1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Nachrichten


Suchen

News RSS Quellen: 83x
News Kategorien unterhalb von Nachrichten: 0x
News RSS Feeds dieser Nachrichten Kategorie: RSS Feed IT Security Nachrichten
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 4 von 6.495 Seiten (Bei Beitrag 105 - 140)
227.292x Beiträge in dieser Kategorie

Auf Seite 3 zurück | Nächste 5 Seite | Letzte Seite

[ 1 ] [ 2 ] [ 3 ] [4] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ]

NASA Consultant 'Convinced We Found Evidence of Life on Mars in the 1970s'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: science.slashdot.org Direktlink direkt öffnen

"A consultant for NASA slammed the agency for deliberately ignoring the results of the experiment he handled that showed signs of alien life on Mars," reports the International Business Times. "According to the consultant, NASA refuses to conduct new life-detection tests on the Red Planet." Engineer Gilbert Levin served as a principal investigator on NASA's Viking missions, which sent two identical landers to Mars. For his role, Levin handled the missions' biological experiments known as Labeled Release (LR). These experiments focused on identifying living microorganisms on Mars. The experiments were sent to the Red Planet through the Viking 1 and Viking 2 missions in 1975.... "As the experiment progressed, a total of four positive results, supported by five varied controls, streamed down from the twin Viking spacecraft landed some 4,000 miles apart," Levin wrote in Scientific American. "The data curves signaled the detection of microbial respiration on the Red Planet," he continued. "The curves from Mars were similar to those produced by LR tests of soils on Earth. It seemed we had answered that ultimate question." Despite the results of the LR experiment, the findings were discarded by NASA due to the agency's previous experiment on Mars. More from Levin's article in Scientific American: Life on Mars seemed a long shot. On the other hand, it would take a near miracle for Mars to be sterile. NASA scientist Chris McKay once said that Mars and Earth have been "swapping spit" for billions of years, meaning that, when either planet is hit by comets or large meteorites, some ejecta shoot into space. A tiny fraction of this material eventually lands on the other planet, perhaps infecting it with microbiological hitch-hikers.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

New 2020 iPhone SE Details Now Available

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

Apple is expected to take the wraps off the next-generation iPhone SE in just a few months, and according to top-rated Apple analyst Ming-Chi Kuo, the device will be priced from $399. This means the iPhone SE 2 could become a very appealing purchase from a pricing perspective, albeit as far as the hardware goes, there will be some substantial changes versus the more premium siblings. First and foremost, the analyst explains that iPhone SE 2 will be based from one end to another on the iPhone 8, so it’ll have a similar look and dimensions. In other words, it’ll feature a 4.7-inch LCD display without a notch and a Home button with integrated Touch ID. Face ID is unlikely to be offered. This is an approach that Apple has also used before on the original iPhone SE, which used the look of the iPhone 5s with latest-generation hardware. Three colors, two storage options This will be ...
News Bewertung

Weiterlesen Weiterlesen

Causa Blitzchung: Blizzard reduziert Strafe, entschuldigt sich aber nicht

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Blizzard, Protest, HearthStone, Hongkong, Blitzchung Blizzard fand sich die letzten Tage im Mittelpunkt von heftiger Kritik wieder und diese hat nun Wirkung gezeigt. Der Blizzard-Präsident J. Allen Brack hat ein Statement veröffentlicht, in dem er u. a. die Strafe gegen Hearthstone-Profi "Blitzchung" reduziert. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

terreActive erweitert Security-as-a-Service-Angebot

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Der Schweizer IT-Sicherheitsspezialist terreActive baut sein Angebot in Sachen Security as a Service sukzessive aus und bietet nun ein ...
News Bewertung

