security Archives - Stuff

security

Google said iPhones had a security flaw, and Apple shot back

Back in June, Google discovered a range of security flaws in iPhone software that injected malicious code into phones. Here's what happened.

Digital colonialism: why some countries want to take control of their people’s data from Big Tech

At the close of June’s G20 summit in Japan, a number of developing countries refused to sign an international declaration on data flows – the so-called Osaka Track. Part of the reason why countries such as India, Indonesia and South Africa boycotted the declaration was because they had no opportunity to put their own interests about data into the document.

And just like that, the Mate 30 Pro loses its backdoor Google access

The whole world waited in anticipation to see what Huawei will do about it losing access to Google apps and Android. Then they found and removed a backdoor method.

The fightback against Facebook is getting stronger

Facebook leader Mark Zuckerberg recently took the unusual step of visiting lawmakers in Washington, including President Donald Trump in the White House. The reason? Congress’s anti-trust sub-committee has started demanding documents from Facebook and other big tech firms

Stuffed Ep 25 – What we thought about the Apple Event, how to secure your WhatsApp account and Huawei’s lack of Google apps

This week on Stuffed -- Here's what we thought about the Apple Event, how to secure your WhatsApp account and Huawei's lack of Google apps.

Zao’s deepfake face-swapping app shows uploading your photos is riskier than ever

The effect is startlingly realistic and shows just how far this sort of “deepfake” technology has come. But it also highlights how great the risks have become of making your photos available online where anyone can use or abuse them – and the limitation of the law in dealing with this issue. One of the key problems...

Apple iPhones could have been hacked for years – here’s what to do about it

For many years, the Apple iPhone has been considered one of the most secure smart phones available. But despite this reputation, security issues that might affect millions of users came to light last week, when researchers at Google revealed they had discovered websites that can infect iPhones, iPads, and iPods with dangerous software.

Facial recognition: ten reasons you should be worried about the technology

Facial recognition technology is spreading fast. Already widespread in China, software that identifies people by comparing images of their faces against a database of records is now being adopted across much of the rest of the world. It’s common among police forces but has also been used at airports, railway stations and shopping centres. The rapid growth of this technology has triggered a much-ne...[Read More]

Stolen fingerprints could spell the end of biometric security – here’s how to save it

The unique nature of biometrics is also its flaw. Biometric data might provide a way to identify people with a high degree of accuracy but once it is stolen there is nothing you can do to make it secure again. Of course, if your fingerprint is stolen you could always use another finger, but you could only do this 10 times.

Silicon Valley wants to read your mind – here’s why you should be worried

Silicon Valley companies (and governments) already surreptitiously gather as much data on us as they can and use it in ways we’d rather they didn’t. How sure can we be that our random and personal thoughts won’t be captured and studied alongside the instructions we want to give the technology?

5 ways to protect yourself from cybercrime

Cybercrime is not just a concern for corporate technology departments. Schools, scout troops, Rotary clubs and religious organizations need to know what to look for and how to handle it.

People who spread deepfakes think their lies reveal a deeper truth

While photographic fakes have been around since the dawn of photography, the more recent use of deep learning artificial intelligence techniques (the “deep” in deepfakes) is leading to the creation of increasingly credible computer simulations.

  • 1
  • 2
  • 9

Lost Password