Skip to main content

Home/ Digit_al Society/ Group items tagged smartphone

Rss Feed Group items tagged

dr tech

'More scary than coronavirus': South Korea's health alerts expose private lives | World... - 0 views

  •  
    "As the number of coronavirus cases in South Korea exceeded 6,000 this week, there was a rise, too, in complaints about information overload in the form of emergency virus text alerts that have included embarrassing revelations about infected people's private lives."
dr tech

This company says it knows who isn't socially distancing - 0 views

  •  
    "The company, Unacast, went live with its Social Distancing Scoreboard Tuesday. The dashboard, billed as a public health utility, includes a county-by-county breakdown of people's movement patterns. It assigns each county a grade, which Unacast based (at least in part) on how much people are traveling. "
dr tech

Gadgets have stopped working together, and it's becoming an issue | Smartphones | The G... - 0 views

  •  
    "Interoperability is the technical term for what we've lost as tech has matured. Software can be interoperable, either through common, open file formats, or through different programs speaking directly to one another, and so too can hardware: open standards are what allow you to use any headphones with any music player, for instance, or buy a TV without worrying if it will work with your streaming set-up."
yeehaw

Forget Passwords: How Playing Games Can Make Computers More Secure - Scientific American - 0 views

  •  
    Sounds a bit extreme just to make sure no one can log on to your laptop or smartphone, but a team of researchers from Stanford and Northwestern universities as well as SRI International is nonetheless experimenting at the computer-, cognitive- and neuroscience intersection to combat identity theft and shore up cyber security-by taking advantage of the human brain's innate abilities to learn and recognize patterns.
dr tech

ExpressVPN's Research on Phone Location Tracking | ExpressVPN - 0 views

  •  
    "In these cases, we call the SDKs "trackers" or "tracker SDKs." We follow the lead of the Electronic Frontier Foundation, Fight for the Future, and other digital rights organizations and use the term broadly: "Trackers" encompasses traditional advertisement surveillance, behavioral, and location monitoring. Legitimate uses may include user feedback mechanisms, telemetry, and crash reporters. App developers have decided to include tracker SDKs in apps for a variety of reasons, and we do not categorize all usage of trackers as malicious or condemn the app authors. Additionally, given the complexity and pace of software development, some developers may not be aware that trackers are in their app or may not know the full implications of bundling such code before publishing."
dr tech

Android devices ensnared in DDoS botnet | ZDNet - 0 views

  •  
    "Netlab researchers, who are usually among the firsts to discover emerging botnets, said the botnet contains several clues to suggest this is the work of the same group which developed the Moobot botnet in 2019 and the LeetHozer botnet in 2020. Both botnets were essentially built and used for launching DDoS attacks, which also appears to be Matryosh's primary function, as well. The Netlab team says they found functions in the code specific to features that will use infected devices to launch DDoS attacks via protocols like TCP, UDP, and ICMP."
dr tech

Inside Robinhood, the free trading app at the heart of the GameStop mania - CNN - 0 views

  •  
    "Robinhood's free-trading revolution helped pave the way to the recent Reddit mayhem on Wall Street. The rise of Robinhood means that the ability to buy stocks, on a whim, is now at everyone's fingertips. Robinhood has opened investing up to the masses. Rival online brokerages were forced to mimic Robinhood's zero-commission business model, and some joined forces just to survive. "
dr tech

How does Apple technology hold up against NSO spyware? | Apple | The Guardian - 0 views

  •  
    "The disclosure points to a problem security researchers have been warning about for years: that despite its reputation for building what is seen by millions of customers as a secure product, some believe Apple's closed culture and fear of negative press have harmed its ability to provide security for those targeted by governments and criminals. "Apple's self-assured hubris is just unparalleled," said Patrick Wardle, a former NSA employee and founder of the Mac security developer Objective-See. "They basically believe that their way is the best way. And to be fair … the iPhone has had incredible success. "But you talk to any external security researcher, they're probably not going to have a lot of great things to say about Apple. Whereas if you talk to security researchers in dealing with, say, Microsoft, they've said: 'We're gonna put our ego aside, and ultimately realise that the security researchers are reporting vulnerabilities that at the end of the day are benefiting our users, because we're able to patch them.' I don't think Apple has that same mindset.""
dr tech

Fifty people linked to Mexico's president among potential targets of NSO clients | Mexi... - 0 views

  •  
    ""Mexico's capacity to spy on its citizens is immense. [And] it's extremely easy for the technology and the information obtained through the spyware to fall into private hands - be it organised crime or commercial," said Jorge Rebolledo, a Mexico City security consultant. "What we know about is only the tip of the iceberg." Andrés Manuel López Obrador Andrés Manuel López Obrador. The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as belonging to people of interest by government clients of NSO Group."
dr tech

Instagram at 10: how sharing photos has entertained us, upset us - and changed our sens... - 0 views

