More and more people are mining cryptocurrency to cash in on the craze. But some are actually hacking into computers to leverage other people's mining power. Sonatype's Senior Vice President Bill Karpovich explains the danger of these miners and how hackers exploited IBM several years ago.
"If 2017 was the year of ransomware, 2018 is going to be the year of crypto-jacking," says Karpovich. "It is amazing to see the rate of growth that are coming out."
Before Sonatype, Karpovich served as a General Manager for IBM's Cloud and Watson platform. He says a researcher on this project found crypto-jackers were finding the cheapest way to take advantage of IBM's cloud environment. But after discovering the breach, IBM was able to implement safeguards.
Karpovich says it's important to be aware, install latest patches and protection, and be accountable beyond security teams.
Google will soon require that political ads using artificial intelligence be accompanied by a prominent disclosure if imagery or sounds have been synthetically altered.
Most major car brands admit they may be selling your personal data — though they are vague on the buyers, and half say they would share it with the government or law enforcement without a court order.
United Airlines said Tuesday it repaired a technology glitch that had forced it to halt departures nationwide, briefly crippling one of the nation's biggest carriers on a busy travel day.
The top prosecutors in all 50 states are urging Congress to study how artificial intelligence can be used to exploit children through pornography, and come up with legislation to further guard against it.