Security

What to do if your identity was stolen in mass identity breach

News recently that a malware attack at Detroit-based Wolverine Solutions Group, which handles mailing and other services for hundreds of health care companies, potentially exposed the personal information of hundreds of thousands ...

Computer Sciences

Exploring the resurrection of digital consciousness using AI

Researchers at Shree Devi Institute of Technology, in India, have recently carried out a study investigating the use of artificial intelligence (AI) to communicate with deceased loved ones. Like in the chilling sci-fi fantasy ...

Security

Tech Q&A: How an online bank knows who you are

Q: Besides entering my user ID and password, my financial institution makes me verify my identity by entering a personal identification number (PIN) that is sent via text, email or phone call. Even after that, I'm always ...

Internet

Holding law enforcement accountable for electronic surveillance

When the FBI filed a court order in 2016 commanding Apple to unlock the San Bernandino shooter's iPhone, the news made headlines across the globe. Yet every day there are tens tens of thousands of of other court orders asking ...

page 1 from 5