Predictive Analytics: New Technology That Can Read Your Mind

There is an application that can read your mind via your mobile device. The technological innovation is known as predictive analytics, and Google’s Now app is at the top edge. Other applications that carry out predictive analysis include Grokr and Osito: forecasting the smart phone user’s next move.

How does this work?

An algorithm, resulting in a forecast of the user’s next actions, builds snippets of details.

An example would be mixing snippets of calendar records with the user's place information, email details, online community posts and other like details.

Predictive-AnalyticsThe user is then provided with support the application “thinks” is needed. The support-information is known as a card. A card might, for example, remind the user about a meeting whose details was joined formerly.

The application will then add guidelines to the occasion or show varying climate circumstances at the location—even recommend raingear.

Benefits
  • The Google Now application can “understand” perspective and narrow out unrelated details, making searchers easier than ever.
  • The Google search engine can now react to more than just individual search phrases and can clearly understand the importance of a search for question. This algorithm is known as Hummingbird and 90 percent queries impact.


An example is that Google can evaluate items on demand or dig up information about various things. For example, just type in the name of a popular landmark—once. If you look for trivia, you will get solutions, but if you then look for directions, Google will know that you want guidelines to this landmark without you having to type in its name again.
  • Future locations of the user can be predicted (based on places visited previously), not just the current place.
  • Recently, Google and Microsoft researchers came up with software, Far Out, that can find out a user's schedule by means of GPS monitoring. This information is then formed so upcoming places of that user’s can be predicted.
  • The configuring can even adjust to link with the user's changes in property or office.


As innovative as all of this seems, this is only the start of a new trend of technological innovation that can “think” for us—a big benefit to those whose lifestyles are so stressful that they have become absentminded, and for those who simply enjoy the idea of having to do less mental work.

6 Signs of Digital Identity Theft

What would you do if you checked your financial bank account and saw a $0 balance? Identity theft is not too unusual of an incident these days, yet we often fall into the snare of thinking that it will always occur to “someone else”. Unfortunately, we are all somebody else’s “someone else”, which means identity theft can occur to you.

Your identity can be stolen in many ways. Criminals can grab your credit cards numbers when you buy on the Internet. They can also steal your identity through hackers, malware, and viruses. They can even manage you into providing up your private information without you even understanding that you are doing it.

Digital-Identity-TheftIdentity theft is like cancer. If you capture it beginning enough then you can lessen most of the destruction, but if you neglect the signs until its too late then your life just might be broken. Do not let it occur to you. Be on the lookout for these signs to best secure your money.

1: Unexplained Charges

If you ever have unexplained expenses on your credit or debit cards, that should be an immediate red flag. Does it mean that your identity has been stolen? No. It is possible, for example, that someone wrongly joined in their own credit cards number somewhere, and the resulting number occurred to be yours.

However, an unexplained cost points to fake action. Even if the cost is only for a few dollars, you should always follow up with an unusual purchase and find out where it came from. Some identity thieves will “test” credit credit cards with a few simple buys before going on an exercise. Do not delay until it is too delayed.
Call client support and they should be able to help you find out whether there is dubious action going on or if it was just an error.

Yahoo Encrypts Message Contents by default

Web services provider Yahoo declared that its email connections are now encrypted by default.Starting now, all access to Yahoo Mail will be encrypted. Jeff Bonforte, the company's senior vice president of communications products said, “We are using Transport Layer Security (TLS)/Secure Sockets Layer (SSL) with 2048 bit digital certificates."

"Yahoo Mail Standard email protocols such as IMAPv4, POP3 and SMTP will be encrypted. The security will apply to the web and mobile interfaces, protecting message content, attachments, calendar items, and contacts. Mobile applications will also be encrypted," Bonforte said.

Yahoo-encrypts-message-contents-defaultThe encryption program was announced in October last year. Following revelations by former United States National Security Agency (NSA) contractor Edward Snowden, government spies was in fact tapping network communications between Google, Yahoo, and other web providers' data centers.

