Twenty years ago, people mostly took photos that were carefully timed and staged. Today, with gigabytes of storage on our phones, we snap continuously and without worry. Since they cost nothing and we can always delete the bad ones later, we tend not t…
With large amounts of storage available on our modern smartphones, most of us have gotten into the habit of unconsciously snapping photo after photo, not giving a second thought to what that behavior might “cost” us. And that’s exactly what inspired a …
As the artificial intelligence research community comes together For CyberSec & AI Prague next month, guiding principles are on Nicolas Papernot’s mind. “I’m very excited about this conference because at this time this community has an opportunity …
In 1990, there were 3 million people on the internet. (Today there are 1,000 times that many.) And while there were experiments – such as a “wired” soda machine at Carnegie Mellon University – there were no smart devices online, at least not …
Alex Halderman was researching election hacking a decade before the 2016 U.S. presidential race made it front-page news. The computer science professor at the University of Michigan brought change to India’s elections, turned a U.S. voting machine into…
Mac users have often thought of their computers as a safe haven from many of the security threats that confront Windows users. This summer’s Zoom video conferencing vulnerability and the Mac ransomware threats of 2016-2017 show that is no longer true.&…
Mac users have often thought of their computers as a safe haven from many of the security threats that confront Windows users. This summer’s Zoom video conferencing vulnerability and the Mac ransomware threats of 2016-2017 show that is no longer true.&…
Many of us are online throughout the day, going from device to device. We might wake up with our iPhone, switch to an Android tablet, then a Windows laptop for work.
In the largest global study of the Internet of Things in consumers’ homes, researchers from Avast and Stanford University have shown a surprising emergence of IoT devices in consumer homes and shed light on troubling number of devices that continue to …
Cybersecurity and artificial intelligence are two sprawling fields. They overlap in a fascinating area that will draw top experts to Prague in October for the conference CyberSec & AI, which is sponsored by Avast and the Czech Technical University….