Advertisement
more top stories »

Privacy


— Automotive

Hackers remotely take over Jeep Cherokee

By - July 21, 2015 1 Picture

The minute you connect a car to the internet, you’re exposing it to the risk of hacking – and even if it’s only the entertainment system that’s supposed to be online, a skilled hacker can now remotely take control of just about any electronically controlled part of your car, including the steering, throttle and brakes. And this isn't some distant thing to worry about in the future. One Wired reporter just had the terrifying experience of having his Jeep Cherokee taken over by hackers while he was on the freeway. Like a scene in a horror movie, he found himself a helpless passenger in his car as he lost control of its functions one by one.

Read More
— Telecommunications

Uber's Android app caught reporting data back without permission

By - November 26, 2014 1 Picture
Security researcher GironSec has pulled Uber's Android app apart and discovered that it's sending a huge amount of personal data back to base – including your call logs, what apps you've got installed, whether your phone is vulnerable to certain malware, whether your phone is rooted, and your SMS and MMS logs, which it explicitly doesn't have permission to do. It's the latest in a series of big-time missteps for a company whose core business model is, frankly, illegal in most of its markets as well. Read More
— Mobile Technology

Experts call for risk scores to improve smartphone app security

By - October 30, 2014 1 Picture
Next time you download or update an app for your smartphone or tablet and blitz through messages asking for permissions approval, you may be unnecessarily exposing your personal information to possible cyber violation. Researchers suggest this issue could potentially be addressed through better consumer education and an easy to understand risk score for each app. Read More
— Science

MIT algorithm turns potato chip bag into bugging device

By - August 7, 2014 7 Pictures
If you've ever had the feeling that you’re being listened to by chip bags, spied on by your houseplants, and eavesdropped by chocolate bar wrappers, then you may not be paranoid; you may just be up on the latest technology. That’s because a team of scientists led by MIT that includes participants from Microsoft, and Adobe has created a "visual microphone" that uses a computer algorithm to analyze and reconstruct audio signals from objects in a video image. Read More
— Architecture

Casa 7A keeps prying eyes at bay

By - May 22, 2014 33 Pictures
High up in the hills around an hour or two's drive from Bogota, Colombia, is located a country villa that boasts a degree of sustainability – and even more luxury. Designed by Arquitectura en Estudio and Natalia Heredia, Casa 7A also sports a novel facade made up of sliding and pivoting wooden screens that can offer both openness and privacy, as required. Read More
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement