Subscribe now and get the news that matters to your industry.
"As a tool that can be used by hackers to conduct identity fraud, CyberLover demonstrates an unprecedented level of social engineering," said Sergei Shevchenko, Senior Malware Analyst at PC Tools. "It employs highly intelligent and customised dialogue to target users of social networking systems."
In 1950, British mathematician and computing pioneer Alan Turing posed a game in which a human interrogator is given the task of determining which of two respondents is human and which is a machine. This game has become known as the Turing Test.
Turing expected that by now, programming would have advanced to the level where "an average interrogator will not have more than 70 percent chance of making the right identification after five minutes of questioning."
He would probably be disappointed if he knew how we've progressed. The Loebner Prize of $US100,000 plus a gold medal was first offered in 1990 for a computer that could pass the Turing Test, but remains unclaimed.
PROTECT YOURSELF AGAINST BANDWIDTH BANDITS!Don't let traffic bottlenecks slow your network or business-critical apps to a grinding halt. With SolarWinds Bandwidth Analyzer Pack (BAP) you can gain unified network availability, performance, bandwidth, and traffic monitoring together in a single pane of glass.
With SolarWinds BAP, you'll be able to:
• Detect, diagnose, and resolve network performance issues
• Track response time, availability, and uptime of routers, switches, and other SNMP-enabled devices
• Monitor and analyze network bandwidth performance and traffic patterns.
• Identify bandwidth hogs and see which applications are using the most bandwidth
• Graphically display performance metrics in real time via dynamic interactive maps
Download FREE 30 Day Trial!
ITWIRE SERIES - IS YOUR BACKUP STRATEGY COSTING YOU CLIENTS?Where are your clients backing up to right now?
Is your DR strategy as advanced as the rest of your service portfolio?
What areas of your business could be improved if you outsourced your backups to a trusted source?
Read the industry whitepaper and discover where to turn to for managed backup
Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.