Amidst the flurry of social media updates about the COVID-19 pandemic, a chart illustrating the importance of flattening the curve has gone viral. The idea is that taking measures to slow the…
Amidst the flurry of social media updates about the COVID-19 pandemic, a chart illustrating the importance of flattening the curve has gone viral. The idea is that taking measures to slow the…
The app failure that led to a chaotic 2020 Iowa caucus was a reminder of how vulnerable the democratic process is to technological problems – even without any malicious outside intervention. Far…
Solar panels, wind turbines and energy storage are gradually transforming the way in which energy is generated and distributed across millions of homes, businesses and industries in America. These distributed energy resources…
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy…
Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger.…
A powerful new approach to securing web browsers, using a tool called WebAssembly, is getting its first real-world application in the Firefox browser. Developed by a team of researchers from The University…
Last month, SpaceX became the operator of the world’s largest active satellite constellation. As of the end of January, the company had 242 satellites orbiting the planet with plans to launch 42,000…
You’re trailing bits of personal data – such as credit card numbers, shopping preferences and which news articles you read – as you travel around the internet. Large internet companies make money…
If we understood the humans behind hacking incidents – and their intent – could we stop them? Research from Michigan State University reveals the importance of factoring in a hacker’s motive for…