Vulnerabilities in billions of Wi-Fi devices let hackers bypass firewalls
|| Security || Media Article || Short (5 min or less)
FragAttacks let hackers inject malicious code or commands into encrypted Wi-Fi traffic.
|| Security || Media Article || Short (5 min or less)
FragAttacks let hackers inject malicious code or commands into encrypted Wi-Fi traffic.
|| Robotics Applications || Media Article || Medium (5-10 min)
A United Nations report suggested that a drone, used against militia fighters in Libya’s civil war, may have selected a target autonomously.
|| Future of Work || Media Article || Medium (5-10 min)
Contract drivers say algorithms terminate them by email—even when they have done nothing wrong.
|| Transportation Applications || Media Article || Medium (5-10 min)
A new law allows autonomous vehicles in everyday use and provides legal consistency lacking in the United States.
|| AI General Intelligence || Media Article || Medium (5-10 min)
The documentary “Roadrunner” by Morgan Neville uses 45 seconds of a voice that sounds like Bourdain, generated with artificial intelligence. Is it ethical?
|| General Ethics || Media Article || Medium (5-10 min)
A conversation with Lawrence Lessig about Jeffrey Epstein, MIT, and reputation laundering.
|| Health and Medical Applications || Media Article || Short (5 min or less)
A feature on MIT's Media Lab, including an agricultural project involving food computers.
|| Ethical Hacking/Role of Designers || Media Article || Short (5 min or less)
A French cryptographer exposes a security breach that allows access to voters' choices after a Russian radio station issues a public challenge to test the system.
|| Health and Medical Applications || Media Article || Short (5 min or less)
A study finds that two-thirds of Europeans surveyed would consider human augmentation. The article breaks down the study to see how location, age, gender impacted responses, and what concerns people had.