Weiterlesen Weiterlesen

Seehofer wirft nach Halle Nebelkerzen: Gamer-Szene stärker beobachten

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Politik, Bundesinnenminister, Horst Seehofer Eigentlich war es ja fast zu erwarten: Bundesinnenminister Horst See­hofer lenkt den Fokus nach dem Terroranschlag in Halle von der rechten Szene ab. Er kündigte stattdessen an, die Computerspiele-Szene zu­künftig stärker in den Blick der Sicherheitsbehörden zu nehmen. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Apple Sending iPhone Browsing Data to a Chinese Company

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

Privacy-obsessed Apple is one again under fire after it was discovered that Safari on iOS sends browsing data to Chinese tech giant Tencent. First of all, let’s see why the whole thing happens. Apple’s browser is equipped with security controls to fight against malicious practices such as phishing. In Safari, the suite of tools supposed to protect users is this regard is called Fraudulent Website Warning, and in order to work correctly, it collects and sends information to Google Safe Browsing to compare links against a blacklist that could help determine if pages are safe or not. But recently it was discovered that in addition to Google, Apple is also sending similar information to Chinese company Tencent, one of the names also linked with censorship and questionable collaboration with the Beijing government. How to disable Fraudulent Website Warning While it’s not yet c...
News Bewertung

Weiterlesen Weiterlesen

Klarmobil Oktober-Aktion: Doppeltes Datenvolumen zum halben Preis

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Mobilfunk, Angebot, Aktion, Klarmobil Doppeltes Datenvolumen, nur für kurze Zeit: Der Mobilfunkanbieter Klar­mobil startet für Neukunden ein besonderes Angebot, bei dem man jetzt ein 6 GB statt 3 GB LTE-Datenpaket plus Telefon- und SMS-Flat zum monatlichen Preis von 12,99 Euro bekommt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Warning: Windows 10 Cumulative Update KB4517389 Could Break Down the Start Menu

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

The most recent cumulative update for Windows 10 version 1903, or May 2019 Update, could break down the Start menu. Microsoft has already acknowledged the bug and promised a fix in the coming weeks, most likely in the late October rollout when new cumulative updates are shipped to Windows 10 devices. Windows 10 cumulative update KB4517389 was published on October 8 as part of this month’s Patch Tuesday cycle. The update increases the OS build number to 18362.418 and resolves an issue breaking down printers. However, the same cumulative update causes other problems with the Start menu, as several users have previously reported that after installing KB4517389, clicking the Start button no longer launches the menu or generates an error. Fix coming later this month Microsoft employee Paul Sey says in a post on the Microsoft Community forums that this is a
News Bewertung

Weiterlesen Weiterlesen

„Renesas Advanced“: Neue 32-Bit-MCU-Familie für IoT-Produkte

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Sichere IoT-Produkte „out of the box“: Renesas legt bei seiner neuen RA-Mikrocontroller-Familie den Fokus auf einfache Entwicklung, IT-Security und ...
News Bewertung

Weiterlesen Weiterlesen

Cyber-Security für Industrie 4.0 realisieren

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Industrie 4.0 ist Realität geworden – bringt aber gleichzeitig ganz neue Sicherheitsrisiken mit sich. Zum Schutz ihrer Vermögenswerte müssen ...
News Bewertung

Weiterlesen Weiterlesen

Samsung Galaxy S10 EE: Das Smartphone für die Bundespolizei und Bundeswehr

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Auf der weltweit wichtigsten Messe für IT-Security, der it-sa in Nürnberg, hat Samsung nun das neue Sicherheits-Smartphone für die Bundespolizei ...
News Bewertung

Weiterlesen Weiterlesen

Mit Falschem angelegt: Ransomware-Opfer knackt Kommando-Server

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Verschlüsselung, Ransomware, Erpressung, erpressungstrojaner Das war wohl ein klarer Fall von "mit dem Falschen angelegt". Die Betreiber der Muhstik-Ransomware hatten es geschafft, in ein System eines Entwicklers einzudringen, der daraufhin deren Server knackte und die Entschlüsselungs-Keys aller Opfer veröffentlichte. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Huawei confirms One million Cyber Attacks every day

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: cybersecurity-insiders.com Direktlink direkt öffnen

Huawei which was trade banned by the United States in May this year says that its computers and networks are being cyber attacked by adversaries over one million times every day. Issuing a confirmation on this speculation John Suffolk, the Security Chief working for the Chinese firm endorsed this news and added that if the […]

The post Huawei confirms One million Cyber Attacks every day appeared first on Cybersecurity Insiders.


