IBM researchers have injected viruses with neural nets, making them stealthier and precisely targetable.
Filip Liu, a 31-year-old software developer from Beijing, was traveling in the far western Chinese region of Xinjiang when he was pulled to one side by police as he got off a bus.
There’s a lot of emphasis on cyber threats, but the government is increasingly vulnerable to gaps in supply-chain security.
One Russian troll account is linked to 9.5 million fraudulent email addresses.
A BuzzFeed News analysis shows that Russian accounts blamed the violence on the “antifa” and backed Trump all the way. Then most of them abruptly went silent — presumably banned by Twitter.
According to a newly released State Department cable, the attack was part of a Russian campaign to sow disinformation about NATO. It came as Russia allegedly was stealing Democrats’ emails.
Researchers have repeatedly shown that writing samples, even those in artificial languages, contain a unique fingerprint that’s hard to hide.
The 2018 “techlash” shows no sign of slowing. The last week of July saw the release of two papers containing proposals for significant increases regulation of tech companies, particularly with an eye toward protecting the integrity of political processes and elections.
Major technology and social-media companies— think Facebook, Apple, Microsoft, and Google— wield tremendous power. Given their reach, their financial heft, their importance to vast swaths of customers dependent on their goods, services, and platforms, and their ability to influence (if not altogether dictate) transnational public policy, these firms often look and act the part of proprietors, stewards, and even governors of digital public squares.
Never before in history have terrorists had such easy access to the minds and eyeballs of millions,” declared one journalistic account of the Islamic State’s propaganda machine and proficient use of Twitter, Facebook, bots, and other modern means of getting its message out.