All the Ways Amazon Tracks You—and How to Stop It
The retail empire is obsessed with your data. But is the convenience worth giving up your personal information?
All the Ways Amazon Tracks You—and How to Stop It Read MoreMajor topic areas.
The retail empire is obsessed with your data. But is the convenience worth giving up your personal information?
All the Ways Amazon Tracks You—and How to Stop It Read MoreAt some point next year, Google Chrome will stop using third-party cookies. It’s a move that could upend the global advertising and publishing industries – and it has major implications for your privacy.
Google’s cookie ban and FLoC, explained Read More“Censorship, Surveillance and Profits: A Hard Bargain for Apple in China” The New York Times, May 17, 2021 (Updated June 17, 2021) Technology By Jack Nicas, Raymond Zhong and Daisuke Wakabayashi “Apple built the world’s most valuable business on top of …
Censorship, Surveillance and Profits: A Hard Bargain for Apple in China Read MoreTechnology has completely transformed the global food supply system, yet still hasn’t brought an end to hunger. For that to happen, the choices we need to make are political, not technological.
Technology can help us feed the world, if we look beyond profit Read MoreWe Have Root: Even More Advice from Schneier on Security By Bruce Schneier Published by John Wiley & Sons, Inc., September 2019. ISBN: 978-1-119-64301-2 “A collection of popular essays from security guru Bruce Schneier ” In his latest collection of …
We Have Root: Even More Advice from Schneier on Security Read MoreThis article provides a new perspective by showing that routing attacks on Internet applications can have even more devastating consequences for users—including uncovering users (such as political dissidents) trying to communicate anonymously, impersonating websites even if the traffic uses HTTPS, and stealing cryptocurrency. This article argues that the security of Internet applications and the network infrastructure should be considered together, as vulnerabilities in one layer led to broken assumptions (and new vectors for attacks) in the other.
Securing Internet Applications from Routing Attacks Read More[In this article, we] seek to complement the myriad security research notes by investigating specific cybersecurity practices within organizations to evaluate where organizations are showing improvement, where they are stagnant, and what may be influencing these changes. Our results confirm that cyber-security continues to receive attention on the surface, but when looking beyond surface-level impressions a surprising lack of progress is being made.
Cybersecurity: Is It Worse than We Think? Read MoreDark patterns are user interfaces that benefit an online service by leading users into making decisions they might not otherwise make. Some dark patterns deceive users while others covertly manipulate or coerce them into choices that are not in their best interests.
Dark Patterns: Past, Present, and Future. The evolution of tricky user interfaces. Read MoreWhy, Vespignani wondered, were computer networks still susceptible to viruses even though millions of individual users had antivirus software? The answer, he discovered, was that if you didn’t inoculate the nodes, malicious code could still zip around the internet with relative ease.
The Vulnerable Can Wait. Vaccinate the Super-Spreaders First Read MoreA Turkish scientist’s obscure theoretical breakthrough helped the Chinese tech giant gain control of the future. US telecoms never had a chance.
Huawei, 5G, and the Man Who Conquered Noise Read MoreSmart cities haven’t brought the tangible improvements that many hoped they would. What comes next?
What cities need now Read MoreIn this article, we focus on a set of pathological personality traits known as the dark triad. Evidence from recent insider threat cases leads us to believe these traits may correlate with intentions to engage in malicious behavior.23 After discussing insider threats and the dark triad traits, we present results from an empirical study that illustrate the relationship between the dark triad traits and malicious intent. We then discuss the importance of these results and make recommendations for security managers and practitioners based on our findings.
The Dark Triad and Insider Threats in Cyber Security Read More[This article explores] the need to evolve our understanding of the utility of existing Internet speed test tools and consider how these tools may need to be redesigned to present a more representative measure of a user’s Internet experience.
Measuring Internet Speed: Current Challenges and Future Recommendations Read MoreThis article also travels in time through various storage media, diving into how data has been stored throughout history. By no means does this include every single storage medium ever manufactured, sold, or distributed. This article is meant to be fun and informative but not encyclopedic. It wraps up with a look at the current and future technologies for storage.
The Life of a Data Byte Read MoreSilicon Valley’s mythology of independence to the contrary, politics and government are absolutely central to its story.
Silicon Politics Read MoreThe Open Compute Project was started as an effort to allow other companies running datacenters to benefit from the power efficiencies as well. If more organizations run rack-scale architectures in their datacenters, the wasted carbon emissions caused by conventional servers can be lessened.
Power to the People. Reducing datacenter carbon footprints. Read MoreArtificial intelligence is taking the ability of affordable smartphone apps to empower the blind and visually impaired to the next level.
Technologies for the Visually Impaired Read MoreIn this work, we briefly survey the first decade of research in social bot detection. Via a longitudinal analysis, we discuss the main trends of research in the fight against bots, the major results that were achieved, and the factors that make this never-ending battle so challenging. Capitalizing on lessons learned from our extensive analysis, we suggest possible innovations that could give us the upper hand against deception and manipulation. Studying a decade of endeavors in social bot detection can also inform strategies for detecting and mitigating the effects of other—more recent—forms of online deception, such as strategic information operations and political trolls.
A Decade of Social Bot Detection Read MoreWhat is the point of company-specific sets of principles if the content is largely the same, as we have seen? If well done, the point is that organizations with their own customized set of AI principles can determine how to weigh competing principles and which intrinsic value to prioritize when core principles (and theories) conflict.
Operationalizing AI Ethics Principles Read More