IBM Watson

Watson, the IBM computer that will compete on Jeopardy!, represents an impressive leap forward in analytics and systems design. The underlying DeepQA architecture is designed to find the meaning behind a question posed in natural language and deliver a single, precise answer.

Source: IBM Watson

Break Out The Aluminum Foil To Secure Yourself From Hackers – Autoblog

Some basic electronic gear is all tech-minded car thieves would need to steal many recent models, according to Swiss researchers. They successfully hacked into 10 vehicles from eight manufacturers in the latest of a growing number of studies exposing potential security risks as vehicles become more computerized and connected.

Source: Break Out The Aluminum Foil To Secure Yourself From Hackers – Autoblog

 

There is something to be said for “old” security systems, like physical keys and actually keeping secrets to yourself in your head.

$15 phone, 3 minutes all that’s needed to eavesdrop on GSM call | Ars Technica

“There is one key used for communication between the operators and the SIM card that is very well protected, because that protects their monetary interest,” Nohl said. “The other key is less well protected, because it only protects your private data.”

Source: $15 phone, 3 minutes all that’s needed to eavesdrop on GSM call | Ars Technica

Just because you pay for a service (or device) doesn’t mean you can trust it.