Top News Stories
  • [ August 9, 2025 ] New Instagram location sharing feature sparks privacy fears TechXplore-Internet
  • [ August 9, 2025 ] Wildfire smoke significantly raises ozone pollution, even in remote regions Phys.org-Environment
  • [ August 8, 2025 ] Landslide risk doesn’t always rise after a wildfire, Columbia River Gorge study finds Phys.org-Environment
  • [ August 8, 2025 ] Did you walk or cycle to school as a child? Your children are likely to follow in your footsteps MedicalXpress.com-Health
  • [ August 8, 2025 ] User-friendly tool streamlines transcriptomic data analysis for precision medicine applications MedicalXpress.com-Health Technology
Canada's Top News

Key Legal - Lawyers Online, On Demand - Visit KeyLegal.ca

  • Home
  • Apps
  • Artificial Intelligence
  • Business & Finance
  • Computers
  • Environment
  • Internet
  • Mobile
  • Robotics
  • Public Policy
    • Health
    • Research
    • Social Sciences
    • Wellness
  • Security
  • Technology & Software
  • Video Games
  • Special Content
  • Home
  • Apps
  • Artificial Intelligence
  • Business & Finance
  • Computers
  • Environment
  • Internet
  • Mobile
  • Robotics
  • Public Policy
    • Health
    • Research
    • Social Sciences
    • Wellness
  • Security
  • Technology & Software
  • Video Games
  • Special Content
HomeSecurity

Security

  • Do neurotechnologies threaten our mental privacy?
    Consumer devices may soon be able to directly access and interfere with the human brain—but this raises unprecedented ethical and legal questions. How can we leverage the benefits of this technology for therapeutic purposes while preventing its misuse?... Read more
  • Cybercrime study shows users respond to phishing differently based on their device
    In recent years, the most common kind of cybercrime has been phishing, a form of online fraud. In phishing, an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text, and then clicking a malicious link, triggering undesirable processes such as malware installation... Read more
  • You're better at spotting malware than you think, new study suggests
    When it comes to cybersecurity, humans are often seen as the weakest link, but new research suggests that with a little help, people can do a surprisingly effective job at identifying malware.... Read more
  • C++ coroutines prone to code-reuse attack despite control flow integrity
    A code-reuse attack named coroutine frame-oriented programming (CFOP) is capable of exploiting C++ coroutines across three major compilers, namely Clang/LLVM, GCC and MSVC. CFOP even succeeds in environments that are protected by control flow integrity (CFI), exposing relevant gaps in 15 of these defense schemes.... Read more
  • Quantum scheme protects videos from prying eyes and tampering
    We have developed a new way to secure video transmissions so even quantum computers in the future won't be able to break into private video livestreams or recordings. We are computer scientists who study computer security. Our research introduces quantum-safe video encryption, which combines two complementary techniques: quantum encryption and... Read more
  • Codemakers race to secure the internet as quantum threat looms
    With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats.... Read more
  • States pass privacy laws to protect brain data collected by devices
    More states are passing laws to protect information generated by a person's brain and nervous system as technology improves the ability to unlock the sensitive details of a person's health, mental states, emotions, and cognitive functioning.... Read more
  • Tea app takes messaging system offline after second security issue reported
    Tea, a dating discussion app that recently suffered a high-profile cybersecurity breach, announced late Monday that some direct messages were also accessed in the incident.... Read more
  • Vulnerability found: A single packet can paralyze smartphones
    Smartphones must stay connected to mobile networks at all times to function properly. The core component that enables this constant connectivity is the communication modem (baseband) inside the device. KAIST researchers, using their self-developed testing framework called LLFuzz (Lower Layer Fuzz), have discovered security vulnerabilities in the lower layers of... Read more
  • Study reveals how mobile apps track users through WiFi and Bluetooth
    Researchers from IMDEA Networks, in collaboration with Universidad Carlos III de Madrid, IMDEA Software Institute, and the University of Calgary, have conducted the first large-scale study—"Your Signal, Their Data: An Empirical Privacy Analysis of Wireless-scanning SDKs in Android"—on how certain Android mobile applications use a device's WiFi and Bluetooth connections... Read more
  • New e-voting system resists quantum attacks, paving way for secure digital elections
    A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.... Read more
  • Cyberattack on Russian airline Aeroflot causes the cancellation of more than 100 flights
    A cyberattack on Russian state-owned flagship carrier Aeroflot caused a mass outage to the company's computer systems on Monday, Russia's prosecutor's office said, forcing the airline to cancel more than 100 flights and delay others.... Read more
  • Allianz Life confirms data breach affecting majority of 1.4M US customers
    Hackers gained access to personal data on the majority of the 1.4 million customers of Allianz Life Insurance Company of North America, the company confirmed Saturday.... Read more
  • China urges global consensus on balancing AI development, security
    China's Premier Li Qiang warned Saturday that artificial intelligence development must be weighed against the security risks, saying global consensus was urgently needed even as the tech race between Beijing and Washington shows no sign of abating.... Read more
  • Tea, an app for women to safely talk about men they date, has been breached, user IDs exposed
    Tea, an app designed to let women safely discuss men they date has been breached, with thousands of selfies and photo IDs of users exposed, the company confirmed on Friday.... Read more

Public Mobile Referral Codes

Editor’s Picks

How to prepare students for the rise of artificial intelligence in the workforce

Google and Microsoft are creating a monopoly on coding in plain language

How Tinder is being used for more than just hook-ups

Apple’s Siri is no longer a woman by default, but is this really a win for feminism?

More Headlines

Data show 55% of calories come from ultraprocessed foods in the United States

California’s rooftop solar rules in limbo after state Supreme Court ruling

Designed for healing: ‘Architecture for health’ shapes the future of health care spaces

Excessive ultraprocessed foods and poor nutrition tied to poor health

Lawyers Lookup - Find An Ontario Lawyer

Internet News

Should we be forced to see more Canadian content on TikTok and YouTube?

More businesses are trying mobile apps to lure and keep consumers

Governments must work with restaurants on a no-fee delivery app

Screenshots have generated new forms of storytelling, from Twitter fan fiction to desktop film

The future of psychiatry promises to be digital — from apps that track your mood to smartphone therapy

4 ways to have a positive experience when engaging with social media

Highlights

  • Enhance Your Online Presence with Top-Notch Web Design and Digital Marketing Services in Canada
    July 4, 2023
  • Free Dark Web Monitoring Stamps the $17 Million Credentials Markets
    March 1, 2023
Latest In Tech

How Eurostack could offer Canada a route to digital independence from the United States

xAI apologizes for Grok’s offensive posts

Musk’s latest Grok chatbot searches for billionaire mogul’s views before answering questions

Microsoft Outlook users experience hourslong outage impacting email access

Latest in Social Sciences

Five ways digital nomads can have a positive impact on the places they travel to for work

What your credit score says about how, where you were raised

How birth order could influence your mutual fund manager’s decisions

LLMs can predict educational and psychological outcomes from childhood essays with remarkable accuracy

Latest in Retail

Tech multinationals are saying ‘goodbye globalism, hello geopolitics’

‘The race is on:’ Why Frontier is bullish on fiber, and Dallas, after Verizon’s $20B bid

TERMS OF USE

PRIVACY POLICY

INSTAGRAM

CONTACT US

  • Home
  • Apps
  • Artificial Intelligence
  • Computers
  • Health
  • Internet
  • Mobile
  • Security
  • Software
  • Technology & Software
  • Video Games

© 2024 E-RADIO.CA - CANADA'S LATEST TECH NEWS HEADLINES, STORIES AND MORE.