Our phones are almost always tracking our location, even with the GPS services turned off. This is because to receive service, our phones disclose personal identifiers to cell towers owned by major network operators. This has resulted in a large…
Category: Technical Articles
Technical papers written in the field of wireless sensor networks
New Research Sheds Light on Kids’ Password Behavior
Passwords are necessary for security and managing our online accounts ranging from emails to our social media profiles. To reduce the risk of cyberattacks, it is important that there be training and education for strengthening passwords and protecting our accounts.…
Simulator Helps Robot Enhance their Cutting Skills
Researchers from the USC’s Department of Computer Science and NVDIA have released a new simulator for robotic cutting which can accurately reproduce the forces acting on a knife while it slices through common food. The system can also simulate cutting…
New System Hack for Windows Hello
A key piece of the tech industry’s plan to make the world password-less and safer is biometric authentication. However, a novel method for bypassing Microsoft’s Windows Hello facial recognition system shows that a little fiddling with the hardware can deceive…
Crucial Agreement Reached Between EU and UK Regarding Data Protection
On Monday, the European Union officially recognized the privacy rules of Britain as sufficient on its own, which will allow EU-U.K. data flows persist after Brexit. The executive arm of EU, the European Commission stated that this decision meant that…
Vulnerabilities in Card Reader Technology Crashes POS and ATMs
Security researchers and cyberattackers have hacked ATMs using all kinds of methods, from sticking a thumb drive into a USB port to drilling a hole to reveal internal wiring. Recently, a research discovered a collection of bugs allowing him to…
‘Magic’ Carpet Guesses Human Poses
A new tactile sensing carpet from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) can guess human poses without using cameras— a step to enhancing self-powered personalized healthcare, gaming and smart homes. Previous research has discussed use of single RGB…
New Report says Average Time to Fix Cybersecurity Vulnerabilities is 205 Days
New reports emerging from WhiteHat Security suggests that the average time it takes to fix critical cybersecurity problems has increased from 197 days in April 2021 to 205 days in May 2021. Whitehat researchers found that organizations in the…
New Research Shows Drone Can Shoot Video Based on Desired Emotion
Making a movie with a drone is quite tasking. First of all, it requires skill to fly the expensive pieces of equipment smoothly without any crashes. Once you have mastered flying, there care panning speeds, camera angles, trajectories and flight…
Introducing Therapeutic Chatbot, Woebot
New app called ‘Woebot’ acts in place of a therapist as a therapeutic chatbot. It presents itself as an automated therapist when finding a real one seem financially or otherwise impossible. The need for therapists is growing exponentially. According to…