6 private links
A Stigler Center panel explores the implications of big data for competition policy and for consumer welfare. The business model at the heart of the digital economy is a simple one: Internet giants such as Google and Facebook provide consumers with “free” services—free email, free GPS, free instant messaging, free search—and in return consumers consent to hand over vast amounts of their own data, which the companies then use to target advertisers. This exchange helped make data the “new” oil, creating “new infrastructure, new businesses, new monopolies, new politics and—crucially—new economics,” according to The Economist. To a large degree, …
The next great Google product offers a window into a company reshaping itself around images, AI, and even more of your data
This is Hoffman's largest personal investment to date.
Boss says power cut behind IT problem which saw all flights from Heathrow and Gatwick cancelled.
Share Lab uses flow charts and data analysis to map one of the greatest forces shaping our world - Facebook.
Cette start-up française propose aux partis politiques d'utiliser le big data pour gagner de nouveaux électeurs. Emmanuel Macron s'est offert ses services pour la présidentielle de 2017.
Linux System Optimizer and Monitoring
MouseJack is a class of vulnerabilities that affects the vast majority of wireless, non-Bluetooth keyboards and mice. These peripherals are 'connected' to a host computer using a radio transceiver, commonly a small USB dongle. Since the connection is wireless, and mouse movements and keystrokes are sent over the air, it is possible to compromise a victim's computer by transmitting specially-crafted radio signals using a device which costs as little as $15.
An attacker can launch the attack from up to 100 meters away. The attacker is able to take control of the target computer, without physically being in front of it, and type arbitrary text or send scripted commands. It is therefore possible to perform rapidly malicious activities without being detected. The MouseJack exploit centers around injecting unencrypted keystrokes into a target computer. Mouse movements are usually sent unencrypted, and keystrokes are often encrypted (to prevent eavesdropping what is being typed). However the MouseJack vulnerability takes advantage of affected receiver dongles, and their associated software, allowing unencrypted keystrokes transmitted by an attacker to be passed on to the computer's operating system as if the victim had legitimately typed them.
Cloak & Dagger is a new class of potential attacks affecting Android devices. These attacks allow a malicious app to completely control the UI feedback loop and take over the device — without giving the user a chance to notice the malicious activity. These attacks only require two permissions that, in case the app is installed from the Play Store, the user does not need to explicitly grant and for which she is not even notified. Our user study indicates that these attacks are practical. These attacks affect all recent versions of Android (including the latest version, Android 7.1.2), and they are yet to be fixed.
The government of the autonomous region of Galicia (Spain) will continue to encourage the use of free and open source software solutions in the public and private sector. This week, the government published the ‘Free Software Plan 2017’, outlining 110 actions.
A judge presiding over a child pornography case that was set in motion in 2012 has ruled that users have no legal expectation of privacy when they hand over their computers to Best Buy's Geek Squad IT technicians.