"As a tool that can be used by hackers to conduct identity fraud, CyberLover demonstrates an unprecedented level of social engineering," said Sergei Shevchenko, Senior Malware Analyst at PC Tools. "It employs highly intelligent and customised dialogue to target users of social networking systems."
In 1950, British mathematician and computing pioneer Alan Turing posed a game in which a human interrogator is given the task of determining which of two respondents is human and which is a machine. This game has become known as the Turing Test.
Turing expected that by now, programming would have advanced to the level where "an average interrogator will not have more than 70 percent chance of making the right identification after five minutes of questioning."
He would probably be disappointed if he knew how we've progressed. The Loebner Prize of $US100,000 plus a gold medal was first offered in 1990 for a computer that could pass the Turing Test, but remains unclaimed.
WEBINAR 26/27th MayThinking of deploying Business Intelligence (BI)? So are your competitors.
And the most important, fundamental, tool for delivering your BI information to your users? Dashboards.
THIS IS ONE NOT TO MISS SO REGISTER NOW
FREE WHITEPAPER - RISKS OF MOVING DATABASES TO VMWAREVMware changed the rules about the server resources required to keep a database responding
It's now more difficult for DBAs to see interaction between the database and server resources
This whitepaper highlights the key differences between performance management between physical and virtual servers, and maps out the five most common trouble spots when moving production databases to VMware
1. Innacurate metrics
2. Dynamic resource allocation
3. No control over Host Resources
4. Limited DBA visibility
5. Mutual ignorance
Don't move your database to VMware before learning about these potential risks, download this FREE Whitepaper now!
Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.