MIT trained an AI to spot fake and biased news stories

MIT trained an AI to spot fake and biased news stories

WHY THIS MATTERS IN BRIEF Being able to detect and weed out fake news is quickly rising up the political agenda, and companies are in an arms race to try to find solutions fast.   Any fact-checker who works in the media has a straightforward but challenging job – make...

Read more
Futurist Keynote, Antwerp: Investing in the Future, Infosys Finacle

Futurist Keynote, Antwerp: Investing in the Future, Infosys Finacle

WHY THIS MATTERS IN BRIEF As the pace of change continues to accelerate many companies find keeping up with it a daunting prospect, and it’s no less of an issue for the financial services community.   Firstly, thank you to Bharadwaj and the team for inviting me to be this...

Read more
Sticky, evolving botnet gets top cyber experts worried about the future

Sticky, evolving botnet gets top cyber experts worried about the future

WHY THIS MATTERS IN BRIEF A new form of modular, multi-stage malware that’s capable of infecting anything and almost everything is getting cybersecurity experts worried.   A dangerous and potentially destructive new IoT malware sample has recently surfaced that for the first time this year is not just another cheap...

Read more
An immune system for the internet, new “good” malware surprises experts

An immune system for the internet, new “good” malware surprises experts

WHY THIS MATTERS IN BRIEF Cyber attacks are getting out of control, but evolving, roving “good samaritan” forms of malware could become the new cops of the internet and the future of cybersecurity.   Security researchers have discovered a very odd new botnet that, rather than posing a threat, seems...

Read more
Unhackable “Quantum Alphabet” encryption ushers in new era in cybersecurity

Unhackable “Quantum Alphabet” encryption ushers in new era in cybersecurity

WHY THIS MATTERS IN BRIEF Noone likes hackers, so everyone is trying to find ways to create the ultimate unhackable system, and this breakthrough in quantum mechanics could be one of the most promising.   In the wake of countless data breaches there has been a dramatic rise in the...

Read more
Estonia becomes the world’s first virtual nation capable of rebooting itself

Estonia becomes the world’s first virtual nation capable of rebooting itself

WHY THIS MATTERS IN BRIEF Technology is showing us how ancient the concept of the traditional nation state is, and as virtual nations take shape being able to reboot them in times of war is crucial.   How do you reboot an entire country? It’s an odd question, but in...

Read more
Telepathic warfare takes center stage as US military bets big on neuro tech

Telepathic warfare takes center stage as US military bets big on neuro tech

WHY THIS MATTERS IN BRIEF Today’s brain machine interfaces are rudimentary or require invasive surgery, this program could bring brain interfaces to the masses and be the next step in human-technological evolution.   Until now the advanced and cutting edge neuroscience programs at DARPA, the self proclaimed mad science wing...

Read more
IBM boosts the speed of homomorphic encryption by 75 percent

IBM boosts the speed of homomorphic encryption by 75 percent

WHY THIS MATTERS IN BRIEF Homomorphic encryption gives organisations a secure and easy way to run analytics on data without having to first decrypt it, but up until now it’s been oh so slow…   IBM has announced that it’s rewritten its C++ Homomorphic encryption library and claims that it...

Read more
IBM injected a virus into a neural net to create an undetectable cyberweapon

IBM injected a virus into a neural net to create an undetectable cyberweapon

WHY THIS MATTERS IN BRIEF Even today’s cutting edge cybersecurity products have no defence against virus laden, weaponised neural networks.   It’s been a very busy few weeks in the field of Artificial Intelligence (AI) and neural networks with the creation of the world’s first DNA neural network, and the world’s...

Read more
Hackers use data science to evade state of the art AI cybersecurity systems

Hackers use data science to evade state of the art AI cybersecurity systems

WHY THIS MATTERS IN BRIEF By figuring out what data sets cybersecurity are training their AI’s on hackers have found a way to create malware that can’t be detected.   Walking around the exhibition floor at this week’s massive Black Hat cybersecurity conference in Las Vegas many people were struck...

