PRIVACY • SECURITY • TECHNOLOGY
< PN - PNDOTCOM - PN.COM home
Category: "Left Column"
Airport charging stations put you at risk of ‘juice jacking’…
...Security experts warn using public USB ports is like 'finding a toothbrush on the side of the road'
Le Monde director summoned by French intelligence service…
...raises concerns about journalistic independence and freedom of expression in France
Changes in technology, politics, and business are all transforming espionage. Intelligence agencies must adapt—or risk irrelevance…
Air Force is investigating a cyber attack, from the Navy…
Facebook’s work with phone companies alarms legal experts…
China’s new ‘social credit system’ turns Orwell’s ‘1984’ into reality…
Russia to Set Up ‘Fake News Database’…
Stanford Scientist Says In-Ear Gadgets Will Monitor Our Brains…
..."The ear is like a biological equivalent of a USB port."
Air Force deploys missiles that can fry weapons with microwaves…
Facebook restores disabled ‘View As’ feature used in 2018 breach…
Out of a Magic Math Function, One Solution to Rule Them All…
Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs…
Secretive Israeli Company “NSO Group” Uses WhatsApp Voice Calls To Install Spyware On Phones…
“Magic: The Gathering” is officially the world’s most complex game…
...holds important implications for game theory
...winning strategy may be non-computable?
Algorithm predicts who will die, have heart attack with 90% accuracy…
Der Spiegel reports that German Ministry for Internal Affairs is planning to ban end-to-end encryption before 5G rollout…
...affects WhatsApp, Signal, Silent Circle, Threema, Wire and others
...anyone not complying will be blocked
How China Uses High-Tech Surveillance to Subdue Minorities…
Momentum grows to create ‘Do Not Track’ registry…
5G Danger: Hundreds Of Respected Scientists Sound The Alarm About Health Effects As 5G Networks Go Up Nationwide…
...Scientist: human body actually draws in 5G radiation “like an antenna"
Why a U.S. federal privacy law could be worse than no law at all…
Google is tracking your purchases through Gmail…
Moscow to Weave AI Face Recognition into Its Urban Surveillance Net…
Former NHTSA Head: Tesla’s “Defective” Autopilot Uses Drivers As “Guinea Pigs”, Should Be Recalled…
Attackers Evade Detection By Randomizing TLS Handshake Ciphers…
Experimental brain-controlled hearing aid can pick out voices in a crowd…
...so neural prosthetics function more like normal hearing
Microsoft warns of major ‘Remote Desktop Services’ computer bug…
...vulnerability is ‘wormable'
Online Tutoring Program ‘Wyzant’ Reveals Customer Data Breach…
Genetically engineered ‘phage therapy’ has rescued a teenager on the brink of death…
...Another approach to attack, degrade and destroy toxic biofilms
How data mining the causes of failure can teach the secrets of success…
Exposed: How Amazon destroys millions of new items it can’t sell…
...Area called the ‘destruction zone’
...Where Amazon staff load pristine toys, unused kitchen equipment, flat-screen TVs, etc. into dumpsters for transport to landfill sites
< Newer Entries
|
Older Entries >