Many popular reproductive health apps are lacking when it comes to protecting users' data privacy, according to a new report highlighting the potential legal risk to people seeking an abortion.
https://techxplore.com/news/2022-08-period-tracking-pregnancy-apps-prosecute-pregnant.html
The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 to protect sensitive protected health information (PHI) from being disclosed without patient consent. But a stud...
https://techxplore.com/news/2022-08-reveals-common-online-health-violate.html
Over the past decade, digital cameras have been widely adopted in various aspects of our society, and are being massively used in mobile phones, security surveillance, autonomous vehicles, and fa...
Federal prosecutors unveiled fraud and money-laundering charges this week against a former Qualcomm research engineer and three others for allegedly duping the San Diego company into paying $150 ...
https://techxplore.com/news/2022-08-ex-qualcomm-vice-million-fraud-scheme.html
Amazon.com Inc., Oracle Corp. and other data providers pressed by a group of U.S. lawmakers about how they sell mobile phone location data offered assurances that the information couldn't be used...
https://techxplore.com/news/2022-08-amazon-oracle-lawmaker-abortion-sales.html
Mobile devices use facial recognition technology to help users quickly and securely unlock their phones, make a financial transaction or access medical records. But facial recognition technologie...
https://techxplore.com/news/2022-08-deepfakes-expose-vulnerabilities-facial-recognition.html
Cisco Systems Inc. said it was the victim of a cyberattack in which a hacker repeatedly attempted to gain access to the Silicon Valley firm's corporate network.
https://techxplore.com/news/2022-08-cisco-cyberattack-hacker-linked-lapsus.html
A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer, MIT r...
https://techxplore.com/news/2022-08-mitigate-potential-side-channel-vulnerability-multicore.html
Cryptographers love an enigma, a problem to solve—and this one has it all. Indestructible codes, secret notes, encryption and decryption.
https://techxplore.com/news/2022-08-whatsapp-messages-encryptedbut-traceable.html
After the U.S. Supreme Court's controversial decision in June 2022 to overturn Roe v. Wade and eliminate an almost 50-year federal right to abortion, data privacy advocates are sounding the alarm...
https://techxplore.com/news/2022-08-importance-privacy-post-roe-world.html
Less than two weeks after the announcement of its acquisition of U.S. health care company One Medical, Amazon is continuing its expansion with a US$1.7 billion offer for iRobot, the manufacturer ...
https://techxplore.com/news/2022-08-irobot-roomba-amazon-privacy.html
Online safety and ethics are serious issues and can adversely affect less experienced users. Researchers have built upon familiar human verification techniques to add an element of discrete learn...
https://techxplore.com/news/2022-08-digital-dialogue-leveraging-human-verification.html
Writing in the International Journal of Intellectual Property Management, a digital technology leader at telecommunications conglomerate Verizon discusses the impact of the COVID-19 pandemic on d...
https://techxplore.com/news/2022-08-digital-fraud-pandemic-world.html
As federal sites invest in distributed energy resources (DERs) like solar panels and battery backups, investments in cybersecurity must also be considered. More energy resources create more compl...
https://techxplore.com/news/2022-08-cybersecurity-tool-site.html
Digital privacy is often framed as an issue for consumers, but Ruslan Momot argues that companies need to consider the concept as a key element of their business.
https://techxplore.com/news/2022-08-company-digital-privacy-doesnt.html
Voting in Britain's Conservative party leadership election has been delayed after government cyber experts raised concerns over potential hacking of members' ballots.
https://techxplore.com/news/2022-08-hacking-uk-leadership-vote.html
As the amount of data stored in devices and shared over the internet continuously increases, computer scientists worldwide are trying to devise new approaches to secure communications and protect...
https://techxplore.com/news/2022-07-twin-physically-unclonable-functions-pufs.html
The U.S. has the largest number of surveillance cameras per person in the world. Cameras are omnipresent on city streets and in hotels, restaurants, malls and offices. They're also used to screen...
https://techxplore.com/news/2022-07-surveillance-pervasive.html
In modern cryptosystems, users generate public and private keys that guarantee security based on computational complexity and use them to encrypt and decrypt information. Recently however, modern...
https://techxplore.com/news/2022-07-key-technology-quantum-cryptography-commercialization.html
Since the beginning of the COVID-19 pandemic, scientists and health authorities have relied on contact-tracing technologies to help manage the spread of the virus. Yet there's a major flaw in a f...
https://techxplore.com/news/2022-07-googleapple-contact-tracing-apps-susceptible-digital.html
Touch screens on mobile devices can be attacked and manipulated via charging cables and power supply units. This is what researchers at the System Security Lab at TU Darmstadt have discovered tog...
https://techxplore.com/news/2022-07-thwarting-socket-team-explores-mobile.html
Digital information is everywhere in the era of smart technology, where data is continuously generated by and communicated among cell phones, smart watches, cameras, smart speakers and other devi...
https://techxplore.com/news/2022-07-smart-chip-low-power-platform.html
China's free large-scale technology training in Indonesia poses a major security challenge to Australia and the region, according to a paper by experts at The Australian National University (ANU)...
https://techxplore.com/news/2022-07-australia-china-tech-indonesia.html
Message applications must do more to keep user data safe from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message has been sent, according to researche...
https://techxplore.com/news/2022-07-solution-encrypted-messages-hacked-receipt.html
A popular Chinese-made automotive GPS tracker used in 169 countries has severe software vulnerabilities, posing a potential danger to highway safety, national security and supply chains, cybersec...
https://techxplore.com/news/2022-07-chinese-made-gps-tracker-highly-vulnerable.html
Fostering the energy transition requires advanced and sophisticated technology. However, such interconnected solutions are exposed to a wide range of cyber-attacks. A European project aims to tac...
https://techxplore.com/news/2022-07-shielding-grid-foster-renewables-cybersecurity.html
The end of Roe v. Wade—a woman's constitutional right to an abortion—has led some digital privacy experts, including Stanford's Riana Pfefferkorn, to ask what could happen to women seeking re...
https://techxplore.com/news/2022-07-privacy-post-roe-world.html
When it comes to privacy, you've probably heard some say they "don't care about privacy if there's nothing to hide." Typically, someone who says this is not taking into account that you may have ...
Security experts from paluno, the Ruhr Institute for Software Technology at the University of Duisburg-Essen (UDE) have developed a new technique that, for the first time, enables fuzz testing of...
https://techxplore.com/news/2022-07-vulnerabilities-revealed-fingerprint-sensors-crypto.html
A computer vulnerability discovered last year in a ubiquitous piece of software is an "endemic" problem that will pose security risks for potentially a decade or more, according to a new cybersec...
https://techxplore.com/news/2022-07-log4j-software-flaw-endemic-cyber.html