Related topics: facebook · social networking · silicon valley · iphone · google

Five things to know about artificial intelligence and its use

In the sci-fi thriller "Ex Machina," the wonders and dangers of artificial intelligence are embodied in a beautiful, cunning android named Ava. She puts her electronic smarts to work with frightening results, manipulating ...

Cellphones can steal data from 'air-gapped computers'

Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...

Personnel office not the worst in terms of lax cybersecurity

The federal government has for years failed to take basic steps to protect its data from hackers and thieves, putting at risk everything from nuclear secrets to the private tax information of hundreds of millions of Americans, ...

Fed agency blames giant hack on 'neglected' security system

The agency that allowed hackers linked to China to steal private information about nearly every federal employee—and detailed personal histories of millions with security clearances—failed for years to take basic steps ...

Data deluge: MLB rolls out Statcast analytics on Tuesday

Which outfielder sprints the fastest and runs the longest to snag line drives into the gap? Which shortstop is best at throwing from the grass to nip the runner at first? Which catcher gets the ball to second base the quickest?

page 8 from 22