Computer Sciences

One step closer to lifelike avatars

Soon, internet users will be able to meet each other in cyberspace as animated 3D avatars. Researchers at ETH Zurich have developed new algorithms for creating virtual humans much more easily.

Consumer & Gadgets

Encrypting photos on the cloud to keep them private

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A new study from computer scientists at Columbia Engineering reveals what may be the first way to encrypt personal ...

Consumer & Gadgets

Facebook reveals goals for 3-D augmented reality glasses

With the reality of virtual interaction increasing during the COVID-19 pandemic, Facebook is expanding its AI-based augmented reality (AR) initiative. The company's Reality Labs aim to develop lightweight, stylish glasses ...

Hardware

Vulnerability found in Apple's T2 security chip

Security firm IronPeak has found a vulnerability in Apple's T2 security chip. They claim in a blog post that the vulnerability allows would-be hackers to gain root access to a wide variety of Apple computers.

Software

Zoom has another security flaw

Researchers at a company called Bleeping Computer have exposed another security flaw with the conferencing application Zoom—one that allows hackers to steal user passwords. The vulnerability in the software application ...

page 2 from 6