Drone Surveillance of Protests Earning Bipartisan Scrutiny
There is growing unease about the use of drones and other high-tech surveillance techniques to monitor peaceful protests.
There is growing unease about the use of drones and other high-tech surveillance techniques to monitor peaceful protests.
For many students, families, and businesses, Zoom is an ‘essential service.’ But data security issues with the platform are drawing unwanted attention, criticism, and even lawsuits.
The idea of law enforcement using new technology to reduce crime is intruiging. But how to best to do that—while protecting civil liberties—remains an ongoing debate.
An emphasis on awareness and prevention seems to be the best course of action as ransomware attacks expand beyond traditional targets into new sectors.
New class-action lawsuits have been filed against major US cellphone carriers AT&T, Verizon, T-Mobile, and Sprint in US District Court in Maryland due to the real-time “collection of geolocation data and the unauthorized dissemination to third-parties of the geolocation data collected from its users’ cell phones.
Facial recognition technology may have some concerning side effects. An MIT report found bias in Amazon’s popular facial recognition system.
Hacking is a necessary weapon in the digital age, prompting governments to engage in an arms and talent race against their rivals for cyber supremacy.
The ACLU lawsuit claims that what little information exists has been confined to “scattered news accounts”; what they do know is described as “very troubling.”
A technique called “password salting” is a good way to make your passwords simpler and stronger at the same time.
Cyber insurance policies are designed to mitigate the risks associated with network breaches by offsetting recovery costs after cyberattacks or similar events.