In the current age, even the most secure software and the best security practices might not be enough to prevent someone from being spied upon. Researchers continue to find novel and inventive ways to gather more data on everyday computer users, and the latest research from Israel’s Ben Gurion University is exceptional in this regard.
Using software alone, Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici were able to convert a given pair of headphones or speakers into Orwellian microphones beyond the user’s control or ability to patch. Their method [PDF] exploits a flaw in RealTek hardware chips, which are one of the most widely used chips in motherboards [...]
Researchers at the University of Science and Technology of China and other Chinese labs, with the collaboration of a lab in the US, have implemented a secure quantum protocol known as Measurement-Device-Independent Quantum Key Distribution (MDIQKD), suitable for practical networks and devices, over a distance of 404 km. The breakthrough, which doubles the previous MDIQKD record, opens the door to secure wide area quantum communication networks.
A team of five Berkeley engineers has developed a new hardware product that utilizes precision location tracking to make smartphone notifications highly intelligent and contextual.
In the technology-minded world that we live in it’s nearly impossible to walk down the street without encountering someone on their phone. However, with the amount of information that we store in our phones it can be difficult to filter out what’s important and what’s not.
This is where Dot enters the scene.
Developed by startup Iota Labs, Dot is a physical push notification that informs your smartphone where you are so that it can determine your patterns and behaviors in the [...]