Robots for kids: Best STEM kits and other tech gifts for hackers of all ages

All the signs were there. If my parents knew then what parents know now, they would have been prepared. But back in the 1960s and 1970s, the maker movement was…

Singapore to develop mobile defence systems with Ghost Robotics

Singapore’s Defence Science and Technology Agency (DSTA) has inked a partnership with Philadelphia-based Ghost Robotics to identify uses cases involving legged robots for security, defence, and humanitarian applications. They will…

Taking Breach Prevention to the Next Level with Morphisec

A successful security breach brings with it a host of legal and financial ramifications, including cleanup costs paid to remediation vendors and possible penalties from the exfiltration of sensitive data.…

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’

Padlokr –  Padlokr –  Toby Walsh, UNSW Last year, according to a United Nations report published in March, Libyan government forces hunted down rebel forces using “lethal autonomous weapons systems”…

Crackonosh: A New Malware Distributed in Cracked Software

Avast –  Avast –  We recently became aware of customer reports advising that Avast antivirus was missing from their systems – like the following example from Reddit. From Reddit We…

Deanonymizing Tor using ML

Standard Tor Traffic and Machine Learning /ML/  Unlike conventional non-Tor encrypted traffic that comes with openly visible destination attributes such as IP addresses (both source and destination) and port number,…