TechLetters #140 Hospitals down after a cyberattack. New progress in extracting thoughts directly from the brain. Shor's algorithm improvement?
techletters.substack.com
Security Threat groups targeting security researchers. "based in an eastern European country, said he was followed on a skiing trip, received threatening phone calls and had to placate his wife after she was sent doctored pictures of him with a female employee … One researcher, based in eastern Europe, and who declined to be named, described coming home to find his home expertly rifled through by “well-trained, discreet and extremely professional” men, who disabled his home security, but missed a new nanny-cam that his wife had placed in a living room. Weeks before, he had identified a Russian government agency responsible for an espionage operation against a Nato government’s email systems. Following the search, his bank account was hacked, his company’s tax documents were doctored and released on the dark web, while his family photographs were traded as trophies on hacker networks
TechLetters #140 Hospitals down after a cyberattack. New progress in extracting thoughts directly from the brain. Shor's algorithm improvement?
TechLetters #140 Hospitals down after a…
TechLetters #140 Hospitals down after a cyberattack. New progress in extracting thoughts directly from the brain. Shor's algorithm improvement?
Security Threat groups targeting security researchers. "based in an eastern European country, said he was followed on a skiing trip, received threatening phone calls and had to placate his wife after she was sent doctored pictures of him with a female employee … One researcher, based in eastern Europe, and who declined to be named, described coming home to find his home expertly rifled through by “well-trained, discreet and extremely professional” men, who disabled his home security, but missed a new nanny-cam that his wife had placed in a living room. Weeks before, he had identified a Russian government agency responsible for an espionage operation against a Nato government’s email systems. Following the search, his bank account was hacked, his company’s tax documents were doctored and released on the dark web, while his family photographs were traded as trophies on hacker networks