Security

Smartphone apps may connect to vulnerable backend cloud servers

Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don't even know ...

Internet

With Twitter in chaos, some ways to protect your account

Twitter is in chaos. Elon Musk, its new owner, has decimated its staff and this week gave those remaining an ultimatum—work grueling hours and be "extremely hardcore " or leave. Hundreds chose the latter and headed for ...

Machine learning & AI

Q&A: How to make AI systems learn better

Artificial intelligence systems are smart. They can recognize patterns better than humans, for example. Yet humans are still very much needed. How can you better steer those AI systems? LIACS lecturer Jan van Rijn wrote a ...

Computer Sciences

Scientists develop interactive typeface for digital text

Language is without doubt the most pervasive medium for exchanging knowledge between humans. However, spoken language or abstract text need to be made visible in order to be read, be it in print or on screen. How does the ...

page 34 from 40