News Bewertung

Weiterlesen Weiterlesen

Small Businesses to loose $5.2 Trillion worldwide to Cyber Attacks

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: cybersecurity-insiders.com Direktlink direkt öffnen

A study carried out by Accenture says that small businesses are all set to lose $5.2 Trillion on a global note to cyber attacks within the next 5 years. The Ireland based Professional Services Company added in its report that the digital transformation has led to the loss of $200,000 on an average which might […]

The post Small Businesses to loose $5.2 Trillion worldwide to Cyber Attacks appeared first on Cybersecurity Insiders.


News Bewertung

Weiterlesen Weiterlesen

Bitkom: Unternehmen sehen steigenden Bedarf an IT-Spezialisten

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Osnabrück. Beim Thema IT-Security misst die Wirtschaft externen Projektdienstleistern eine wichtige Rolle bei. Für drei Viertel der Großunternehmen ...
News Bewertung

Weiterlesen Weiterlesen

IT-Sicherheit braucht ein Gesamtkonzept

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it-daily.net Direktlink direkt öffnen

Die it-sa in Nürnberg hat ihre Tore geschlossen, Hersteller von IT-Security-Komponenten haben viele Neuigkeiten vorgestellt. Aber kann man damit allein in der Praxis ein Plus an IT-Sicherheit in den Unternehmen bringen? „Zweifel sind angebracht“, sagen Joachim Astel und Stefan Keller, Vorstände des IT-Dienstleisters und Rechenzentrumsbetreibers noris network.


News Bewertung

Weiterlesen Weiterlesen

Nachhaltiger Schutz bedeutet Kontinuität

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

In der IT-Sicherheitsbranche sind Scorecards, Pentests, und ... sich eine 360-Grad-Übersicht über den Stand der eigenen IT-Security zu verschaffen.
News Bewertung

Weiterlesen Weiterlesen

Imperva cloud firewall pwned, how Teamviewer was ransacked, D-Link bug uncovered, etc

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: go.theregister.com Direktlink direkt öffnen

Plus: Visual Studio Code debug hole found

Roundup  It's time for another security news catch-up.…


News Bewertung

Weiterlesen Weiterlesen

Imperva cloud firewall pwned, D-Link bug uncovered – plus more

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: go.theregister.com Direktlink direkt öffnen

Including: Visual Studio Code debug hole found

Roundup  It's time for another security news catch-up.…


News Bewertung

Weiterlesen Weiterlesen

Apple iPhone SE2 soll ab 399 Dollar starten - mit aktueller Technik

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Iphone, iPhone SE, Apple iPhone SE Apple will laut einem dank diverser Quellen aus der Lieferkette bestens informierten Marktbeobachter das iPhone SE2 bei seiner Einführung im nächsten Jahr zu einem überraschend günstigen Preis anbieten. Dafür bekommt der Kunde dann sogar aktuelle Hardware. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Apple's Safari Browser Is Sending Some Users' IP Addresses To China's Tencent

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: apple.slashdot.org Direktlink direkt öffnen