Responding to the spy agency's interception of data center links, Google started encrypting all internal networks in November last year to halt the large-scale wiretapping.

Microsoft has also said it will provide encryption for its web services this year. Office 365 message encryption will be available for purchase in the first quarter of 2014, Microsoft said.

Why You Should Upgrade Your Windows XP

Microsoft will stop supporting Windows XP on April 8, 2014. End of support shows Microsoft Company will no more offer any technical support to companies or customers for Windows XP problems.

Even though Windows XP was released way in 2001, it is still an excellent operating system. It is stable, has a Start key and gets the job done. That is why there are many incredible number of computer systems that still have it set up. It is so popular, in fact, it is the second most operating system set up in the world, only a little bit behind Microsoft’s Windows 7 OS.

Windows-XP-Support-Ends-April-8-2014Unfortunately, this is not an excellent reason. The purpose until now has been extending the due period for when it would drop support for Windows XP, but now it seems they are going to kill it off. Microsoft will quit aiding Windows XP on April 8 2014. This is big information because it points out in about 4 months; there will be an incredible number of computer that are going to be vulnerable to hackers.

End of support shows Microsoft Company will no more offer any technical support to companies or customers for Windows XP problems. Besides and most importantly, Microsoft Company will no longer offer any protection patches or updates for the operating system. On top of that, you will not even be able to get Microsoft Security Essentials for Windows XP, the free antivirus application, after this date.

SCADA System Critically and Fully Controlled by Hackers

Over 60,000 exposed control systems found online. Researchers have found weaknesses in industrial control systems they say give complete control of systems running energy, chemical and transport systems.

Russian researchers whom throughout the last year probed popular and high-end ICS as well as Supervisory Control And Data Acquisition (SCADA) systems discovered the vulnerabilities. It used to overpower everything from home solar panel installations to critical national infrastructure.

Scada-System-HackedPositive Research chief technology officer Sergey Gordeychik and consultant Gleb Gritsai detailed vulnerabilities in Siemens WinCC software. The elaborated weaknesses were used in industrial control systems including Iran's Natanz nuclear plant that was targeted by the US Stuxnet program.

Gordeychik said, "We do not have big experience in nuclear industry, but for energy, oil and gas, chemical and transport, we showed to owners how to get full control of industrial infrastructure with all the attendant risks." The vulnerabilities been around in the way passwords were encrypted and stored in the software's Project database and let attackers to gain complete access to Programmable Logic Controllers (PLCs) using attacks referred to as dangerous and easy to launch.

Phone Numbers are Helpful Information to Hackers

Although many people would not give their phone number to an unknown person on the road, they are contented to share their numbers with Facebook, Google, and added sites. However, as millions of immature Snapchat users simply educated, phone numbers are helpful information to hackers.

On Wednesday, Snapchat happened to be the first corporation to have its important information hacked in 2014. Almost 5 million account consumer names and partial phone numbers were sent online as a forewarning to those making use of the photograph messaging service. “Our inspiration behind the publication was to raise the public awareness about the issue, as well as put public strain on Snapchat to get this develop fixed,” the suspected hackers told tech site TheVerge.com . The spokesperson for Snapchat refused to comment, although the company unconfined a blog post saying its supplementary counteractions “to fight abuse and spam.”

Hacking phone numbersConsumers are meant to be cagey about sharing their phone numbers, security experts say. “Phone contacts are unique identifiers that lean to last for an extended time,” utters Michael Fertik, CEO at Reputation.com, and a site that helps consumers protecting their privacy online. “You change your phone number a lot less often than your IP address as well as probably even your residential address” when Snapchat users have fake user names. Many citizens use the equivalent I.D. across various social networks, states Graham Cluley, a U.K. safety blogger and technology counselor. “Use a different user I.D. than the one you makes use of publicly on Facebook as well as Twitter,” he says. What is added, typing just a cell phone number to the Facebook will expose the profiles of the owner if they added it to their account data.

