Internet

Your smart speaker data is used in ways you might not expect

Smart speakers offer amazing convenience—from playing your favorite tunes to re-ordering toilet paper—with only a simple voice command. But that convenience can come with a steep cost in privacy that many consumers aren't ...

Security

AI clones made from user data pose uncanny risks

Imagine, if you will, a digital doppelgänger. A clone that looks, talks and behaves just like you, created from the depths of artificial intelligence, reflecting your every mannerism with eerie precision. As thrilling as ...

Hardware

AMD fTPM vulnerability uncovered

Researchers at the Technical University of Berlin say they uncovered a new vulnerability in AMD's Trusted Platform Module (TPM). The flaw exposes firmware TPMs, or fTPMs, to attack.

page 3 from 40