Back in June, Google discovered a range of security flaws in iPhone software that injected malicious code into phones. Here's what happened.
At the close of June’s G20 summit in Japan, a number of developing countries refused to sign an international declaration on data flows – the so-called Osaka Track. Part of the reason why countries such as India, Indonesia and South Africa boycotted the declaration was because they had no opportunity to put their own interests about data into the document.
The whole world waited in anticipation to see what Huawei will do about it losing access to Google apps and Android. Then they found and removed a backdoor method.
This week on Stuffed -- Here's what we thought about the Apple Event, how to secure your WhatsApp account and Huawei's lack of Google apps.
The unique nature of biometrics is also its flaw. Biometric data might provide a way to identify people with a high degree of accuracy but once it is stolen there is nothing you can do to make it secure again. Of course, if your fingerprint is stolen you could always use another finger, but you could only do this 10 times.
Silicon Valley companies (and governments) already surreptitiously gather as much data on us as they can and use it in ways we’d rather they didn’t. How sure can we be that our random and personal thoughts won’t be captured and studied alongside the instructions we want to give the technology?
Cybercrime is not just a concern for corporate technology departments. Schools, scout troops, Rotary clubs and religious organizations need to know what to look for and how to handle it.
While photographic fakes have been around since the dawn of photography, the more recent use of deep learning artificial intelligence techniques (the “deep” in deepfakes) is leading to the creation of increasingly credible computer simulations.