Non-fungible tokens (NFTs) and digital art (including, I proudly admit, my own) are offering people the chance to tell their stories in innovative new ways. Cryptocurrencies have exploded, offering people around the world a new tool to use for…
With more people looking to cash in on hype surrounding the cryptocurrency market than ever before and an increasing digital workforce which may lack awareness of network security set-ups, cybercriminal activity remains rampant. Bitcoin’s endu…
In the first report produced through the Observatory function of the Europol Innovation Lab, Europol warns that the threats posed by deepfakes are increasing. Deepfake technology uses AI to alter existing images and sometimes create new ones. …
For the past several years, millions of foreign visitors and potential immigrants entering the US have divulged the contents of their social media accounts to the US Department of Homeland Security (DHS). This requirement is part of the Visa L…
European Union officials Cedric O and Thierry Breton both mentioned on Twitter that they expect Elon Musk to abide by the rules of the new Digital Service Act (DSA). The new legislation requires user-generated platforms to police its conten…
Elon Musk is set to spend billions of dollars to acquire Twitter and control its destiny. And he’s already making promises about how he can create a more open, free, and authenticated Twitter experience.
Last week, Barack Obama delivered a keynote address at an event, “Challenges to Democracy in the Digital Information Realm”, co-hosted by The Stanford Cyber Policy Center and the Obama Foundation. The in-person event had more than 250,000 p…
When we wrote about state privacy laws earlier this year, Virginia, California, and Colorado were the only states with laws in place to protect consumers’ privacy. (Nevada has also had a more limited law since 2019.) Since then, Utah Govern…
Late last year, Facebook CEO Mark Zuckerberg announced that the Facebook parent company would be rebranded as Meta. As part of that announcement, he talked about his dream that Meta will eventually be a “metaverse company.” What does that m…
Researchers analyzing anomalies in network traffic coming from a hospital elevator followed the trail to an unsecure TUG Home Base server, which is used to monitor and manage the Aethon TUG robots used by the hospital. The researchers found…