IBM researchers have injected viruses with neural nets, making them stealthier and precisely targetable.
Airbus’s Zephyr solar-powered drone flew for 25 days straight during a test-flight over Yuma, Arizona beginning on July 11, 2018. The flight represented a record for aircraft endurance, breaking the previous 14-day record also set by a Zephyr back in 2015.
To understand how digital technologies went from instruments for spreading democracy to weapons for attacking it, you have to look beyond the technologies themselves.
Tech competition is being used to push a dangerous corporate agenda.
Filip Liu, a 31-year-old software developer from Beijing, was traveling in the far western Chinese region of Xinjiang when he was pulled to one side by police as he got off a bus.
Machine learning and artificial intelligence can help guard against cyberattacks, but hackers can foil security algorithms by targeting the data they train on and the warning flags they look for.
The 2018 “techlash” shows no sign of slowing. The last week of July saw the release of two papers containing proposals for significant increases regulation of tech companies, particularly with an eye toward protecting the integrity of political processes and elections.
Major technology and social-media companies— think Facebook, Apple, Microsoft, and Google— wield tremendous power. Given their reach, their financial heft, their importance to vast swaths of customers dependent on their goods, services, and platforms, and their ability to influence (if not altogether dictate) transnational public policy, these firms often look and act the part of proprietors, stewards, and even governors of digital public squares.
The world got a glimpse of Russian hybrid warfare ten years ago, and the lessons have never been more clear than they are today.
Recent stories about Amazon’s invasive face scanning surveillance technology and Cambridge Analytica’s exploitation of Facebook data have brought the impact of surveillance and data misuse to the fore. But many people don’t realize how often local law enforcement agencies acquire and use similar technologies in their own communities.