Home

With Immortality On The Horizon, Will We Be Able To Survive The New Technological Transition?

With Immortality On The Horizon, Will We Be Able To Survive The New Technological Transition?

  Mimetic Evolution or the collective will of humanity to imitate the most successful achievements of nature with technology, has finally set in. At this dawn of artificial intelligence humanity is trying to not only find its place again, but to do the inevitable, the inescapable – merging with the […]

What will the Human Legacy be when robots rule the world?

What will the Human Legacy be when robots rule the world?

While we have had many kinds of robots (and other computer-based assistants) for many decades, their abilities have remained limited. For example, if we weigh work tasks by how much we pay to get them done, we find that humans remain far more valuable than robots, because humans get paid […]

General AI: A summary of our approach

General AI: A summary of our approach

Here’s a fun activity. Get your camera phone ready, meetup with an Artificial Intelligence Scientist and ask them to define intelligence scientifically. Make sure you define scientifically as not using abstract words like “planning” and “reasoning”. Then, get your camera ready and take a picture of their facial expression. The […]

Is the Intel Management Engine a backdoor?

Is the Intel Management Engine a backdoor?

Is Intel’s Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Various sources report that Intel’s latest x86 chips contain a secret backdoor. SoftPedia cites security expert Damien Zammit as revealing that these Intel chips come with an embedded subsystem called the […]

WikiLeaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

WikiLeaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

https://www.washingtonpost.com/news/the-switch/wp/2017/03/07/why-the-cia-is-using-your-tvs-smartphones-and-cars-for-spying/   My thoughts: ANY device with a camera or microphone can be used to record/transmit images or sounds. This is especially true with surveillance devices and with “open mic” devices that perpetually have their microphones active to receive commands, such as information providers like Apple’s “Siri”, Android’s “Okay Google”, […]

Highlights from the Cisco 2017 Annual Cybersecurity Report

Highlights from the Cisco 2017 Annual Cybersecurity Report

Highlights from the Cisco 2017 Annual Cybersecurity Report

Simon Smith, Cybersecurity Master and Expert Witness sees signs ACORN has failed

Simon Smith, Cybersecurity Master and Expert Witness sees signs ACORN has failed

  In light of this article, it is already obvious to Cybersecurity experts that ACORN (Australian Cybercrime Online Reporting Network) is a complete failure – is this the sign? This is just a sample. So many people have complained to ACORN but surprisingly nobody has ever told me they got a […]

Will Machine Learning and AI create Infosec Super Humans?

Will Machine Learning and AI create Infosec Super Humans?

Security Ledger publisher and Editor in Chief Paul Roberts speaks with Dario Forte of DFLabs about the rise of machine learning in the information security space. Forte has a sunnier view of the role of the human operator alongside machines. Very interesting article!