Facebook is Facing Lawsuit for Reading Private Messages

Social network beast Facebook is now being charged in California by two consumers who declare the corporation intercepts “substance of …users’ communications.”

Facebook LawsuitAccording to the class action court case, started by Matthew Campbell and Michael Hurley, Facebook has allegedly driven against the Electronic Communications Privacy Act as well as many California state laws.
The basis of the pretenders’ grievance is that Facebook’s use of the phrase “private” is ambiguous when applied to its individual internal messaging program.

Campbell besides Hurley claims the corporation scans confidential messages to be aware of any URLs contained by them. The plaintiffs’ further assert the business follows links that it discovers as part of the swarming procedure, which it has not clearly disclosed to consumers of its service.

Researchers said Self-driving Cars be Autonomous by 2050

New research by IHS Automotive states that by 2025, a mere 11 years from now, there will be 230,000 self-driving cars on earth's roadways. By 2035, 9.2-percent of new cars sold will likely self-directed, as costs are driven down to only $3,000 more than a traditionally controlled car.

Self-driving Cars Autonomous by 2050We are probably to be obsolete soon. Ten years beyond the predicted date, the number will puff up to 11.8 million, although exclusive select models will do without having any traditional means of human control through 2030. By the middle of the 21st century, almost every car on the road will likely be of the self-directed variety.

This may only be a study for now, but it is the one that we think might hold some water. Several traditional manufacturers are getting into autonomous-vehicle projects, and they are being joined by players like tech giant Google with many major industry manufacturers.

Yahoo.com Visitors Hit by Malware Attack

Two Internet security companies have stated that Yahoo's advertising and marketing servers were spreading malware to several a huge numbers of users during the last few days. The attack is the work of malicious people whom have stolen Yahoo's advertising network for their ends.

Fox IT, a security company found in the Netherlands, published a blog post on Friday explaining the problem. "Clients browsing Yahoo.com received advertisements served by ads.yahoo.com. A few of the advertisements be malicious," the company reported. Rather than providing ordinary advertisements, the Yahoo's servers reportedly forward users an "exploit kit" that "exploits vulnerabilities in Java and installs a host of various malware."

Yahoo.com hit by malware attackAshkan Soltani, a security researcher and Washington Post contributor, alerted me to the issue. Often, he says, these attacks are "the results of hacking an existing advertisement network. However, there is another possibility," he says. The offenders may have merely sent the harmful software as ordinary advertisements, coming past Yahoo's system for removing malicious submissions.

Hackers can penetrate your system using SD Card

Flash memory is inexpensive. The attackers properly changing the firmware might hack any device that uses the compromised SD card (e.g. a mobile device, Wi-Fi equipped camera); the flash memory will show up to be running normally while hacking the hosting equipment.

The hardware hacker Bunnie Huang presented during the Chaos Computer Club Congress how to exploit SD cards micro controlled for malicious purposes.

Just how are you able to exploit SD Card, USB stick with other mobile devices for hacking? Another interesting hack ended being presented at the Chaos Computer Congress (30C3), in Hamburg, Germany. Recently, a post on a hack against ATMs by means of infected USB sticks published.

flsh cardsThe researchers explained how exactly to hack the microcontroller inside every SD as well as microSD flash cards to understand someone in the middle attack.

SD cards have powerful micro controllers, which are exploitable by hackers to ensure they are insecure.
The hacker, Bunnie Huang described the process to get it done and published the topic. To reduce SD cards price and increase their storage capability, engineers need to think about a form of internal entropy that would affect data stability on every Flash drive.

Russia’s Satellite GLONASS, Ban in the US

"One reason we began placing our own satellite navigation was that, first, we don't need to depend on the prospect of being stop because it may occur to the Americans to do, and, second, we wish to rule out wherever the GPS may well be used to spy on the movements of a number of our sensitive shipments or peoples',"

Alexander Vlasov, marketing Director for the Grotek company told the Voice of Russia.
The United States doesn't want GLONASS stations on its territory. Americans are afraid that Russia's GLONASS global satellite navigation system might be used to spy on the US. No official ban has been imposed, but the new requirements that have been suggests now create the placement of ground-based tracking stations next to impossible.

