Ten years ago, a researcher claimed most published research findings are false; now a decade later, his claim is stronger than ever before. How can this be?
"Richard Horton, the editor of The Lancet recently put it only slightly more mildly: "Much of the scientific literature, perhaps half, may simply be untrue." Horton agrees with Ioannidis' reasoning, blaming: "small sample sizes, tiny effects, invalid exploratory analyses, and flagrant conflicts of interest, together with an obsession for pursuing fashionable trends of dubious importance." Horton laments: "Science has taken a turn towards darkness.""
Do not ever use a random USB flash drive. There are plenty software exploits that can ruin your computer or life. And with this flash drive, it can physically..
"Put simply, the bits inside the USB drive draws and stores a ton of power. When a certain level is hit, it returns the power to the source, which is either a dedicated USB controller or the CPU itself. This is bad news bears. The amount of power returned overloads the circuits, rendering it useless. Since a lot of USB controllers are built directly into the main processor… bye bye computer."
Bien qu'indispensables au quotidien, les clés USB peuvent transmettre des virus informatiques.
Aujourd’hui, dans les entreprises, la clé USB est la bête noire des responsables informatiques. Certaines sociétés les ont carrément interdites en neutralisant les ports USB sur les ordinateurs. ... D'autres mettent à l'entrée des bornes de décontamination...
L’impact des algorithmes dans le compte rendu et la perception des événements de Ferguson, le récent scandale impliquant les tests de Facebook sur les émo
L'accès à l'information est essentielle pour le bon fonctionnement de nos démocraties... Que penser de cette personnalisation à outrance favorisée par les algorithmes qui nous poussent l'information que l'on souhaite voir et met de coté celle dont nous devrions toutefois avoir connaissance ?
La NSA placerait des mouchards au coeur de certains équipements informatiques fabriqués aux Etats-Unis, et destinés à l'exportation. Cette affirmation est extraite du livre que le journaliste Glenn Greenwald, qui a aidé Edward Snowden à révéler le fonctionnement de la surveillance massive...
“Le 6 juin 2013, la presse américaine révélait l'existence du programme de surveillance Prism, apportant un nouveau lexique de sigles et de noms devenus familiers. Retour sur une année d'espionnage et de sécurité en ligne.”
Anti-virus software has not evolved along with hackers' abilities to attack -- so much so that some are ready to read the computer programs their last rites. Continue reading →
A report published on Monday by RedSocks, a Netherlands-based company that specializes in malware detection, found that more than 25 percent of all malicious files went undetected by anti-virus software in January, February and March of 2014. “Protecting your data from Internet-based threats is not an easy task —- and relying on protection from Anti-Virus companies, no matter how established their brand, is simply not enough,” the report stated.""
Many organizations overlook the most critical threat to security, the internal threat
"A survey titled ‘Boardroom Cyber Watch 2013,’ conducted as an online survey by IT Governance, indicates that the outside threat-centric focus of organizations fails to provide a holistic security posturing, specifically from the threat within.
The survey notes:
More than half of respondents say that the greatest threat to their company’s data and computer systems in fact comes from their own employees.A quarter of respondents say their organization has received a concerted attack in the past 12 months. However, the true total may be higher, as over 20 percent are unsure if their organization has been subject to an attack."
According to retired U.S. Army General Stanley McChrystal, top-notch cybersecurity isn't modeled after the Maginot Line or a giant wall attempting to block outside forces from getting in. Instead, we need to design cybersecurity that acts like an immune system, learning on the go every time a new or unique challenge emerges.
I like the analogy between human body defense and human country defense... and of course the mention of the "ligne Maginot".
In early September 2013 WikiLeaks released its last batch of leaked Spy Files - which it had started releasing in 2011. To mark this anniversary, one of Silk's data journalists Alice Corona cleaned and structured the data to build an interactive database combining the three Spy Files releases.
The latest way to snoop on a computer is by measuring subtle changes in electrical potential as data is decrypted.
"Measuring the electrical potential leaked to your skin when you touch the metal chassis of such laptops, and analyzing that signal using sophisticated software, can be enough to determine the keys stored within, says Eran Tromer, a computer security expert at Tel Aviv University."
Des chercheurs du Laboratoire lorrain de recherches en informatique et ses applications (CNRS/Université de Lorraine/Inria) et du Laboratoire d'informatique de Paris 6 (CNRS/UPMC) viennent de résoudre un pan du problème...
Article invité, rédigé par David Carle ! L’analyse des concurrents est un élément essentiel de toute stratégie SEO. En effet, il est primordial d’étudier soigneusement le positionnement ainsi que les tactiques utilisées par les concurrents, afin de non seulement connaître … Lire la suite →
Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever
""this theorem of encryption security may be accepted as proven by math geniuses at Hollywood U., but reality is a bit murkier. Encryption isn't always perfect, and even when the core algorithms are truly solid, many other links in the chain can go kablooie. There are hundreds of steps and millions of lines of code protecting our secrets. If any one of them fails, the data can be as easy to read as the face of a five-year-old playing Go Fish.""
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.