AI Exploits Human Emotions to Dominate Professional Poker and Chess Players

Gary Kasparov called chess "a very brutal form of psychological warfare" and, for him, it was. Kasparov was well known for intimidating his opponents. He had one trademark move in which he would pick up his watch, which he always placed on the table at the beginning of a match, and put it back on … Continue reading AI Exploits Human Emotions to Dominate Professional Poker and Chess Players

Naked Photos Used as Collateral by Chinese Online Moneylenders

China is in the process of changing from a producer-based economy to a consumer-based economy. But, among college-age students, this switch occurred years ago. In an effort to achieve status by possessing high-priced technology or luxury items, Chinese students have been taking out high-interest loans from online lending sites, often, with no intention of repaying … Continue reading Naked Photos Used as Collateral by Chinese Online Moneylenders

Hacking Romance

Think about it. Would you allow a computer geek you don't even know to arrange a blind date for you? Probably not. But that's exactly what you do when you use online dating sites. These sites use mathematics (algorithms) to recommend partners for you. Romance, in their view, is logical. Most dating sites using algorithms … Continue reading Hacking Romance

Make Millions Hacking. No Experience Necessary: The Emergence of Ransomware-as-a-Service

There's a sale going on that you probably haven't heard about. A hire-a-hacker site is offering a special low price for hacking any Facebook account you may want hacked. Yes, if you act now, this group of hackers will hack the Facebook account of your choice for a mere $600. (I will not give the … Continue reading Make Millions Hacking. No Experience Necessary: The Emergence of Ransomware-as-a-Service

Using Google Translate to Launch Phishing Attacks

Okay, it's no surprise that this attack begins with a phishing email. And it's certainly not an email that would fool a suspicious viewer, but it might get by a few users who aren't paying much attention. But judge for yourself. Here is what the email looks like on a computer. This copy is from … Continue reading Using Google Translate to Launch Phishing Attacks