Monthly Archives: June 2014

Airbus Unveils New 2 Seater Electric Plane

Leave a comment

June 30, 2014 · 12:05 pm

Facebook’s Secret Mood Manipulation Experiment

June 28th, 2014

Via: The Atlantic:

Facebook’s News Feed—the main list of status updates, messages, and photos you see when you open Facebook on your computer or phone—is not a perfect mirror of the world.

But few users expect that Facebook would change their News Feed in order to manipulate their emotional state.

We now know that’s exactly what happened two years ago. For one week in January 2012, data scientists skewed what almost 700,000 Facebook users saw when they logged into its service. Some people were shown content with a preponderance of happy and positive words; some were shown content analyzed as sadder than average. And when the week was over, these manipulated users were more likely to post either especially positive or negative words themselves.

This tinkering was just revealed as part of a new study, published in the prestigious Proceedings of the National Academy of Sciences. Many previous studies have used Facebook data to examine “emotional contagion,” as this one did. This study is different because, while other studies have observed Facebook user data, this one set out to manipulate it.

Leave a comment

Filed under cyber/intelligence/internet, Media/MindControl, Social/Society

Hacking Your Car Through a Smart Phone

An Emerging Security Risk

Security consulting firm iSec Partners warns drivers that thieves could exploit smart phone apps that allow the unlocking and starting of cars remotely. Researchers Don Bailey and Mathew Solnik have hacked the protocols some of these apps use and demonstrated how they can take advantage of them using a laptop.

According to Mr. Bailey, the whole process of hacking and improvising the signals these apps send – what he dubs “war texting” – can take as little as two hours.

Mr. Bailey will discuss the research at Black Hat Technical Security Conference in Las Vegas this week. Of course, he won’t name the products or provide full technical details of Mr. Solnik and his work until the software makers can patch them. GM, Mercedes-Benz and BMW all use the technology in one form or another.

Bailey and his cohort intercepted messages sent between the server and the target vehicle over standard mobile networks. He explains:

“We reverse-engineer the protocol and then we build our own tools to use that protocol to contact that system.”

Researchers at iSec think this is indicative of a more widespread problem created by the proliferation of “cheap and easy” mobile networking technology.

Bailey suspects that security considerations are often minimally addressed, thereby making devices using the technology susceptible to exploitation and misuse.

By Tristan Hankins

Story source: Networkworld

Leave a comment

Filed under Crime/Assassination, Nature/Science/Technology