Electronics

Understanding the real innovation behind the iPhone

Understanding the real innovation behind the iPhone

When the iPhone emerged in 2007, it came with all the promise and pomp of a major Steve Jobs announcement, highlighting its user interface...
Smartphone case offers blood glucose monitoring on the go

Smartphone case offers blood glucose monitoring on the go

Engineers at the University of California San Diego have developed a smartphone case and app that could make it easier for patients to record...
The challenge of authenticating real humans in a digital world

The challenge of authenticating real humans in a digital world

Proving identity is a routine part of modern daily life. Many people must show a driver’s license to buy alcohol at a store, flash an...
Let your car tell you what it needs

Let your car tell you what it needs

Imagine hopping into a ride-share car, glancing at your smartphone, and telling the driver that the car’s left front tire needs air, its air...
The ‘internet of things’ is sending us back to the Middle Ages

The ‘internet of things’ is sending us back to the Middle Ages

Internet-enabled devices are so common, and so vulnerable, that hackers recently broke into a casino through its fish tank. The tank had internet-connected sensors measuring...
Software flaw affects security of nearly every Wi-Fi enabled device

Software flaw affects security of nearly every Wi-Fi enabled device

Hacks and cybersecurity attacks are in the news so frequently—and the threats can be so abstract—that some people find it easier to tune out. But...
Anyone can track you with $1,000 of online ads

Anyone can track you with $1,000 of online ads

For around $1,000, anyone can buy online ads that could allow them to track which apps you use, where you spend money, and your...
Wearable gadget could shield your voice from hackers

Wearable gadget could shield your voice from hackers

A security-token necklace, ear buds, or eyeglasses could eliminate vulnerabilities in voice authentication—the practice of logging in to a device or service with your...
5 ways to protect yourself from retail and restaurant data breaches

5 ways to protect yourself from retail and restaurant data breaches

Theft of payment card information through retail and restaurant data breaches is becoming more common. According to the Identity Theft Resource Center, there were more...
For $1,000, anyone can purchase online ads to track your location and app use

For $1,000, anyone can purchase online ads to track your location and app use

Privacy concerns have long swirled around how much information online advertising networks collect about people's browsing, buying and social media habits -- typically to...