Study shows that, at least in theory, a company, government or other actor can accurately profile a person -- think political party, favorite products, religious commitments -- from their friends, even if they've never been on social media or delete their account. When you sign up for Facebook or another social media platform, you think you're giving up your information, but you're giving up your friends' information too.
After water, concrete is the most widely used substance on Earth. If the cement industry were a country, it would be the third largest carbon dioxide emitter in the world with up to 2.8bn tonnes, surpassed only by China and the US. According to the watchdog group Transparency International, construction is the world’s dirtiest business, far more prone to graft than mining, real estate, energy or the arms market.
The largest academic publisher, Elsevier, regularly has a profit margin between 35-40%, which is greater than Google’s.
Researchers have developed an algorithm that safeguards hardware from attacks to steal data. In the attacks, hackers detect variations of power and electromagnetic radiation in electronic devices' hardware and use that variation to steal encrypted information.
Findings suggest that the relationship between music and task performance is not ‘one-size-fits-all’. In other words, music does not appear to impair or benefit performance equally for everyone.
Face recognition and analysis systems are often trained on skewed data sets: they’re fed far fewer images of women and people with dark skin than they are images of men and people with light skin.
With microphone arrays that hear voices from across the room, Amazon’s devices would have been coveted by the Stasi in East Germany. The same can be said of smarthome products from Apple, Google and Microsoft, as well as the microphone-equipped AIs in all of our phones.
We notice a voice much faster when it is considered threatening than when it is perceived as normal or happy. Our attention is more focused on threatening voices to enable us to clearly recognize the location of the potential threat.
Unfortunately, many companies lack a formal system hardening program because they have neither an accurate IT asset inventory nor the resources to holistically maintain or even begin a program. An ideal system hardening program can successfully track, inventory and manage the various platforms and assets deployed within an IT environment throughout their life cycles. Without this information, it is nearly impossible to fully secure configurations and verify that they are hardened.
As individuals, we can control our behaviors and our use of new technologies, even dropping out of sight of surveillance capitalists. But at what price?
New research has revealed that poor staff cybersecurity behaviors within organizations are getting worse, despite a greater focus on security awareness in the workplace.
Advances in machine learning are rapidly starting to alter digital reality.
Research analysis by faculty in Indiana University's Kelley School of Business and two other schools found that a moderate level of piracy can have a positive impact on the bottom line for both the manufacturer and the retailer -- and not at the expense of consumers. Such a win-win-win situation is not only good for the supply chain but is also beneficial for the overall economy. They suggest that businesses, government and consumers rethink the value of anti-piracy enforcement, which can be quite costly, and consider taking a moderate approach.
In 40% of the phishing emails examined, the subject line was related to PayPal and read, “Your account will be locked.” Another 10% of phishing emails targeted FedEx and read “Info,” while the third-most popular headline, “August Azure Newsletter,” appeared in 8% of the phishing emails and targeted Microsoft.
Social status determined how individual macaques responded to a key stress hormone, glucocorticoid.
Public health protection and cost savings are often used as reasons to restrict migrants' access to health care, or to deny them entry. Yet, as the new UCL-Lancet Commission on Migration and Health lays out with new international data and analysis, the most common myths about migration and health are not supported by the available evidence and ignore the important contribution of migration to global economies.
One of the largest contributors to plastic waste? Cigarette butts.
A team of researchers is helping law enforcement crack down on email scammers, thanks to a new visual analytics tool that dramatically speeds up forensic email investigations and highlights critical links within email data. Email scams are among the most prevalent, insidious forms of cybercrime.
The Pentagon is testing technology that will let a smartphone identify you by the way you walk, as well as how you hold the device and swipe across the screen.
Facebook has been accused of abusing a security feature in order to weaken user privacy, after the social network was found using phone numbers initially handed over for account safety for other purposes.