"As a tool that can be used by hackers to conduct identity fraud, CyberLover demonstrates an unprecedented level of social engineering," said Sergei Shevchenko, Senior Malware Analyst at PC Tools. "It employs highly intelligent and customised dialogue to target users of social networking systems."
In 1950, British mathematician and computing pioneer Alan Turing posed a game in which a human interrogator is given the task of determining which of two respondents is human and which is a machine. This game has become known as the Turing Test.
Turing expected that by now, programming would have advanced to the level where "an average interrogator will not have more than 70 percent chance of making the right identification after five minutes of questioning."
He would probably be disappointed if he knew how we've progressed. The Loebner Prize of $US100,000 plus a gold medal was first offered in 1990 for a computer that could pass the Turing Test, but remains unclaimed.
FREE CLOUD BACKUPS MANAGEMENT WEBINARAre your technicians spending too much time just managing your clients cloud backups?
Backups are an important part of any IT business but they should not consume more than their fair share of time and money.
Discover how to reduce the amount of time & money spent managing your Cloud Backups during this Free Webinar.
FREE NETWORKING SERVICES CASE STUDYAs one of the world’s largest social networking services, Facebook handles a lot of user information, and requires input from an astounding range of stakeholders 24 hours a day, 7 days a week — from both inside and outside the business.
Discover how Facebook was helped to connect remote employees, vendors, consultants, and partners to applications and web services quickly and reliably - without risking sensitive data.
GET THE IT BUDGET YOU WANTExplore your Network Treasure Trove to get the IT Budget you want
With Australian businesses projected to spend over $78.7 Billion why does it feel like you can never get the budget you need?.
In most cases your budget will get approved because the proposals are not only technically correct, but also provide good, credible evidence on how the spend aligns with key business objectives.
Did you know that your Network Monitoring tool can help you build a comprehensive business case without an MBA?
HERE ARE 8 TIPS TO GET THE IT BUDGET YOU WANT.
Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.