recentpopularlog in

pierredv : wired   18

Infoporn: 100 Years of Sci-Fi, Explored | WIRED Mar 2019
"Using data scraping, network analysis, and machine learning, the Science Fiction Concept Corpus includes more than 2,600 books written since 1900. Here's what we found."

"The Science Fiction Concept Corpus is built on plot descriptions, reviews, and user-generated tags scraped from Goodreads, sci-fi forums, and other sources. "
Wired  Sci-Fi  resources  corpora 
3 minutes ago by pierredv
Hackers Made an App That Kills to Prove a Point | WIRED, Jul 2019
"... yet months of negotiations with Medtronic and regulators to implement a fix proved fruitless. So the researchers resorted to drastic measures. They built an Android app that could use the flaws to kill people."

"The researchers, who also include Jesse Young and Carl Schuett, say they found it easy to reverse engineer the simple encoding and validity checks meant to protect the signal, enabling an attacker to capture the fob's commands. A hacker could then use readily available, open source software to program a radio that masquerades as a legitimate MiniMed remote, and send commands that the pumps will trust and execute. After establishing that initial contact, hackers can then control that radio through a simple smartphone app to launch attacks"

"Both Medtronic and regulators acknowledge that there is no way to patch the flaws on the affected insulin pump models, or to completely disable the remote feature. "

"Rios says the research group demonstrated its proof of concept app to FDA officials in mid-June of this year; Medtronic announced its voluntary recall program a week later. "
hacking  security  cyber-spectrum  Wired  Medtronic  vulnerability 
july 2019 by pierredv
Genome Hackers Show No One’s DNA Is Anonymous Anymore | WIRED, Oct 2018
"Those interlocking family trees, connecting people through bits of DNA, have now grown so big that they can be used to find more than half the US population. In fact, according to new research led by Erlich, published today in Science, more than 60 percent of Americans with European ancestry can be identified through their DNA using open genetic genealogy databases, regardless of whether they’ve ever sent in a spit kit."
privacy  genomics  Wired 
october 2018 by pierredv
Go Ahead, Hackers. Break My Heart | WIRED
"I realized that my heart was now wired into the medical Internet of Things, and this was done without informing me or asking for my consent."

"Part of the problem with doing security research in this field is that the medical devices appear as black boxes. How can I trust the machine inside my body when it is running on proprietary code and there is no transparency? . . . A significant battle was, however, won when the DMCA exemptions for medical device security research were granted in October of last year."

"The medical device industry got a wake-up call last year when researcher Billy Rios demonstrated that drug infusion pumps had vulnerabilities that would allow unauthorized firmware updates that could give patients lethal medication dosages."
Wired  IoT  hacking  healthcare  medical-devices  DMCA  cybersecurity 
february 2017 by pierredv
Hacker Spoofs Cell Phone Tower to Intercept Calls | WIRED Jul 2010
"A security researcher created a cell phone base station that tricks cell phones into routing their outbound calls through his device, allowing someone to intercept even encrypted calls in the clear."
Only works for 2G GSM
SDR  cellular  IMSI-catchers  Stingray  Wired  GSM  hacking 
august 2016 by pierredv
Let’s Bring The Polymath — and the Dabblers — Back | Opinion | WIRED
Focus on tools, not fields "Simply put, there are fields that have a certain generalizability, and their organizing ideas and tools can be used to find relationships between disparate areas. " "So how do we train people for this kind of thinking? The Girl Scouts once offered a fascinating merit badge: the Dabbler badge."
knowledge  science  modularity  complexity  publishing  Samuel.Arbesman  wired 
july 2014 by pierredv
How America's Soldiers Fight for the Spectrum on the Battlefield | Threat Level |
"It is well known that America’s military dominates both the air and the sea. What’s less celebrated is that the US has also dominated the spectrum, a feat that is just as critical to the success of operations. Communications, navigation, battlefield logistics, precision munitions—all of these depend on complete and unfettered access to the spectrum, territory that must be vigilantly defended from enemy combatants. " "Yet despite the importance of this crucial resource, America’s grip on the spectrum has never been more tenuous." "The American military is scrambling to develop new tools and techniques that will help it preserve its electromagnetic edge. But that edge continues to shrink by the day, and very soon our inability to completely control the spectrum might result in a different kind of war."
history  spectrum  jamming  ex  Wired  via  Robert  Horvitz  cyberwar  Iraq  China  Afghanistan  GPS 
february 2014 by pierredv
Someone's Been Siphoning Data Through a Huge Security Hole in the Internet | Threat Level | Dec 2013
Quotes: Earlier this year, researchers say, someone mysteriously hijacked internet traffic headed to government agencies, corporate offices and other recipients in the U.S. and elsewhere and redirected it to Belarus and Iceland, before sending it on its way to its legitimate destinations. They did so repeatedly over several months. BGP eavesdropping has long been a known weakness, but no one is known to have intentionally exploited it like this until now. The technique doesn’t attack a bug or flaw in BGP, but simply takes advantage of the fact that BGP’s architecture is based on trust. To intercept data, anyone with a BGP router or control of a BGP router could send out an announcement for a range of IP addresses he wished to target that was narrower than the chunk advertised by other network routers. The announcement would take just minutes to propagate worldwide and, just like that, data that should have headed to those networks would begin arriving to the eavesdropper’s router in
BGP  cybersecurity  man-in-the-middle  eavesdropping  internet  traffic  Renesys  ex  Wired 
december 2013 by pierredv
Now That It's in the Broadband Game, Google Flip-Flops on Network Neutrality | Threat Level | Jul 2012
"In a dramatic about-face on a key internet issue yesterday, Google told the FCC that the network neutrality rules Google once championed don’t give citizens the right to run servers on their home broadband connections, and that the Google Fiber network is perfectly within its rights to prohibit customers from attaching the legal devices of their choice to its network. At issue is Google Fiber’s Terms of Service, which contains a broad prohibition against customers attaching “servers” to its ultrafast 1 Gbps network in Kansas City. Google wants to ban the use of servers because it plans to offer a business class offering in the future. A potential customer, Douglas McClendon, filed a complaint against the policy in 2012 with the FCC, which eventually ordered Google to explain its reasoning by July 29. In its response, Google defended its sweeping ban by citing the very ISPs it opposed through the years-long fight for rules that require broadband providers to treat all packets equ...
Google  Fiber  Apple  netneutrality  FCC  Google  ex  Wired  Slingbox 
july 2013 by pierredv
In Silicon Valley, Meditation Is No Fad. It Could Make Your Career | Wired Business |
"More than a thousand Googlers have been through Search Inside Yourself training. Another 400 or so are on the waiting list and take classes like Neural Self-Hacking and Managing Your Energy in the meantime. Then there is the company’s bimonthly series of “mindful lunches,” conducted in complete silence except for the ringing of prayer bells, which began after the Zen monk Thich Nhat Hanh visited in 2011. The search giant even recently built a labyrinth for walking meditations."
meditation  Google  ex  Wired 
july 2013 by pierredv

Copy this bookmark:

to read