Top News Stories
  • [ October 27, 2025 ] Physics-based model can predict floods and improve water management worldwide Phys.org-Environment
  • [ October 27, 2025 ] Can AI have morality? Philosophy weighs in Phys.org-Social Sciences
  • [ October 27, 2025 ] Why stigmatizing ultra-processed foods could be doing more harm than good MedicalXpress.com-Health
  • [ October 27, 2025 ] How blind and low-vision users manage their passwords TechXplore-Security
  • [ October 27, 2025 ] From grooming gangs to Virginia Giuffre, this is the common thread in abuse Phys.org-Social Sciences
Canada's Top News

Key Legal - Lawyers Online, On Demand - Visit KeyLegal.ca

  • Home
  • Apps
  • Artificial Intelligence
  • Business & Finance
  • Computers
  • Environment
  • Internet
  • Mobile
  • Robotics
  • Public Policy
    • Health
    • Research
    • Social Sciences
    • Wellness
  • Security
  • Technology & Software
  • Video Games
  • Special Content
  • Home
  • Apps
  • Artificial Intelligence
  • Business & Finance
  • Computers
  • Environment
  • Internet
  • Mobile
  • Robotics
  • Public Policy
    • Health
    • Research
    • Social Sciences
    • Wellness
  • Security
  • Technology & Software
  • Video Games
  • Special Content
HomeSecurity

Security

  • How blind and low-vision users manage their passwords
    Passwords remain the go-to authentication tool in everyday life, says CISPA researcher Alexander Ponticello. At the same time, passwords are often a security weak spot: too short, too simple, and reused far too often. Blind and low-vision people face an additional hurdle: Systems need to work together sensibly for authentication... Read more
  • What's the difference between passwords and passkeys? It's not just the protection they provide
    Passwords are the keys to our digital lives—think how many times you log in to websites and other systems. But just like physical keys, they can be lost, duplicated and stolen.... Read more
  • Anonymity's ARX nemesis
    A team of faculty and students from George Mason University recently discovered a vulnerability in a widely used anonymization tool. They presented their findings last week in Taiwan at the Association for Computing Machinery Conference on Computer and Communications Security (ACM CCS 2025). The paper is available on the arXiv... Read more
  • New study uncovers data protection gaps in popular mHealth apps
    Researchers at the University of Bremen have uncovered significant discrepancies between the data protection claims and the actual behavior of mobile health applications (mHealth apps). Many apps transmit personal data before users have even given their consent.... Read more
  • Scientists create a novel hydrogel for unclonable security tags
    Encryption technologies are vital in today's digital landscape to protect sensitive information from hackers and prevent fraud. While cutting-edge encryption has been developed for data, sophisticated protection for physical objects such as high-value products, access cards and documents has lagged behind until now.... Read more
  • Robotaxis keep riders safe, but what about their data?
    A robotaxi pulls up to the curb in Los Angeles. The front seat is empty, no driver in sight. The customer slides into the back seat, and off the ride goes to a destination typed into the app, its cameras and sensors silently collecting where she goes and maybe even... Read more
  • Breakthrough quantum-secure link protects data using the laws of physics
    Australian technology has delivered a live quantum-secure link, a breakthrough that promises to future-proof critical data against tomorrow's cyber threats.... Read more
  • Walkthrough screening system enhances security at airports nationwide
    A new security screener that people can simply walk past may soon be coming to an airport near you. In 2024, U.S. airports nationwide began adopting HEXWAVE—a commercialized walkthrough security screening system based on microwave imaging technology developed at MIT Lincoln Laboratory—to satisfy a new Transportation Security Administration (TSA) mandate... Read more
  • Estates of Jimmy Stewart, Judy Garland, Albert Einstein, to be protected against AI manipulation
    The likenesses of Jimmy Stewart, Judy Garland, Rosa Parks, Albert Einstein, and many other late celebrities will be shielded against artificial intelligence recreations thanks to a new deal by their estate handler.... Read more
  • A RADIANT future for cybersecurity
    Stealth cyber-attacks against power grids, water systems and other critical infrastructure often go undetected until it is too late. Led by Dr. Irfan Khan, researchers from the Clean and Resilient Energy Systems (CARES) Laboratory at Texas A&M University have developed a novel cybersecurity system to detect and defend against these... Read more
  • Federated learning AI developed for hospitals and banks without personal information sharing
    Federated learning was devised to solve the problem of difficulty in aggregating personal data, such as patient medical records or financial data, in one place. However, during the process where each institution optimizes the collaboratively trained AI to suit its own environment, a limitation arose: The AI became overly adapted... Read more
  • Training the grid to spot cyberattacks without seeing your data
    SUTD researchers test a privacy-preserving approach that blends federated learning with cloud coordination for smart grids in future 6G environments.... Read more
  • Myanmar scam cities booming despite crackdown—using Musk's Starlink
    They said they had smashed them. But fraud factories in Myanmar blamed for scamming Chinese and American victims out of billions of dollars are still in business and bigger than ever, an AFP investigation can reveal.... Read more
  • AI-powered method helps protect global chip supply chains from cyber threats
    University of Missouri researchers have used artificial intelligence to detect hidden hardware trojans through a method that's 97% accurate.... Read more
  • Cybercriminals are not the lone wolves of 20 years ago, says expert
    City University London spoke to Professor Rajarajan about his mission to protect us all from the threat of international cyber criminality. Professor Raj Rajarajan is an academic at City St George's, University of London whose research focuses on cybersecurity and security engineering.... Read more

