plans to host a 512-quantum-bit (qubit), quantum computer at its new Quantum Artificial Intelligence Lab.

The computer system selected for the facility is D-Wave Systems’ D-Wave Two. Quantum computing combines the principles of

More…

DoD Data Loss Delays Sept. 11 Hearings

Amazingly enough the Federal government can probably document what color my underwear I wore yesterday, what I ate for lunch, and every phone conversation I had but now that the trial concerning alleged Al Qaeda terrorists is about to begin there is a sudden and mysterious computer crash with no back up of confidential information

More…

Refusing to Decrypt Your Computer a Crime

password-decrypting

In Holland, Failing to help police decrypt information may land you in jail!

AMSTERDAM – The Dutch government says it is planning to make it a crime for a suspect in a child sex abuse or terrorism case to refuse to help decrypt a computer when ordered to do so by prosecutors.

The legislation

More…

U.S. Suspected of Creating Three More Computer Viruses

computer virus

Two independent teams of researchers studying the Flame computer virus believe that the maker of the malware — all but certain to be the United States — has architected three additional programs to conduct clandestine cyberwar or espionage.

Both Symantec Corp of the United States and Kaspersky Lab of Russia acknowledged on Monday that

More…

Computer Virus Could Black Out Quarter Million

About a quarter-million computer users around the world are at risk of losing Internet access on Monday because of malicious software at the heart of a hacking scam that U.S. authorities shut down last November.

Some blogs and news reports hyped the risk of an outage, warning of a potential “blackout” and describing the Alureon

More…

Harvard Researchers Claim Quantum Computing Breakthrough

Scientists have cracked the core problem of quantum computing which is how to create the key building blocks known as quantum bits at room temperature by turning to one of the purest materials on Earth: diamonds.

A team of Harvard scientists, led by Professor of Physics Mikhail Lukin, claimed to have achieved this, according to

More…

Monitored: Yes, Your Computer Too

by: Mac Slavo

To the disbelief of many of our readers, in a 2011 report titled Everything You Do Is Monitored, we noted that microphones and cameras on cell phones and computers allow interested parties (translated to mean your respective government) to hear and see everything going on in the direct vicinity of

More…

Drones Infected with Computer Virus

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in

More…

N. Korea Producing Own Computers

North Korea might be an unlikely place to find a PC factory, but the country has started manufacturing three models of computers, according to a recent state TV report.

The report, on the country’s main 8pm evening news, took viewers inside the factory that’s making the computers. The factory and the computers are far

More…

Hacker Threat on Wall Street

High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts of latency into them. By doing so, they can subtly change the course of trading and pocket profits of millions of dollars in just a few seconds, says Rony Kay, a former IBM

More…

Internet Quarantine Plan

A plan by Microsoft Security Chief Scott Charney would place infected or unsecured PCs in an Internet isolation ward. And block users from Internet access. How might this work? Let’s try this potential scenario. Hello this is your ISP. We regret to inform you that your system has been quarantined and will not be allowed

More…

Virus Skimming Bank Accounts

The FBI announced this week that dozens of individuals have been charged in the US and Europe with creating a computer virus and using it to siphon millions of dollars from victims’ bank accounts.

The Zeus trojan, also known as Zbot, targets PCs and cell phones with malware-infested emails and websites. Once the infection is

More…

Start of Internet Censorship

Editor’s comment: When I bought my PC I was under the impression that it was my PERSONAL COMPUTER. Now it seems that it’s not. Under a new law as shown in the article below it seems that information on your PERSONAL computer is not private and that Eircom and presumably anyone, including government agencies, can

More…

Developing Collective Intelligence

Do you know your IQ, that little number that’s supposed to measure how smart you are? Forget it. Individual intelligence is old news, collective intelligence (CI) is the future. And it’s already here. Google lets you access the collective records of the world via internet searches. Wikipedia assembles the shared knowledge of humanity in an

More…

Pentagon Struggles with Cyber Security

WASHINGTON — On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the nation’s power grids, its communications systems or its financial networks.

The results were dispiriting. The enemy had all the advantages: stealth, anonymity and unpredictability. No one

More…

The Right to Seize your Computer

The Government can Examine your Computer at Will

In what was presented to the public this week as a clarification of its privacy policy, the US Dept. of Homeland Security published a paper referring to new guidelines for its immigration and customs agents regarding how they may conduct border searches of travelers’ computers

More…

NSA Watercooled Computer

This computer, made by the Cray corp.called the thinking machine, was paid for by the U.S. tax payers for the NSA and resides in a two story building on the secretive agencies campus. The first story contains the huge water cooling system, all this water gets pumped upstairs to the computer itself to cool a

More…

Computer Closes in on Human Level Cognition

Roadrunner, the worlds most powerful supercomputer that was unveiled last week, is all set to mimic extremely complex neurological processes.

If successful, researchers believe they can study — in real time — the entire human visual cortex, arguably a human being’s most important sensory apparatus.

The Roadrunner is a petaflop computer, with peta meaning a

More…

sharethis_button(); }?>