article thumbnail

T-Mobile investigating hack that affected 37 million customer accounts

GeekWire

(GeekWire File Photo / Taylor Soper) T-Mobile disclosed in a regulatory filing Thursday that a hacker obtained data from about 37 million customer accounts using an API, or application programming interface. The Bellevue, Wash.-based The hack started on or around Nov. 25, and T-Mobile identified the bad actor Jan.

Mobile 135
article thumbnail

Cloud, Mobile, Social and Cyber: 2015 Predictions That Will Rock The World (AGAIN!)

Cloud Musings

The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. As the United States Department of Homeland Security rolls out Phase II of the Continuous Diagnostics and Mitigation Program , multinational corporations across all industries will take notice. 2015 PREDICTION TIME!!

Social 169
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Jibo, the social robot that was supposed to die, is getting a second life

The Verge

The social, lovable robot went viral on Twitter last March when it performed a jaunty dance after telling owners, “The servers out there that let me do what I do will be turned off soon.” That meant its ability to perform many social interactions would wind down on an undefined date, effectively killing Jibo.

Social 129
article thumbnail

What is NLP? Natural language processing explained

CIO Business Intelligence

They integrate with Slack, Microsoft Messenger, and other chat programs where they read the language you use, then turn on when you type in a trigger phrase. That’s why critics say these programs are always listening; if they weren’t, they’d never know when you need them. Apply the technology to voice and the pool gets even larger.

Course 142
article thumbnail

Geeks Give Back at the GeekWire Awards: Meet three groups wielding tech for good causes

GeekWire

Coding for Cancer Hanako Osuga, in the background, is the program coordinator leading the Coding for Cancer program at the Fred Hutchinson Cancer Center, an effort designed to expose students to the possibilities of applying computational skills to cancer research. Denver and Dallas and has helped more then 6,200 people get housing.

Groups 84
article thumbnail

Don’t gamble with your identity verification practices

CIO Business Intelligence

But casino gaming companies MGM Resorts International and Caesars Entertainment were caught short in this area in recent weeks by hackers using identity-based and social engineering attacks that spoofed identity to gain access to secure systems. It sounds simple, but it could be a hedge against similar social engineering and phishing hacks.

article thumbnail

Facebook verified a fan page posing as Elon Musk

The Verge

To be verified on Facebook, you have to fill out a form that requires, among other things, that the submitter share official identification in the form of a driver’s license, passport, national identification card, tax filing, recent utility bill, or articles of incorporation. Verification is a challenge for big social media platforms.

Licensing 136