Russia's Satellite GLONASSThe 2014 defense bill signed by President Barack Obama rules the navigation systems of other countries should not harm the American GPS system by creating it less commercially engaging and obliged to broadcast solely uncodified data.

Despite that unfriendly gesture towards GLONASS, satellite navigation is a sphere where cooperation and teamwork ought to prevail, Alexei Smyatskikh, General Director of the Space Team holding, told the Voice of Russia.


"There aren't any controls on GPS signal reception or use in Russia or anyplace in the world. We have always been open to cooperation. All specialists have always said and continue saying that customers will benefit much more by using each systems - the GLONASS-GPS combination - than by using only one," Smyatskikh said.

The Russian side applied for permission to create GLONASS tracking stations on US soil in May 2012.
The US State Department was about to grant it but faced strong criticism from Congress and the Pentagon amid fears that Russia may potentially use those stations for spying on the US, so a clause in the defense bill requiring that foreign satellite navigation systems broadcast only uncodified data.

The problem is, however, the American side too can use its GPS system for military works. So, should Russia respond?

Neuroscientists Can Implant Fake Memories into your Brain

Neuroscientists of MIT can now implant fake memories into your brain and cure those with emotional problems such as posttraumatic stress disorder (PTSD) which includes recollecting “unwanted memories”.

Scientists at the Massachusetts Institute of Technology (MIT) have designed a technique to implant fake memories into the minds of laboratory rats.

Steven Ramirez, lead author of the study from MIT identified brain associated with particular remembrances and used a technique to alter the rat’s memory once it was separated.

neuroscientists implanted fake memory into the brainIn concept, this experiment could be recreated on human subject and have an identical success. Ramirez wants that this study would lay a base of future research that could become a treatment for psychologically disrupted individuals. Cure those with emotional problems such as posttraumatic stress disorder (PTSD) which includes recollecting “unwanted memories”.

In the laboratory, Ramirez’ group used optogenetics which uses light to turn on or off brain cells with an optical fibers that is proven straight into the hippocampus (the area of the brain that controls the formation of new memories).

Optical Coherence Tomography (OCT): A new optical device to scan eye disease

A new optical device puts the ability to find eye disease within the palm of a hand. The tool, about the size of a handheld video camera scans a patient's entire retina in seconds. If found something, doctors will aid the patients within the early detection of retinal diseases as well as diabetic retinopathy, glaucoma and macular degeneration. Researchers at the Massachusetts Institute of Technology (MIT) describe their new ophthalmic-screening instrument during a paper published today within the open-access journal Biomedical Optics express, published by The Optical Society (OSA).

Portable Optical Coherence Tomography
Power grip style (A-B) and
camcorder style design (C-D)
of the prototype OCT scanner
(Credit: Biomedical Optics Express)
Although alternative research groups and companies have created handheld devices using similar technology, the new design is the first to mix innovative technologies like ultrahigh-speed 3D imaging, a little micro-electro-mechanical systems (MEMS) mirror for scanning, and a method to correct for unintentional movement by the patient. These innovations, the authors say, ought to allow clinicians to gather comprehensive data with only one measurement.

Normally, to diagnose retinal diseases, an ophthalmologist or optometrist should examine the patient in his or her workplace, with tabletop instruments. However, few people visit these specialists often. To improve public access to eye care, the MIT group, with the University of Erlangen and Praevium/Thorlabs, has developed a transportable instrument that may be taken outside a specialist's workplace.


"Handheld instruments will enable screening a wider population outside the normal points of care," said researcher James Fujimoto of MIT, an author on the biomedical Optics Express paper. For example, they will be used at a primary-care doctor's workplace, a pediatrician's office or perhaps in the developing world.