Facial recognition technology works even when only half a face is visible, researchers have found.
The introduction of 5G mobile phone networks could seriously affect weather forecasters’ ability to predict major storms.
As individuals, we can control our behaviors and our use of new technologies, even dropping out of sight of surveillance capitalists. But at what price?
The creators of a revolutionary AI system that can write news stories and works of fiction – dubbed “deepfakes for text” – have taken the unusual step of not releasing their research publicly, for fear of potential misuse.
Digital technology is separating the citizens in all societies into two groups: the watchers (invisible, unknown and unaccountable) and the watched. Nearly every product or service that begins with the word “smart” or “personalised”, every internet-enabled device, every “digital assistant”, is simply a supply-chain interface for the unobstructed flow of behavioural data on its way to predicting our futures in a surveillance economy.
Many people don’t realize to what extent they’re being manipulated online.
With the current web, all the user data concentrated in the hands of a few creates risk that our data will be hacked. It also makes it easier for governments to conduct surveillance and impose censorship. And if any of these centralised entities shuts down, your data and connections are lost. Then there are privacy concerns stemming from the business models of many of the companies, which use the private information we provide freely to target us with ads.
Private firms using third party code on their websites and apps must continually vet such products, to ensure weak points in security don't emerge.
Firms face a growing threat from ransomware, data breaches and weaknesses in the supply chain. Organisations which don’t take cybersecurity extremely seriously in the next year are risking serious financial and reputational consequences. It is clear that even if an organisation has excellent cybersecurity, there can be no guarantee that the same standards are applied by contractors and third-party suppliers in the supply chain. Attackers will target the most vulnerable part of a supply chain to reach their intended victim.
More than half (57%) of global IT leaders believe their mobile workers have been hacked over the past 12 months, with public Wi-Fi hotspots the prime location, according to iPass. Unsecured hotspots represent a goldmine for hackers to launch covert man-in-the-middle and other attacks designed to spread malware and harvest user log-ins.
80% of the most popular health applications available on Android do not comply with standards intended to prevent the misuse and dissemination of their users' data.
The world's top eight DNS providers now control 59 per cent of name resolution for the biggest Websites - and that puts the Web at risk. Organisations should diversify their pool of nameservers by taking DNS management services from multiple providers.
Hackers may be able to falsify patient vitals by messing with the traffic on hospital networks.
Google has admitted that its option to "pause" the gathering of your location data doesn’t apply to its Maps and Search apps – which will continue to track you even when you specifically choose to halt such monitoring.
While the actual risk of a hacker seizing thousands of voting machines and altering their records may be remote, the risk of a hacker casting the validity of an election into question through one of any number of other entry points is huge, and the actual difficulty of such an attack is child’s play.
The satellite communications that ships, planes and the military use to connect to the internet are vulnerable to hackers that, in the worst-case scenario, could carry out “cyber-physical attacks”, turning satellite antennas into weapons that operate, essentially, like microwave ovens.
Data that may look anonymous is not necessarily anonymous. It’s possible to reduce your individual digital breadcrumb trail by paying only in cash and ditching your cellphone.
Tommy Jeans Xplore, will contain smart-chip technology that will track how often customers wear the clothes.
In the past decade, it appears that social media represents a “killer app” to mold personal habits to make eager self-surveillance a new social norm.
Healthcare regulations oblige medical equipment vendors to focus on developing the next generation of technologies rather than addressing current cybersecurity issues. Healthcare represents serious privacy risks because of the sensitive data hospitals and clinics hold.