Utility

Mind: Neuroscience Has a Lot To Learn from Buddhism Data: 6 Types of Data Roles…Explained Through Star Wars Characters  Education: Machine Learning 101 [you’ll need 2 hours of undivided attention]

Read more Utility

What ‘Fight Club’ Taught Me About Protecting My Online Personas

Published @ The Last Watchdog Dissociative identity disorder, AKA multiple personality disorder, is a human condition by which the victim’s personality becomes fragmented into two or more distinctive states. DID has long been a rich topic for Hollywood screen writers. The movie Fight Club, in which Edward Norton and Brad Pitt portray polar opposite personalities…

Read more What ‘Fight Club’ Taught Me About Protecting My Online Personas

For Apple, Perfection Has A Price

Last week, Apple lost control of its iPhone Secure Enclave Processor encryption key when a hacker, “xerub”, released the key. According to analysts, the release of the encryption key isn’t going to effect user data but it does bring into question one of Apple’s main selling points – security. This may help to boost the…

Read more For Apple, Perfection Has A Price

Is Mastercard Bridging the Gap From Passwords to Biometrics?

Published @ BiometricUpdate MasterCard rolled out an interesting initiative a few weeks back in South Africa. The company developed cards with an additional layer of security to counteract fraud — a biometric fingerprint sensor. By combining chip technology with your fingerprint, the company can now verify the cardholder’s identity for in-store purchases. The process is…

Read more Is Mastercard Bridging the Gap From Passwords to Biometrics?

The Fate of the Furious Makes It Clear: Cyber Insurance Needs Uncommon Solutions

Published @ AlleyWatch “It’s Zombie Time.” – Cipher | The Fate and Furious (2017) Those are the words during the zombie car chase scene that cyberterrorist Cipher (Charlize Theron) uttered when she hacked hundreds of cars in a New York City car chase where Dominic Torreto (Vin Diesel) had to chase an armored limo to…

Read more The Fate of the Furious Makes It Clear: Cyber Insurance Needs Uncommon Solutions

V2V Communication Protocol & the Three Pillars of Autonomous Vehicles

Republished from IoTOne Think about what Wi-Fi, laptops, and the Internet did for social networks. It not only created a better avenue for communication but also efficiency to help launch some of the greatest companies today. Such is the theoretical promise of embedded sensors, cameras, and communication devices that will help autonomous motor vehicles “talk”…

Read more V2V Communication Protocol & the Three Pillars of Autonomous Vehicles

A Most Beautiful Exploit

Report – “Jump Over ASLR: Attacking Branch Predictors to Bypass ASLR.” Being a State University of New York at Binghamton alumnus, I’m quite proud and worried about a report that was recently published by researchers from the school and the University of California at Riverside. The researchers have devised a technique that can bypass important…

Read more A Most Beautiful Exploit