"Apple, which often positions itself as a champion of privacy and human rights, is sending some IP addresses from users of its Safari browser on iOS to Chinese conglomerate Tencent -- a company with close ties to the Chinese Communist Party," reports the Reclaim the Net blog: Apple admits that it sends some user IP addresses to Tencent in the "About Safari & Privacy" section of its Safari settings.... The "Fraudulent Website Warning" setting is toggled on by default which means that unless iPhone or iPad users dive two levels deep into their settings and toggle it off, their IP addresses may be logged by Tencent or Google when they use the Safari browser. However, doing this makes browsing sessions less secure and leaves users vulnerable to accessing fraudulent websites... Even if people install a third-party browser on their iOS device, viewing web pages inside apps still opens them in an integrated form of Safari called Safari View Controller instead of the third-party browser. Tapping links inside apps also opens them in Safari rather than a third-party browser. These behaviors that force people back into Safari make it difficult for people to avoid the Safari browser completely when using an iPhone or iPad. Engadget adds that it's "not clear" whether or not Tencent is actually collecting IP addresses from users outside of China. ("You'll see mention of the collection in the U.S. disclaimer, but that doesn't mean it's scooping up info from American web surfers.") But Reclaim the Net points out that the possibility is troubling, in part because Safari is the #1 most popular mobile internet browser in America, with a market share of over 50%.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Die ewige Baustelle

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Klar herausgestrichen wurden zudem Herausforderungen, die mit dem Cloud Computing (58,5 %) und dem Dauerbrenner IT-Security (47,8 %) in den ...
News Bewertung

Weiterlesen Weiterlesen

Sodinokibi Ransomware: Following the Affiliate Money Trail

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

After a Sodinokibi ransomware affiliate posted partial transaction IDs for ransomware payments, researchers were able to use that information to follow the money trail for affiliates and in some cases, how they spend their illicit earnings. [...]
News Bewertung

Weiterlesen Weiterlesen

IT-Sicherheit bei Fluggesellschaften

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it-daily.net Direktlink direkt öffnen

Die IT-Sicherheit in der Flugbranche steht, wie kaum eine andere, tagtäglich einer Mammutaufgabe gegenüber, ihre Systeme vor Ausfällen jeglicher Art zu schützen. Die Flugbranche ist auf sehr vielen Ebene in einem sehr hohen Maß von Technologie abhängig. 


News Bewertung

Weiterlesen Weiterlesen

Climbing the Vulnerability Management Mountain: Reaching Maturity Level 1

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tripwire.com Direktlink direkt öffnen

The time at ML:0 can be eye-opening form many organizations. There are generally a lot of assets discovered that are new or had been forgotten about. Almost every organization discovers their own Methuselah; this is the system that has been around forever and performs some important tasks but has not been updated in years. The […]… Read More

The post Climbing the Vulnerability Management Mountain: Reaching Maturity Level 1 appeared first on The State of Security.


News Bewertung

Weiterlesen Weiterlesen

Top Tax Scams to Watch out For

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tripwire.com Direktlink direkt öffnen

Diligent taxpayers are being increasingly targeted by con artists who are well-versed in manipulating the revenue system. The crooks usually impersonate IRS (U.S. Internal Revenue Service) officials, sending fake emails or messages on social media in an attempt to defraud the targeted individuals of their money. Unfortunately, lots of people fall for these scams, and […]… Read More

The post Top Tax Scams to Watch out For appeared first on The State of Security.


News Bewertung

Weiterlesen Weiterlesen

Was Flash Responsible For 'The Internet's Most Creative Era'?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

A new article this week on Motherboard argues that Flash "is responsible for the internet's most creative era," citing a new 640-page book by Rob Ford on the evolution of web design. [O]ne could argue that the web has actually gotten less creative over time, not more. This interpretation of events is a key underpinning of Web Design: The Evolution of the Digital World 1990-Today (Taschen, $50), a new visual-heavy book from author Rob Ford and editor Julius Wiedemann that does something that hasn't been done on the broader internet in quite a long time: It praises the use of Flash as a creative tool, rather than a bloated malware vessel, and laments the ways that visual convention, technical shifts, and walled gardens have started to rein in much of this unvarnished creativity. This is a realm where small agencies supporting big brands, creative experimenters with nothing to lose, and teenage hobbyists could stand out simply by being willing to try something risky. It was a canvas with a built-in distribution model. What wasn't to like, besides a whole host of malware? The book's author tells Motherboard that "Without the rebels we'd still be looking at static websites with gray text and blue hyperlinks." But instead we got wild experiments like Burger King's "Subservient Chicken" site or the interactive "Wilderness Downtown" site coded by Google. There were also entire cartoon series like Radiskull and Devil Doll or Zombie College -- not to mention games like "A Murder of Scarecrows" or the laughably unpredictible animutations of 14-year-old Neil Cicierega. But Ford tells Motherboard that today, many of the wild ideas have moved from the web to augmented reality and other "physical mediums... The rise in interactive installations, AR, and experiential in general is where the excitement of the early days is finally happening again." Motherboard calls the book "a fitting coda for a kind of digital creativity that -- like Geocities and MySpace pages, multimedia CD-ROMs, and Prodigy graphical interfaces before it -- has faded in prominence."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

