Blog Tips
Simply click on the URL (http:// ...) link in each article to visit the article's page
To search this blog, try the Search Box on the right, or click on the Labels following each post entry
To search this blog, try the Search Box on the right, or click on the Labels following each post entry
10 March, 2017
Tesla chief executive Elon Musk has responded to a challenge from Atlassian's Mike Cannon-Brookes, and doubled down on his company's pledge to help solve South Australia's energy crisis. "Tesla will get the system installed and working 100 days from contract signature or it is free," Musk tweeted on Friday in response to earlier correspondence from the Sydney based software billionaire.
Founders entering the Techstars Adelaide accelerator will have access to two great start-up minds dedicated to helping them do more, faster.” The program, slated to kick off in July, will connect 10 start-ups from all over the world to a network of community founders, mentors, investors, and corporate partners including seven of the world’s top defence industry companies: BAE, Thales, Austal, SAAB, ASC, Rheinmetall and DCNS. “I’m looking for companies that will be of interest to the Australian military, but also have a broader purpose,” Mr Gold told News Corp. “I expect there’ll be some great South Australian companies, but we will almost certainly be bringing some companies here from around the world. “This is a once-in-a-lifetime opportunity for founders who want to develop and commercialise technologies such as internet of things, big data, sensors, drones and robotics.”
09 March, 2017
THE NSA, IT seems, isn’t the only American spy agency hacking the world. Judging by a new, nearly 9,000-page trove of secrets from WikiLeaks, the CIA has developed its own surprisingly wide array of intrusion tools, too. On Tuesday morning, WikiLeaks released what it’s calling Vault 7, an unprecedented collection of internal CIA files—what appear to be a kind of web-based Wiki—that catalog the agency’s apparent hacking techniques. And while the hoards of security researchers poring through the documents have yet to find any actual code among its spilled secrets, it details surprising capabilities, from dozens of exploits targeting Android and iOS to advanced PC-compromise techniques and detailed attempts to hack Samsung smart TVs, turning them into silent listening devices.
Labels:
Critical + Creative Thinking,
Cybersafety,
Ethical,
Privacy
06 March, 2017
Uber has for years engaged in a worldwide program to deceive authorities in markets where its low-cost ride-hailing service was being resisted by law enforcement, or in some instances, had been outright banned, including Australia. The program, which involves a tool called Greyball, uses data collected from Uber's app and other techniques to identify and circumvent officials. Uber used these to evade authorities in Australia, China, South Korea and Italy
Labels:
Cybersafety,
Ethical
“We always look to apps that can be part of popular culture. We believe that young women are the early adopters of popular culture, so one of the things we saw was that when we met the company, it was dominated in its usage by young woman, by high school girls,” he told CNN. “And whenever we see that, and we’ve seen it before, whether it was MySpace or Facebook or Instagram, that is a good predictor of what’s going to become popular culture in the future.”
Subscribe to:
Posts (Atom)