Consumer & Gadgets

Vulnerability in virtual reality systems identified

A team of computer scientists at the University of Chicago has uncovered a potential vulnerability in virtual reality systems—one that could allow a hacker to insert what the team describes as an "inception layer" between ...

Security

Coder charged in massive CIA leak portrayed as vindictive

A software engineer on trial for the largest leak of classified information in CIA history was "prepared to do anything" to betray the agency, federal prosecutors said Monday as a defense attorney argued the man had been ...

Consumer & Gadgets

Data privacy in the post-Roe era

In 2022, when the U.S. Supreme Court overturned Roe v. Wade—ending the constitutional right to an abortion—privacy advocates warned women against using smartphone apps to track their periods.

Telecom

New countermeasure against unwanted wireless surveillance

Smart devices are supposed to make our everyday lives easier. At the same time, however, they are a gateway for passive eavesdropping. To prevent possible surveillance of the movement profile within one's home, researchers ...

Security

3 charged in massive Twitter hack, Bitcoin scam (Update)

A British man, a Florida man and a Florida teen were identified by authorities Friday as the hackers who earlier this month took over Twitter accounts of prominent politicians, celebrities and technology moguls to scam people ...

page 8 from 24