Artificial intelligence systems more apt to fail than to destroy
The most realistic risks about the dangers of artificial intelligence are basic mistakes, breakdowns and cyber attacks, an expert in the field says – more so than machines that become super powerful,...
View ArticleFighting the next generation of cyberattacks
The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation's computer systems.
View ArticleIRS needs to do more to fight cyberattacks, watchdog says
The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress on Tuesday.
View ArticleDon't blink or you might miss the leap second on Tuesday
Tuesday lasts a little bit longer—by a second.
View ArticleAn agent-based model that analyzes commuters' travel data
The introduction of smartcard ticketing for Singapore's public transport system has enabled A*STAR researchers to provide valuable predictive data on potential train overloading. This will enable...
View ArticleDon't get hacked! Research shows how much we ignore online warnings
Say you ignored one of those "this website is not trusted" warnings and it led to your computer being hacked. How would you react? Would you:
View ArticleStudy narrows the scope of research on quantum computing
According to many scientists, quantum computers will have great importance in the future but, despite all efforts, research in this field is still in its infancy. One of the difficulties is...
View ArticleComputer equal to or better than humans at indexing science
In 1997, IBM's Deep Blue computer beat chess wizard Gary Kasparov. This year, a computer system developed at the University of Wisconsin-Madison achieved something far more complex. It equaled or...
View ArticleAn Interview with Thomas Vidick on quantum code cracking
Quantum computers, looked to as the next generation of computing technology, are expected to one day vastly outperform conventional computers. Using the laws of quantum mechanics—the physics that...
View Article'Fibonacci quasiparticle' could form basis of future quantum computers
(Phys.org)—Topological quantum computing (TQC) is a newer type of quantum computing that uses "braids" of particle tracks, rather than actual particles such as ions and electrons, as the qubits to...
View ArticleReverse engineer creates Thunderstrike bootkit able to exploit vulnerability...
Trammell Hudson, an employee of Two Sigma Investments has found a way to hack into computers running OS X, using a pre programmed hardware device. He calls the software that runs from the device a...
View ArticleNovel mathematical research for quantifying and predicting uncertainty in...
Uncertainty is sometimes unavoidable. But in the world of scientific computing and engineering, at least, what's worse than uncertainty is being uncertain about how uncertain one is.
View ArticleAnthem: Hackers tried to breach system as early as Dec. 10
(AP)—The hackers who stole millions of health insurance records from Anthem Inc. commandeered the credentials of five different employees while seeking to penetrate the company's computer network—and...
View ArticleWatchdog: Air traffic control system is a hacking risk (Update)
The nation's system for guiding planes and other aircraft is at "increased and unnecessary risk" of being hacked, according to a report by government watchdog released Monday.
View ArticleReading speed harnessed to automatically control text display rates
Reading a text is something that each of us does at our own individual pace. This simple fact has been exploited by computer scientists in Saarbrücken who have developed a software system that...
View ArticleResearchers design a type of Turing test for computer vision
A small team of researchers has developed a possible means for creating a Turing test for computer vision. In their paper published in Proceedings of the National Academy of Sciences, Donald Geman,...
View ArticleMobile quarantine station for malicious Android apps
The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store – ones...
View ArticleImages that fool computer vision raise security concerns
Computers are learning to recognize objects with near-human ability. But Cornell researchers have found that computers, like humans, can be fooled by optical illusions, which raises security concerns...
View ArticleScientists succeed in linking two different quantum systems
Physicists at the Universities of Bonn and Cambridge have succeeded in linking two completely different quantum systems to one another. In doing so, they have taken an important step forward on the way...
View ArticleHey, watch where you're flicking. That's a computer
Michigan Micro Mote (M3) is the world's smallest computer. How small? It's about the size of a grain of rice. A University of Michigan's March report can tell you that the team behind the computer have...
View Article