Menu

Blog

Archive for the ‘mobile phones’ category: Page 155

Aug 7, 2019

AT&T Workers Installed Malware on Company Network for Cash

Posted by in categories: business, cybercrime/malcode, mobile phones

For five years, several AT&T employees were conspiring with a Pakistani man to install malware on company computers so that man could unlock millions of smartphones subsidized by the carrier, according to federal investigators.

On Tuesday, the Justice Department unsealed an indictment against Muhammad Fahd for bribing AT&T employees at a call center in Washington state to pull off the scheme. According to the feds, Fahd allegedly paid more than $1 million in bribes to the AT&T employees during the conspiracy, which allowed him to fraudulently unlock more than 2 million AT&T phones from 2012 to 2017.

Fahd allegedly partnered with businesses that offered cell phone unlocking services in exchange for a fee. These unnamed business would then supply him with the IMEI numbers of the phones bound to AT&T’s network.

Aug 6, 2019

Scientists can now manipulate brain cells using smartphone

Posted by in categories: biotech/medical, genetics, mobile phones, neuroscience

A soft neural implant that can be controlled by a smartphone is capable of drug delivery and optogenetics. The technology could speed up efforts to uncover the causes of neurological and psychological disorders.

Aug 5, 2019

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows… And His $9 Million WhatsApp Hacking Van

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he’s one of the good guys. It’s badly-behaved governments who should be in trouble, not the $12 billion industry he’s come to represent.

Aug 5, 2019

Frozen heads and future fortunes: what is the cost of digital information?

Posted by in categories: economics, mobile phones

With a seemingly infinite amount of knowledge available to us at the tap of a smartphone, we all take digital information for granted. But when it can be replicated at zero cost, how do the economic laws of supply and demand work, especially in the context of using digital currency?

Aug 4, 2019

The Futuresist Cure: Notes from the Front Lines of Transhumanism

Posted by in categories: biotech/medical, computing, mobile phones, transhumanism

On the heels of my latest New York Times OpEd, which is in print today on page 4 of the NYT Sunday Review, I’m excited to share my brand new book: The Futuresist Cure: Notes From the Front Lines of #Transhumanism. It’s a collection of my best essays on the future, many re-adapted, and many which have helped shape our movement. It’s #FREE today on Amazon in #Kindle. Or get the paperback version. There’s a foreword by the late Jacque Fresco. Download the book for FREE today!


Enter your mobile number or email address below and we’ll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer — no Kindle device required.

Aug 3, 2019

How to Hack a Face: From Facial Recognition to Facial Recreation

Posted by in categories: cybercrime/malcode, information science, mobile phones, privacy, robotics/AI, surveillance

Given that going viral on the Internet is often cyclical, it should come as no surprise that an app that made its debut in 2017 has once again surged in popularity. FaceApp applies various transformations to the image of any face, but the option that ages facial features has been especially popular. However, the fun has been accompanied by controversy; since biometric systems are replacing access passwords, is it wise to freely offer up our image and our personal data? The truth is that today the face is ceasing to be as non-transferable as it used to be, and in just a few years it could be more hackable than the password of a lifetime.

Our countenance is the most recognisable key to social relationships. We might have doubts when hearing a voice on the phone, but never when looking at the face of a familiar person. In the 1960s, a handful of pioneering researchers began training computers to recognise human faces, although it was not until the 1990s that this technology really began to take off. Facial recognition algorithms have improved to such an extent that since 1993 their error rate has been halved every two years. When it comes to recognising unfamiliar faces in laboratory experiments, today’s systems outperform human capabilities.

Continue reading “How to Hack a Face: From Facial Recognition to Facial Recreation” »

Jul 31, 2019

Soft wearable health monitor uses stretchable electronics

Posted by in categories: biotech/medical, computing, engineering, health, mobile phones, wearables

A wireless, wearable monitor built with stretchable electronics could allow comfortable, long-term health monitoring of adults, babies and small children without concern for skin injury or allergic reactions caused by conventional adhesive sensors with conductive gels.

The soft and conformable monitor can broadcast electrocardiogram (ECG), heart rate, respiratory rate and motion activity data as much as 15 meters to a portable recording device such as a smartphone or tablet computer. The electronics are mounted on a stretchable substrate and connected to gold, -like electrodes through printed connectors that can stretch with the medical film in which they are embedded.

“This health monitor has a key advantage for young children who are always moving, since the soft conformal device can accommodate that activity with a gentle integration onto the skin,” said Woon-Hong Yeo, an assistant professor in the George Woodruff School of Mechanical Engineering and Wallace H. Coulter Department of Biomedical Engineering at the Georgia Institute of Technology. “This is designed to meet the electronic health monitoring needs of people whose sensitive skin may be harmed by conventional monitors.”

Jul 30, 2019

Cell-Site Simulators/IMSI Catchers

Posted by in categories: law enforcement, mobile phones

NLP.


Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower.

Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections.

Continue reading “Cell-Site Simulators/IMSI Catchers” »

Jul 30, 2019

Electronic Harassment Must Stop‼️ Photo

Posted by in categories: mobile phones, surveillance

Do you know how to jam these?


Description:

The StingRay is an IMSI-catcher, a controversial cellular phone surveillance device, manufactured by Harris Corporation.

Jul 30, 2019

This AI detects 11 types of emotions from a selfie

Posted by in categories: mobile phones, robotics/AI

The machine learning models that can detect our face and movements are now part of our daily lives with smartphone features like face unlocking and Animoji. However, those AI models can’t predict how we feel by looking at our face. That’s where EmoNet comes in.

Researchers from the University of Colorado and Duke University have developed the neural net that can accurately classify images in 11 emotional categories. To train the model, researchers used 2,187 videos that were clearly classified into 27 distinct emotion categories including anxiety, surprise, and sadness.