Medical devices have long been the locus of information security's scariest failures: from the testing and life-support equipment in hospitals to the implants that go in your body: these systems are often designed to harvest titanic amounts of data about you, data you're not allowed to see that's processed by code you're not allowed to audit, with potential felony prosecutions for security researchers who report defects in these systems (only partially mitigated by a limited exemption that expires next year). What's more, it can get much worse. (more…)
Friday, 26 May 2017
Popular Posts
-
Looking for something to illustrate a post about crunch-time in game development, I ran into this video depicting many forms of footwear (...
-
The guest this week on my Cool Tools show is Madeline Ashby . Madeline is a science fiction writer and futurist living in Toronto. Her mos...
-
The Sound Archive posted a 1930s-era recording of a conversation in a British pharmacy . The received-pronunciation chatter isn't quite ...
-
"Come and play with us, Danny... for ever, and ever, and ever." The bigscreen adaptation of Doctor Sleep , Stephen King's 201...
-
Writing in Marker, David Gauvey Herbert gives us an extended-play version of China's legendary bank-robber, Ren Xiaofeng, a bank officia...
-
Created as a stop-gap to save undocumented migrants from getting killed by cars on Interstate 5 near the San Diego area border with Mexico,...
-
Christopher Ferguson, an off-duty cop in Algood, Tenn., going 20 miles over the speed limit, will not be inconvenienced after ramming into ...
-
Martin from Antique Typewriters writes, "The Alexis typewriter is the result of a small town inventor with the desire to design and m...
-
In the course of any day, we encounter many different audio environments. If you are wearing earbuds, the ambient noise level can affect you...
-
Barry's Gold Blend is my favorite everyday black tea. A few weeks ago I was drinking PG Tips 'Extra Strong' as my beloved Bar...
Powered by Blogger.