Electronics

The challenge of authenticating real humans in a digital world

The challenge of authenticating real humans in a digital world

Proving identity is a routine part of modern daily life. Many people must show a driver’s license to buy alcohol at a store, flash an...
This cell phone doesn’t need any batteries

This cell phone doesn’t need any batteries

Instead of batteries, a new cell phone harvests the few microwatts of power it needs from a different source: ambient radio signals or light. Researchers...
Open ports leave a hole in smartphone security

Open ports leave a hole in smartphone security

Smartphone apps that use “open ports” to share and receive data are more vulnerable to security breaches than previously thought, mainly due to the...
Why more iPhones break when a new model comes out

Why more iPhones break when a new model comes out

Oops! Some consumers 'lose' or break iPhone when new model becomes available Rationality goes out the window for some consumers who suddenly “lose” or break...
Let your car tell you what it needs

Let your car tell you what it needs

Imagine hopping into a ride-share car, glancing at your smartphone, and telling the driver that the car’s left front tire needs air, its air...
The ‘internet of things’ is sending us back to the Middle Ages

The ‘internet of things’ is sending us back to the Middle Ages

Internet-enabled devices are so common, and so vulnerable, that hackers recently broke into a casino through its fish tank. The tank had internet-connected sensors measuring...
Software flaw affects security of nearly every Wi-Fi enabled device

Software flaw affects security of nearly every Wi-Fi enabled device

Hacks and cybersecurity attacks are in the news so frequently—and the threats can be so abstract—that some people find it easier to tune out. But...
Anyone can track you with $1,000 of online ads

Anyone can track you with $1,000 of online ads

For around $1,000, anyone can buy online ads that could allow them to track which apps you use, where you spend money, and your...
Wearable gadget could shield your voice from hackers

Wearable gadget could shield your voice from hackers

A security-token necklace, ear buds, or eyeglasses could eliminate vulnerabilities in voice authentication—the practice of logging in to a device or service with your...
5 ways to protect yourself from retail and restaurant data breaches

5 ways to protect yourself from retail and restaurant data breaches

Theft of payment card information through retail and restaurant data breaches is becoming more common. According to the Identity Theft Resource Center, there were more...