  •  
    "Instagram turned our phones into adult pacifiers. At first, this was a tranquillising reel of pretty pictures, pumped in a steady stream with each thumb-swipe. Like a warm milky drink, but of sunsets and puppies and toes in the sand. Later, and more insidiously, the dopamine hit shifted to refreshing your feed to see how many likes your own pictures had. Either way, we had got ourselves in a feedback loop of attention-seeking in which our emotions were channelled from our brains to our phones and back again. Twitter is about your tribe, Facebook is about home and family, but Instagram is a romance between just you and your phone."
dr tech

Singapore looks to ease privacy fears with 'no internet' wearable device | ZDNet - 0 views

  •  
    "The Singapore government says the wearable device it is developing for COVID-19 contact tracing will not have GPS, internet, or cellular connectivity, so data it collects can only be extracted when it is physically handed over to a health official. These details are being offered up as the government looks to ease concerns about data privacy and drive the adoption of digital tools that can help speed up contact tracing. "
dr tech

Feds can't ask Google for every phone in a 100-meter radius, court says | Ars Technica - 0 views

  •  
    "The decisions are significant because Google has reported massive growth in law enforcement use of such "geofence" searches. Google says there was a 1,500-percent increase between 2017 and 2018 and a further 600-percent jump from 2018 to 2019. That's a hundredfold increase in two years. Google received 180 geofence search requests a week during 2019, according to CNet."
dr tech

Your attention didn't collapse. It was stolen | Psychology | The Guardian - 0 views

  •  
    "The more our attention degrades, the harder it will be to summon the personal and political energy to take on the forces stealing our focus. The first step it requires is a shift in our consciousness. We need to stop blaming ourselves, or making only demands for tiny tweaks from our employers and from tech companies. We own our own minds - and together, we can take them back from the forces that are stealing them."
dr tech

Iran's Secret Manual for Controlling Protesters' Mobile Phones - 0 views

  •  
    "According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their data connections to a crawl, break the encryption of phone calls, track the movements of individuals or large groups, and produce detailed metadata summaries of who spoke to whom, when, and where. Such a system could help the government invisibly quash the ongoing protests - or those of tomorrow - an expert who reviewed the SIAM documents told The Intercept."
dr tech

TikTok's media literacy crisis: What can be done to stop the spread of misinformation o... - 0 views

  •  
    "The combination of the infinite scroll and lack of live links has led to a very specific kind of information economy on the app. Creators whose brand involves discussing news or popular culture (and there are a lot of them) opt to screenshot headlines, summarize articles, and offer their takes. But it's impossible to know whether the creator even read the article or if they're just offering a summary of the online discourse. Even worse are the accounts that spread false headlines, whether they know it or not. Without live links, all these possible situations are presented to you in the exact same way: with a familiar face on your FYP speaking authoritatively."
dr tech

Mobile phones and other devices to be banned from Dutch classrooms | Netherlands | The ... - 0 views

  •  
    ""Even though mobile phones are intertwined with our lives, they do not belong in the classroom," education minister Robbert Dijkgraaf said. "Students need to be able to concentrate and need to be given the opportunity to study well. Mobile phones are a disturbance, scientific research shows. We need to protect students against this.""
dr tech

Uber used Greyball fake app to evade police across Europe, leak reveals | Uber | The Gu... - 0 views

  •  
    "It was a trick as audacious as it was ingenious. When police or regulators opened the Uber app, they would see exactly what the public saw: dozens of cars crawling around the city, waiting to be summoned. But there was one crucial difference: these cars were fake. Uber had built a dummy version of its own app, a secret tool known as Greyball, designed to throw regulators off the scent and help its unlicensed cab drivers evade the law."
dr tech

Are kids' test scores really declining? - 0 views

  •  
    "Could it be the phones? Absolutely! To be clear: the idea that phones are causing distraction both inside and outside of school hours, and this contributes to declining test scores, seems totally plausible to me-and preliminary cross-sectional data from the PISA report indicates the same. Might it be a good idea to keep phones out of the classroom? Definitely! But, as often happens when an excerpt of a larger study makes the rounds online, some nuance is missing. Let's talk about what the data actually show. "
dr tech

Forget state surveillance. Our tracking devices are now doing the same job | John Naugh... - 0 views

  •  
    "But in internet time 2009 was aeons ago. Now, intensive surveillance is available to anyone. And you don't have to be a tech wizard to do it. In mid-January this year, Kashmir Hill, a talented American tech reporter, used three bits of everyday consumer electronics - Apple AirTags, Tiles and a GPS tracker - to track her husband's every move. He agreed to this in principle, but didn't realise just how many devices she had planted on him. He found only two of the trackers: a Tile he felt in the breast pocket of his coat and an AirTag in his backpack when he was looking for something else. "It is impossible to find a device that makes no noise and gives no warning," he said when she showed him the ones he missed."
« First ‹ Previous 81 - 100 of 106 Next ›
Showing 20 items per page