Read more
IBM finds a way to watermark AI’s to protect them from theft and sabotage

IBM finds a way to watermark AI’s to protect them from theft and sabotage

WHY THIS MATTERS IN BRIEF Creating complex neural networks and AI’s takes a lot of expertise, money and resources so being able to watermark them will help protect them from theft.   What if machine learning models, much like photographs, movies, music, and manuscripts, could be watermarked nearly imperceptibly to denote...

Read more
Blackhat hackers discover a way to turn satellites into “microwave weapons”

Blackhat hackers discover a way to turn satellites into “microwave weapons”

WHY THIS MATTERS IN BRIEF Satellites are ubiquitous and a newly discovered exploit could let hackers turn them into high frequency weapons that fry electronics on the ground.   As I discussed in a recent keynote on the future of cybersecurity, even air gaps, thought to be the ultimate in...

Read more
A controversial AI can allegedly reveal your personality from just a photo

A controversial AI can allegedly reveal your personality from just a photo

WHY THIS MATTERS IN BRIEF A system that can tell a persons personality from a photo can be used to help approve loans, provide better healthcare, and create smarter surveillance solutions.   In the past I’ve heard of Artificial Intelligent (AI) platforms that can, controversially, judge a persons character from...

Read more
Stopping the DIY bio-terrorists, US military embraces AI and Ginkgo Bioworks

Stopping the DIY bio-terrorists, US military embraces AI and Ginkgo Bioworks

WHY THIS MATTERS As the cost of powerful DIY gene editing kits continue to fall bioterrorism is going to be on the rise, so we need a way to defend against it.   Recently I gave a talk on the “Future of Cybersecurity” in the Critical National Infrastructure (CNI) sector...

Read more
Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

WHY THIS MATTERS IN BRIEF Industrial Control Systems (ICS) that enable the safe and efficient operation of our CNI assets are becoming increasingly smart and connected, making them more vulnerable to attack, and new technologies bring  new challenges.   Firstly, thanks to James for inviting me to be the keynote...

Read more
IBM joins Sovrin Foundation to give individuals back control of their data

IBM joins Sovrin Foundation to give individuals back control of their data

WHY THIS MATTERS IN BRIEF Today there is no way you can control who uses or shares your information, despite regulations like GDPR, but Self-Soverign ID systems like this one gives users the power to control their own online information.   It looks almost inevitable that Facebook will be punished,...

Read more
Reverse engineering computer chips just became ridiculously easy

Reverse engineering computer chips just became ridiculously easy

WHY THIS MATTERS IN BRIEF Computer chips are prized assets, but now reverse engineering them and spotting state sponsored built in security “Trojans,” are easier than ever before.   Peering inside semiconductor chips using X-Ray imaging isn’t new, but the technique hasn’t been especially good or easy to accomplish. New...

Read more
New quantum resistant crypto stops quantum computers spying on your data

New quantum resistant crypto stops quantum computers spying on your data

WHY THIS MATTERS IN BRIEF When large quantum computers come online circa 2025 over 70 percent of the world’s encryption will be at risk, so companies need to adopt new method to protect themselves and their data.   As quantum computing becomes an increasingly “real” technology, moving out of the...

Read more
Simple pixel hack cripples state of the art AI medical imaging systems

Simple pixel hack cripples state of the art AI medical imaging systems

WHY THIS MATTERS IN BRIEF As AI becomes increasingly pervasive in healthcare companies need to be aware that a new simple attack on their AI imaging and diagnostic systems could cause untold chaos, and even result in deaths.   Recently we’ve seen how a duelling AI that adjusted a pixel or...

Read more
Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

Hackers use 51 percent attack to commandeer three cryptocurrencies, steal millions

WHY THIS MATTERS IN BRIEF 51 percent attacks are rare, but as criminals continue to gain access to more computing power smaller cryptocurrency networks are in increasing danger of being comandeered.   This week not one but three cryptocurrencies, Bitcoin Gold, Verge Coin, and Monacoin, were hit with a rarely seen cyber...

Read more