Goto

Collaborating Authors

 harkin


Mum of two left penniless by Tinder scammer

BBC News

A mother of two says she was left penniless after giving her savings to Tinder predator Christopher Harkins in a fake investment scam. The pair matched on the dating app in London in 2020. Caitlyn - not her real name - told how the fraudster and rapist initially tried to talk her into going on holiday with him - a regular ruse of Harkins, now 38. When she said she couldn't afford a holiday, he offered to help by doubling what money she had via his foreign currency exchange business. She's one of four women the BBC is aware of who were targeted by Harkins in the capital - where he fled to after his crimes were exposed in Scotland.


Get Ready. 2019 Predictions About Artificial Intelligence That Will Make Your Head Spin

#artificialintelligence

A staff member stands near a computer as it participates in the CHAIN Cup at the China National Convention Center in Beijing. A computer running artificial intelligence software defeated two teams of human doctors in accurately recognizing maladies in magnetic resonance images on Saturday, in a contest that was billed as the world's first competition in neuroimaging between AI and human experts. While the hip, ubiquitous business buzzwords are cryptocurrency and blockchain, the truly formidable factor of what is being called the fourth industrial revolution is Artificial Intelligence. Whether praised as a panacea for greater business efficiency or the feared as the demise of humanity, Artificial Intelligence is upon us and will impact business and society at large in ways that we can only begin to imagine. Here's what a few influencers in the arena say is on tap for 2019. First, Ibrahim Haddad, Director of Research at The Linux Foundation says that there are two key areas to watch.


Reinventing and Scaling the SOC with AI: Helping Humans, Not Replacing Them

#artificialintelligence

When it comes to cybersecurity, there are no rules. You can't write rules that will differentiate good guys from bad guys on the Internet. That's because the bad guys keep changing tactics, learning from their mistakes, and getting smart. You can't write rules that will filter out all the malicious or phishing emails. You can't write rules that will filter out malware in email attachments, or block fake websites, or say, "This is a safe packet payload, and this is a dangerous packet payload."


Experts hash out next-generation cyber defenses -- GCN

#artificialintelligence

"There are only two types of networks, those that have been compromised and those that are compromised without the operator's awareness," wrote James Scott, senior fellow at the Institute for Critical Infrastructure Technology, in a collection of essays on next-generation cyber defenses. The writers, ICIT fellows and industry security experts, voiced a common theme: Cyber threats continue to pervade government systems and no one solution is a cure-all. The government sector is second only to the health care industry in system vulnerability and susceptibility to attack, based on total records breached, Scott wrote. In 2016, 36.6 million records were exposed, 13.9 million of which came from government systems. Between 2010 and 2016, he said, federal and state agencies publicly disclosed 203 breaches, and there was a 40 percent increase in public-sector data breaches in 2016.