Posts

Showing posts from January 17, 2019

Please don’t pay $8,000 for an infusion of young blood

Image
Health There are so many better ways to spend your money. Ambrosia, a startup founded in 2017 by Jesse Karmazin (who went to medical school, but isn’t licensed to practice medicine), promotes its treatments based on the idea… via Popular Science "http://bit.ly/2T6aKxn"

Next-gen game consoles, folding phones, a new iPod, and the rest of the current tech rumors

Image
Gadgets Catch up on all the technology gossip without all the hype. Keep it real with your tech rumors. via Popular Science "http://bit.ly/2T09Wd7"

One-quarter of antibiotic prescriptions aren’t necessary

Image
Health And that's a conservative estimate. It’s easy to think of antibiotics as a default first step in treating whatever ambiguous cold-like illness you have this winter. But in recent years, as we’ve come to… via Popular Science "http://bit.ly/2RRubfW"

Saturn is ancient, but its rings are only as old as the dinosaurs

Image
Space How the gas giant got its rings. Saturn’s rings are one of the most gorgeous sights to behold in the solar system, but we’ve never quite understood their origin story. via Popular Science "http://bit.ly/2MhNqtV"

Artificial intelligence thinks your face is full of data. Could it actually unmask you?

Image
Technology Why humans, and by extension our machines, are so determined to “read” people. Looks can be deceiving. But humans, healthcare robots, and other emerging technologies are determined to read people like books. via Popular Science "http://bit.ly/2RSp9zz"

Daily Deal - SUNLESS SEA, 75% Off

Image
Today's Deal: Save 75% on SUNLESS SEA !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Saturday at 10AM Pacific Time via Steam RSS News Feed "http://bit.ly/2VYFvG2"

Weekend Deal - Dovetail Games Franchise, 75% Off

Image
Save up to 75% on Dovetail Games Franchise as part of this week's Weekend Deal*! *Offer ends Monday at 10AM Pacific Time via Steam RSS News Feed "http://bit.ly/2Fwv5Zr"

The best digital picture frames for all budgets

Image
Gadgets A.K.A. a gift guide for the sentimental. The best digital picture frames for all budgets so you can view all your favorite moments. via Popular Science "http://bit.ly/2AOqiyw"

Pre-Purchase Now - Endless Space® 2 - Penumbra & Endless Legend - Symbiosis, 10% off!

Image
Endless Space® 2 - Penumbra and Endless Legend - Symbiosis are Now Available for Pre-Purchase on Steam and are 10% off!* *Offer available during pre-purchase. via Steam RSS News Feed "http://bit.ly/2FyiCV0"

Sloths aren't the picky eaters we thought they were

Image
Animals When their favorite food isn't available, they will try something else. The authors of the paper looked at how the availability of different tree species, including those of the genus Cecropia, affected the survival and reproduction rates of… via Popular Science "http://bit.ly/2FzdDnb"

Four Technologies that will Increase Cybersecurity Risk in 2019

Image
Attackers are not just getting smarter, they are also using the most advanced technologies available, the same ones being used by security professionals – namely, artificial intelligence (AI) and machine learning (ML). Meanwhile, the widespread adoption of cloud, mobile and IoT technologies has created a sprawling IT attack surface that is getting harder to protect from cyber threats, since fixing every existing vulnerability in these infrastructures is unfeasible and impossible. Here are four ways attackers will exploit technology in new and creative ways over the next 12 months. AI Bias will Pose New Security Risks The bias issue is in its infancy now, but will grow rapidly this year and beyond. We can expect attackers to exploit the vulnerabilities associated with it. Since algorithms are being applied everywhere, bias will follow them. For example, for AI to function properly in cybersecurity, a continuous feed of quality data is required. Garbage in will produce garbage out

Strategies for Winning the Application Security Vulnerability Arms Race

Image
As cyber criminals continuously launch more sophisticated attacks, security teams increasingly struggle to keep up with the constant stream of security threats they must investigate and prioritize. When observing companies that have a large web presence (e.g., retail/e-commerce companies), consider the broad threat landscape at play. Web application attacks were responsible for 38 percent of the data breaches examined in the 2018 Verizon Data Breach Investigations Report (DBIR). To win the vulnerability arms race, security teams need to fight fire with fire by partnering with their own application development teams and enabling them to identify and fix security vulnerabilities in their code earlier in the development process. In doing so, organizations can resolve critical security vulnerabilities before applications move into production, greatly minimizing their risk for costly data breaches. Catching and resolving vulnerabilities earlier in the software development life cycle (SD

Strategies for Winning the Application Security Vulnerability Arms Race

Image
As cyber criminals continuously launch more sophisticated attacks, security teams increasingly struggle to keep up with the constant stream of security threats they must investigate and prioritize. When observing companies that have a large web presence (e.g., retail/e-commerce companies), consider the broad threat landscape at play. Web application attacks were responsible for 38 percent of the data breaches examined in the 2018 Verizon Data Breach Investigations Report (DBIR). To win the vulnerability arms race, security teams need to fight fire with fire by partnering with their own application development teams and enabling them to identify and fix security vulnerabilities in their code earlier in the development process. In doing so, organizations can resolve critical security vulnerabilities before applications move into production, greatly minimizing their risk for costly da

Four Technologies that will Increase Cybersecurity Risk in 2019

Image
Attackers are not just getting smarter, they are also using the most advanced technologies available, the same ones being used by security professionals – namely, artificial intelligence (AI) and machine learning (ML). Meanwhile, the widespread adoption of cloud, mobile and IoT technologies has created a sprawling IT attack surface that is getting harder to protect from cyber threats, since fixing every existing vulnerability in these infrastructures is unfeasible and impossible. Here are four ways attackers will exploit technology in new and creative ways over the next 12 months. AI Bias will Pose New Security Risks The bias issue is in its infancy now, but will grow rapidly this year and beyond. We can expect attackers to exploit the vulnerabilities associated with it. Since algorithms are being applied everywhere, bias will follow them. For example, for A

How to digitally secure your smart home

Image
DIY Protect your internet-connected devices. If you've filled your house with internet-connected gadgets, you need to make sure nobody can access them. Here's how to secure your smart home. via Popular Science "http://bit.ly/2AOdPuQ"

What actually works for muscle recovery—and what doesn’t

Image
Health Knowing which methods don’t help at all is just as important as knowing which ones work. The most painful part of a workout often comes after the exercise itself. The day after a hard run or an intense lifting session, almost everyone feels the pain… via Popular Science "http://bit.ly/2FCU6kV"