HP Inc. today said it will restore the ability of certain OfficeJet printers to use third-party ink cartridges, after being criticized for issuing a firmware update that rejects non-HP ink.
But HP is still defending its practice of preventing the use of non-HP ink and is making no promises about refraining from future software updates that force customers to use only official ink cartridges.
Let’s face it: artificial intelligence is scary. After decades of dystopian science fiction novels and movies where sentient machines end up turning on humanity, we can’t help but worry as real world AI continues to improve at such a rapid rate. Sure, that danger is probably decades away if it’s even a real danger at all. But there are many more immediate concerns. Will automated robots cost us jobs? Will online face recognition destroy our privacy? Will self-driving cars mess with moral decision making?
Marten Mickos, a veteran executive with companies from MySQL to Sun, Nokia and HP, was not particularly excited about his meeting to explore a leadership role with HackerOne, a fledgling security company. Security is hard, it’s unpleasant, it doesn’t work very well. But he perked up fast after learning about HackerOne’s crowdsourced model of finding and fixing security flaws – a model in which HackerOne plays a key matchmaking role between companies and ethical hackers in a rapidly growing marketplace of skills and needs.
A former Verizon Wireless network technician in Alabama has admitted to using company computers to steal and sell private customers' location and call data over a period of five years. As Ars Technica reports, Daniel Traeger of Birmingham faces up to five years in prison or a $250,000 fine for the federal hacking charge. As part of a plea deal, Traeger confessed that he sold the data to an unnamed private investigator.
On Tuesday, US senators sent a letter to Marissa Mayer, asking the Yahoo CEO for details on the recently discovered breach of at least half a billion accounts.
Some of the questions from that letter: How did such a large-scale breach go unnoticed for 2 years? What’s Yahoo doing to prevent future breaches? Has Yahoo changed its security protocols? If so, how?