Shutterstock The recent questioning of the heads of Amazon, Facebook, Google and Apple in the US Congress has highlighted the threat their practices pose to our privacy and democracy. However these big four companies are only part of a vast, sophisticated system of mass surveillance. In this network are thousands of data […]

In the US, tireless opposition to state use of facial recognition algorithms has recently won some victories. Some progressive cities have banned some uses of the technology. Three tech companies have pulled facial recognition products from the market. Democrats have advanced a bill for a moratorium on facial recognition. The Association for Computing Machinery (ACM), a leading computer science organisation, has […]

Patrons of the library at the University of California, Berkeley, and at sister campuses will also get access to an additional 1000 Springer Nature journals. BEN CHU/SHUTTERSTOCK.COM The University of California (UC) system today announced it has signed the biggest open-access (OA) deal in North America with one of the […]

BAGUS INDAHONO/EPA People in Western Australia may soon see more than birds in the sky, as the state’s police force has announced plans to deploy drones to enforce social distancing. The drones will visit parks, beaches and cafe strips, ensuring people comply with the most recent round of gathering rules. As COVID-19 restrictions […]

On Monday, the Office of the Australian Information Commissioner (OAIC) brought proceedings against Facebook in the Federal Court, asking the court to impose financial penalties for serious interference with the privacy of more than 300,000 Australians. To our knowledge, this is the first time the privacy regulator has sought civil penalty orders under the Privacy […]

Intel processors are still vulnerable to attack according to computer scientists at KU Leuven. Computer scientists at KU Leuven have once again exposed a security flaw in Intel processors. Jo Van Bulck, Frank Piessens, and their colleagues in Austria, the United States, and Australia gave the manufacturer one year’s time […]

MIT researchers identify security vulnerabilities in voting app. Credit: MIT Mobile voting application could allow hackers to alter individual votes and may pose privacy issues for users. In recent years, there has been a growing interest in using internet and mobile technology to increase access to the voting process. At […]

Ransomware attacks are becoming increasingly complex, as hackers find creative ways to beat ordinary systems of defence. christiaancolen/flickr, CC BY In recent weeks, Johannesburg’s computer network was held for ransom by a hacker group called Shadow Kill Hackers. This was the second time in three months a ransomware attack has hit South Africa’s largest city. […]