Public Mobile Referral Codes

Editor’s Picks

Governments must work with restaurants on a no-fee delivery app

The digital economy’s environmental footprint is threatening the planet

Robots are coming and the fallout will largely harm marginalized communities

Smartwatches are a bigger distraction to drivers than mobile phones

More Headlines

Stillbirths in the US exceed previous estimates: Study finds many occur with no clinical risk factors

LA’s trippy museum of AI arts—and its new opening plan

Here’s what happens to your body when clocks ‘fall back’ an hour

New tool screens for access to healthy food

Lawyers Lookup - Find An Ontario Lawyer

Internet News

Screenshots have generated new forms of storytelling, from Twitter fan fiction to desktop film

4 ways to have a positive experience when engaging with social media

The future of psychiatry promises to be digital — from apps that track your mood to smartphone therapy

Governments must work with restaurants on a no-fee delivery app

More businesses are trying mobile apps to lure and keep consumers

Apple’s new ‘app tracking transparency’ has angered Facebook. How does it work, what’s all the fuss about, and should you use it?

Highlights

  • Enhance Your Online Presence with Top-Notch Web Design and Digital Marketing Services in Canada
    July 4, 2023
  • Free Dark Web Monitoring Stamps the $17 Million Credentials Markets
    March 1, 2023
Latest In Tech

California enacts AI safety law targeting tech giants

Instagram’s ‘deliberate design choices’ make it unsafe for teens despite Meta promises, report says

EU chief backs calls to keep children off social media

China penalizes ByteDance and Alibaba platforms in content crackdown

Latest in Social Sciences

Why US activists are wearing inflatable frog costumes at protests against Trump

How social norms evolved over time and differ across countries

Romantic partner status determines changes in fertility desires, study finds

Latest arrests may just be the ‘tip of the iceberg’ of pervasive sports gambling problem, experts say

Latest in Retail

Why electricity costs so much in the UK (it’s not all about the weather)

Amazon’s big outage reminds us that we trust big tech companies far too much

TERMS OF USE

PRIVACY POLICY

INSTAGRAM

CONTACT US

  • Home
  • Apps
  • Artificial Intelligence
  • Computers
  • Health
  • Internet
  • Mobile
  • Security
  • Software
  • Technology & Software
  • Video Games

© 2024 E-RADIO.CA - CANADA'S LATEST TECH NEWS HEADLINES, STORIES AND MORE.