I've been developing web applications for 7 years now. How can I begin learning about cybersecurity?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

submitted by /u/Mjjjokes
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Wired Remembers the Glory Days of Flash

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

Wired recently remembered Flash as "the annoying plugin" that transformed the web "into a cacophony of noise, colour, and controversy, presaging the modern web." They write that its early popularity in the mid-1990s came in part because "Microsoft needed software capable of showing video on their website, MSN.com, then the default homepage of every Internet Explorer user." But Flash allowed anyone to become an animator. (One Disney artist tells them that Flash could do in three days what would take a professional animator 7 months -- and cost $10,000.) Their article opens in 2008, a golden age when Flash was installed on 98% of desktops -- then looks back on its impact: The online world Flash entered was largely static. Blinking GIFs delivered the majority of online movement. Constructed in early HTML and CSS, websites lifted clumsily from the metaphors of magazine design: boxy and grid-like, they sported borders and sidebars and little clickable numbers to flick through their pages (the horror). Flash changed all that. It transformed the look of the web... Some of these websites were, to put it succinctly, absolute trash. Flash was applied enthusiastically and inappropriately. The gratuitous animation of restaurant websites was particularly grievous -- kitsch abominations, these could feature thumping bass music and teleporting ingredients. Ishkur's 'guide to electronic music' is a notable example from the era you can still view -- a chaos of pop arty lines and bubbles and audio samples, it looks like the mind map of a naughty child... In contrast to the web's modern, business-like aesthetic, there is something bizarre, almost sentimental, about billion-dollar multinationals producing websites in line with Flash's worst excess: long loading times, gaudy cartoonish graphics, intrusive sound and incomprehensible purpose... "Back in 2007, you could be making Flash games and actually be making a living," remembers Newgrounds founder Tom Fulp, when asked about Flash's golden age. "That was a really fun time, because that's kind of what everyone's dream is: to make the games you want and be able to make a living off it." Wired summarizes Steve Jobs' "brutally candid" diatribe against Flash in 2010. "Flash drained batteries. It ran slow. It was a security nightmare. He asserted that an era had come to an end... '[T]he mobile era is about low power devices, touch interfaces and open web standards -- all areas where Flash falls short.'" Wired also argues that "It was economically viable for him to rubbish Flash -- he wanted to encourage people to create native games for iOS." But they also write that today, "The post-Flash internet looks different. The software's downfall precipitated the rise of a new aesthetic...one moulded by the specifications of the smartphone and the growth of social media," favoring hits of information rather than striving for more immersive, movie-emulating thrills. And they add that though Newgrounds long-ago moved away from Flash, the site's founder is now working on a Flash emulator to keep all that early classic content playable in a browser.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Komfort schlägt Sicherheit und Datenschutz

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it-daily.net Direktlink direkt öffnen

Ängstlich, aber tatenlos: Eine aktuelle Studie zeigt eine erhebliche Lücke zwischen Datenschutzbedenken und tatsächlichem Verhalten im Netz auf. Im Auftrag des Cybersecurity-Anbieters BullGuard wurde das Verhalten von Deutschen, Briten und Amerikanern untersucht. 


