Business

US wants undersea data cable to skip Hong Kong

US Justice Department officials on Wednesday recommended that a high-capacity undersea data cable system proposed by Google and Facebook bypass Hong Kong, citing potential national security concerns following China's moves ...

Hi Tech & Innovation

Sniffing out your identity with breath biometrics

Biometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as ...

Security

Ransomware ported to web languages poses serious threat

Security experts around the world have been reporting that there is a new type of ransomware threat on the Internet—one that has been written using HTML, CSS and Javascript—the programming languages of web pages. The ...

Hardware

Vulnerability found in Apple's T2 security chip

Security firm IronPeak has found a vulnerability in Apple's T2 security chip. They claim in a blog post that the vulnerability allows would-be hackers to gain root access to a wide variety of Apple computers.

Security

Cybersecurity seen as rising risk for airlines after 9/11

After remaking their security procedures following the 9/11 attacks to stop airline hijackings, carriers are now faced with rising threats targeting computers and electronic equipment critical to their operations and safety.

Security

Security tool guarantees privacy in surveillance footage

Surveillance cameras have an identity problem, fueled by an inherent tension between utility and privacy. As these powerful little devices have cropped up seemingly everywhere, the use of machine learning tools has automated ...

page 3 from 26