Robot uses AI to personalize teaching of autistic children

Researchers have developed a new personalized learning robot for autistic children that uses machine learning to adapt its lessons to each kid’s changing needs. The University of Southern California team put a “socially assistive robot” called Kiwi in the homes of 17 autistic children and set the two-foot-tall, green-feathered robot to give each child personalized classes. Over the course of…

Why Minimizing Human Error is the Only Viable Defense Against Spear Phishing

Phishing attacks have become one of the business world’s top cybersecurity concerns. These social engineering attacks have been rising over the years, with the most recent report from the Anti-Phishing Working Group coalition identifying over 266,000 active spoofed websites, which is nearly double the number detected during Q4 2018. Hackers have evolved their methods, from…

Google Advises Android Developers to Encrypt App Data On Device

Google today published a blog post recommending mobile app developers to encrypt data that their apps generate on the users’ devices, especially when they use unprotected external storage that’s prone to hijacking. Moreover, considering that there are not many reference frameworks available for the same, Google also advised using an easy-to-implement security library available as…

‘Our vulnerability makes us strong’ – team LoRa urged to embrace fight and paranoia of open IoT

Amsterdam-based LoRaWAN group The Things Network (TTN) has instructed the IoT community at large to draw strength, as a collective working with open technologies, from its apparent weaknesses as a “vulnerable” loose-knit faction locked in innovation projects.   Wienke Giezeman, co-founder and chief executive at TTN, said IoT connectivity – along with IoT sensors and IoT…

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices

Cybersecurity researchers today uncovered a new high-severity hardware vulnerability residing in the widely-used Wi-Fi chips manufactured by Broadcom and Cypress—apparently powering over a billion devices, including smartphones, tablets, laptops, routers, and IoT gadgets. Dubbed ‘Kr00k‘ and tracked as CVE-2019-15126, the flaw could let nearby remote attackers intercept and decrypt some wireless network packets transmitted over-the-air…

‘Our vulnerability makes us strong’ – team LoRa urged to embrace fight and paranoia of open IoT

Amsterdam-based LoRaWAN group The Things Network (TTN) has instructed the IoT community at large to draw strength, as a collective working with open technologies, from its apparent weaknesses as a “vulnerable” loose-knit faction locked in innovation projects.   Wienke Giezeman, co-founder and chief executive at TTN, said IoT connectivity – along with IoT sensors and IoT…