News Bewertung

Weiterlesen Weiterlesen

Amazon Calls for Government Regulation of Facial Recognition Tech

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

Amazon is endorsing the idea of government regulation of facial recognition technology, as part of a wide-ranging statement of its principles on a range of social and political issues.

read more


News Bewertung

Weiterlesen Weiterlesen

Do you think China has backdoors?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

So, we've recently learnt that many companies are too scared to upset China, but many have no problem upsetting the US.

You need to hear me out, but thinking about hypotheticals, many companies have openly disputed and ridiculed ideas of giving the US government a backdoor - but, seeing how far companies have been going to not upset China, it's made me a bit paranoid.

Could it be possible that companies would possibly willing to give a backdoor to China (or “bend the knee“ is a more trending way to say it).

Stay with me, but think of the argument: “Give us a backdoor or we’ll ban your goods/services”. Access to the market for Apple gained the company ~$51.67bn in revenue from the Chinese market in 2018 - that's a huge amount of money.

The real question is - actually there are loads…

Do companies really value it’s users privacy and do they value it more than what the Chinese market offers? (basically, do you think a company has made a backdoor)

Do you think this is far-fetched, mid-fetched, or is it a real concern?

submitted by /u/humanexploit
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Can A New TED-ED Video Series Teach Students To 'Think Like A Coder'?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: developers.slashdot.org Direktlink direkt öffnen

An anonymous reader writes: TED Conferences has its own educational YouTube channel (now with 10 million subscribers and over 1.5 billion views). Two weeks ago it launched a 10-episode animated series about computer programming, and its first episode -- The Prison Break -- has already been viewed nearly a quarter of a milllion times. In the 7-minute video, a programmer wakes up in a prison cell -- with total amnesia -- and discovers a "mysterious stranger" squeezing through the jail cell's bars. It's a floating anthropomorphic drone, saying it needs the programmer's help to rescue a dystopian future world "in turmoil. Robots have taken over." The video introduces the computer programming concept of a loop -- since escaping the jail cell involves testing a key in every possible position. And the video's page on the TED-Ed web site offers links to related resources from Code.org and Free Code Camp, as well as from Advent of Code, "which is run by Eric Wastl, who consulted extensively on Think Like a Coder and inspired quite a few of the puzzles." The episode ends with the programmer dangling from the flying drone, off on an attempt to recover three artifacts -- nodes of memory, power, and creation -- that are currently being used for "nefarious purposes."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Researchers Prove Humans Are Still Better Than AI at 'Angry Birds'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: games.slashdot.org Direktlink direkt öffnen

An anonymous reader quotes the I-Programmer site: Humans! Rest easy, we still beat the evil AI at the all-important Angry Birds game. Recent research by Ekaterina Nikonova and Jakub Gemrot of Charles University (Czech Republic) indicates why this is so.... "Firstly, this game has a large number of possibilities of actions and nearly infinite amount of possible levels, which makes it difficult to use simple state space search algorithms for this task. Secondly, the game requires a planning of sequences of actions, which are related to each other... For example, a poorly chosen first action can make a level unsolvable by blocking a pig with a pile of objects. Therefore, to successfully solve the task, a game agent should be able to predict or simulate the outcome of it is own actions a few steps ahead." The researchers also report that the game requires AI to distinguish "between multiple birds, their abilities and optimum tapping times..." "Despite the fact we have come close to a human-level performance on selected 21 levels, we still lost to 3 out of 4 humans in obtaining a maximum possible total score."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Most SSL certificate misissuance caused by software bugs and rule misinterpretations

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: zdnet.com Direktlink direkt öffnen

Academic study analyzed 379 incidents of incorrectly-issued SSL certificates from a total of 1,300+ known cases.
News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 4 von 6.495 Seiten (Bei Beitrag 105 - 140)
227.292x Beiträge in dieser Kategorie

Auf Seite 3 zurück | Nächste 5 Seite | Letzte Seite

[ 1 ] [ 2 ] [ 3 ] [4] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ]