FragAttacks let hackers inject malicious code or commands into encrypted Wi-Fi traffic.
Please note that content may be behind a paywall, or have a limited number of free articles.
Vulnerabilities in billions of Wi-Fi devices let hackers bypass firewalls
Amazon will block police indefinitely from using its facial-recognition software
Nearly a year ago, Amazon said it would stop providing its facial-recognition software, Rekognition, to police for a year. Now it appears that ban won’t be ending any time soon — if ever.
Facebook Algorithm Shows Gender Bias in Job Ads, Study Finds
Researchers found the platform’s algorithms promoted roles to certain users; company pledges to continue work in removing bias from recommendations
Who Is Making Sure the A.I. Machines Aren’t Racist?
When Google forced out two well-known artificial intelligence experts, a long-simmering research controversy burst into the open.
CVS, Walgreens Look for Big Data Reward From Covid-19 Vaccinations
Chains plan to use information they collect on vaccine recipients to promote stores, tailor marketing
CVS, Walgreens Look for Big Data Reward From Covid-19 Vaccinations
Chains plan to use information they collect on vaccine recipients to promote stores, tailor marketing.
EU report warns that AI makes autonomous vehicles ‘highly vulnerable’ to attack
Researcher hacks over 35 tech firms in novel supply chain attack
A researcher managed to breach over 35 major companies' internal systems, including Microsoft, Apple, PayPal, Shopify, Netflix, Yelp, Tesla, and Uber, in a novel software supply chain attack. The attack leveraged a unique design flaw of the open-source ecosystems called dependency confusion.
Quantum Computing Scientists Call for Ethical Guidelines
A group of quantum computing experts are raising ethical concerns about the technology’s potential to accelerate human DNA manipulation.
Fake collaboration apps are stealing data as staff struggle with home-working security
Cyber criminals know that working from home can provide them with an easier way into corporate networks - resulting in a rise in attacks targeting remote devices.