Ubiquiti Networks has warned its customers about a worm targeting the company’s products by exploiting a critical vulnerability that was believed patched nearly a year ago. According to the wireless networking product manufacturer, the malware is designed to target routers, access points and other devices, running outdated versions of the airOS firmware, including airMAX M (airRouter), AirMAX AC, airOS 802.11G, ToughSwitch, airGateway and airFiber.
A group of researchers has released a data set on nearly 70,000 users of online dating site, OkCupid. The information was collected by Danish researchers who never contacted OkCupid, or its clientele, about using it. But in 2014 OkCupid admitted to manipulating what it shows users,
a month after Facebook faced a storm of protest by revealing that it had conducted psychological experiments.
After months of enquiry as to what provisions were being made with cognitive computing and cyber security, Big Blue has has announced a multi-year, cognitive computing collaboration with the University of Maryland in Baltimore on an Accelerated Cognitive Cybersecurity Laboratory (ACCL). The UK with several Universities and big corporates already on the cognitive route should be going the same path.
Edinburgh software house Ecometrica, based in London, Boston and Montreal, that allows businesses to analyse environmental data from space, is now targeting substantial growth in the UK and North America, having become the first Scottish company to receive funding from Clydesdale Bank’s new Emerging Technology Unit.
Twitter's first quarter results suggest that Sotirios Paroutis, Associate Professor of Strategic Management at Warwick Business School, who studies Twitter, is set to become the services Guru. "While competitors are moving faster in acquiring new users, it now seems marketers can utilise Twitter more effectively to run their campaigns,” he says.
Five of the eight largest healthcare security breaches that occurred since the beginning of 2010 – those with more than 1 million records reportedly compromised – took place during the first six months of 2015, according to IBM X-Force's "2016 Cyber Security Intelligence Index." And in 2015 overall, more than 100 million healthcare records reportedly were compromised, the report said.
The European Parliament has passed the final vote for the new GDPR (General Data Protection Regulation). These approved new data protection rules will strengthen online privacy, streamline legislation between the 28 member states and boost police and security cooperation.
Answers to technology problems are often reached by changing the accepted view of the issue to another slant or angle. Accordingly organised crime, it is urged, should be viewed as a business across Europe, in order to help crack down on activities such as drug-trafficking.
A painting, "The Next Rembrandt" was unveiled recently at an Amsterdam museum. It is not a newly discovered piece by the renowned Dutch painter, but a 3D print of an idealised version of a Rembrandt — as construed by software from angles and details contained in existing paintings and exemplifying the skills of DLAs (Deep Learning Algorithms) and 3D printers.
Australian computer programmer Julian Assange instigator of Wikileaks, has been put in the shade by what’s said to be the biggest data leak in history, aka the Panama Papers. An estimated 11.5M files from Mossack Fonseca, one of the world’s largest offshore law firms, was leaked, exposing off shore tax havens from many rich and powerful individuals around the world, including 12 national leaders – two being Russian President Vladimir Putin and Icelandic Prime Minister Sigmundur David Gunnlaugson. The documents show how Mossack Fonseca helped its clients to launder money, dodge sanctions, and evade tax for 40 years.
Computer scientists and software engineers know benchmarking (evaluating the running time of a piece of software, or the performance of a piece of hardware) is a common method for evaluating new techniques. However, there is little agreement on how benchmarking should be carried out, how to control for confounding variables, how to analyse latency data, or even how to aid the repeatability of experiments. There is an impressive role call of confirmed speakers.
In mid march, NRS (National Records of Scotland) recorded that Jack and Emily are Scotland’s top baby names and Smith the most common surname (taking Births, Marriages and Deaths together) But as March gives way to April, it’s no Huntie Gowk that has a computer virus shut down the genealogy records service.
The first scientific Roadmap for European Astrobiology published 21 March 2016. This strategic landmark for European astrobiology was produced through the European Commission-funded AstRoMap project (2013-2015). In putting this research roadmap document together, the 19 authors relied on the outcome and findings of the AstRoMap project as well as on wide community consultation and four disciplinary workshops organised between 2013 and 2014.
Varonis Systems Inc has revealed results of a year of anonymous data collected during risk assessments, conducted for potential customers on a limited subset of their file systems. The 2015 results show a staggering level of exposure in corporate file systems, including an average of 9.9 million files per assessment accessible by every company employee.
UK government is to set out a strategy by 2017 that aims at the UK becoming one of the "world leaders” in '5G' mobile wireless communications. The strategy is to be informed by recommendations made by the National Infrastructure Commission before the end of 2016 so that the Commission delivers in 2017 the 5G strategy recommendations according to chancellor George Osborne's Budget statement.
Researchers have used complex image analysis to uncover annotations that were hidden for nearly 500 years between the pages of England’s oldest printed bible. The annotations were discovered in England’s first printed Bible, published in 1535 by Henry VIII’s printer. It is one of just seven surviving copies, and is housed in Lambeth Palace Library, London. The secrets hidden in the Lambeth Library copy were revealed during research by Dr Eyal Poleg, a historian from Queen Mary University of London.
The shortlist for The 2016 Digital Technology Awards short list is announced with record entry numbers an increase of 50% on last year thanks to tech industry growth and now 15 categories include 3 new awards for this year. The Award ceremony held at Old FruitMarket Glasgow is on 20th April.
Reform Scotland believes that while new powers which bring the Scottish Parliament closer to raising the money it spends are always welcome, when those powers are insufficient to effect real reform we must be extremely careful how we use them. This briefing sets out why we think the devolution of income tax is a blunt instrument which does not offer the opportunity to create a better environment for economic growth. It therefore recommends that until the Scottish Parliament has control over a sufficiently varied basket of taxes, the Scottish Government should peg income tax in Scotland to the UK rate.
Scotland, Computer News in Scotland, Technology News in Scotland, Computing in Scotland, Web news in Scotland computers, Internet, Communications, advances in communications, communications in Scotland, Energy, Scottish energy, Materials, Biomedicine, Biomedicine in Scotland, articles in Biomedicine, Scottish business, business news in Scotland.