Top News Stories
  • [ June 28, 2022 ] Limiting global warming to 1.5 degrees Celsius would reduce risks to humans by up to 85% Phys.org-Environment
  • [ June 28, 2022 ] Instagram hides some posts that mention abortion TechXplore-Internet
  • [ June 28, 2022 ] Robot overcomes uncertainty to retrieve buried objects TechXplore-Robotics
  • [ June 28, 2022 ] Investigating mRNA-based antibiotics MedicalXpress.com-Research
  • [ June 28, 2022 ] Study finds toxicity in the open-source community varies from other internet forums TechXplore-Internet
Canada's Top News

Dako Windows and Doors Canada

  • Home
  • Apps
  • Artificial Intelligence
  • Business & Finance
  • Computers
  • Environment
  • Internet
  • Mobile
  • Robotics
  • Public Policy
    • Health
    • Research
    • Social Sciences
    • Wellness
  • Security
  • Technology & Software
  • Video Games
  • Special Content
  • Home
  • Apps
  • Artificial Intelligence
  • Business & Finance
  • Computers
  • Environment
  • Internet
  • Mobile
  • Robotics
  • Public Policy
    • Health
    • Research
    • Social Sciences
    • Wellness
  • Security
  • Technology & Software
  • Video Games
  • Special Content
HomeSecurity

Security

  • Cyberattack forces Iran steel company to halt production
    One of Iran's major steel companies said Monday it was forced to halt production after being hit by a cyberattack that also targeted two other plants, apparently marking one of the biggest such assaults on the country's strategic industrial sector in recent memory.... Read more
  • Apple, Android phones targeted by Italian spyware: Google
    An Italy-based firm's hacking tools were used to spy on Apple and Android smartphones in Italy and Kazakhstan, Google said Thursday, casting a light on a "flourishing" spyware industry.... Read more
  • Sniffing out your identity with breath biometrics
    Biometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as fingerprint verification and facial recognition are now common features on many of... Read more
  • A simple tool to make websites more secure and curb hacking
    An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyberattacks.... Read more
  • Sensor imperfections are perfect for forensic camera analysis
    In a project aimed at developing intelligent tools to fight child exploitation, University of Groningen computer scientists have developed a system to analyze the noise produced by individual cameras. This information can be used to link a video or an image to a particular camera. The results were published in... Read more
  • How math and language can combine to map the globe and create strong passwords, using the power of 3 random words
    It's hard to imagine that three random words have the power to both map the globe and keep your private data secure. The secret behind this power is just a little bit of math.... Read more
  • Protecting computer vision from adversarial attacks
    Advances in computer vision and machine learning have made it possible for a wide range of technologies to perform sophisticated tasks with little or no human supervision. From autonomous drones and self-driving cars to medical imaging and product manufacturing, many computer applications and robots use visual information to make critical... Read more
  • Costa Rica chaos a warning that ransomware threat remains
    Teachers unable to get paychecks. Tax and customs systems paralyzed. Health officials unable to access medical records or track the spread of COVID-19. A country's president declaring war against foreign hackers saying they want to overthrow the government.... Read more
  • Why we need philosophy and ethics of cyber warfare
    Cyber-attacks are rarely out of the headlines. We know state actors, terrorists, and criminals can leverage cyber-means to target the digital infrastructures of our societies. We have also learned that, insofar as our societies grow dependent on digital technologies, they become more vulnerable to cyber-attacks.... Read more
  • Researchers give privacy boost to sensitive proprietary patterns discovered in data mining
    Researchers have given a boost to privacy and protection of proprietary or other sensitive information during data mining, while not compromising on the ability to discover useful patterns in huge datasets.... Read more
  • Does TikTok pose data espionage concerns for the US? The answer is complicated
    While Chinese-owned social media platform TikTok has had a meteoric rise in popularity since it was released in 2016, the app's growth has posed privacy concerns when it comes to the collection of users' information, highlighting what a recent New York Times op-ed labeled a "data espionage problem."... Read more
  • Retailers say they use facial recognition for 'loss prevention.' An expert explains what it might mean for you
    Once the purview of law enforcement and intelligence agencies, facial recognition is now being used to identify consumers in Australian stores.... Read more
  • Researchers demonstrate two security methods that efficiently protect analog-to-digital converters from powerful attacks
    Researchers are pushing to outpace hackers and develop stronger protections that keep data safe from malicious agents who would steal information by eavesdropping on smart devices.... Read more
  • If abortion is made a crime, will Microsoft, Amazon and other big data players cooperate with police?
    In a moment when dozens of states are poised to curtail abortion access, Washington has been put forward as a safe harbor for reproductive rights.... Read more
  • Researchers discover a new hardware vulnerability in the Apple M1 chip
    William Shakespeare might have been talking about Apple's recently released M1 chip via his prose in A Midnight Summer's Dream: "And though she be but little, she is fierce."... Read more

Public Mobile Referral Codes

Editor’s Picks

What is ransomware and how to protect your precious files from it

Apps that help parents protect kids from cybercrime may be unsafe too

We’re just not compatible any more: why Microsoft finally dumped Internet Explorer

High-tech contact lenses are straight out of science fiction — and may replace smart phones

More Headlines

Flooding exacerbates pollution exposure in at-risk urban communities

Blockchain tech can help small businesses launch and grow, says expert

Labor Department warning opens divide on crypto in 401(k) plans

A novel Kalman filter for target tracking in space

Lawyers Lookup - Find An Ontario Lawyer

Internet News

4 ways to have a positive experience when engaging with social media

The future of psychiatry promises to be digital — from apps that track your mood to smartphone therapy

How Tinder is being used for more than just hook-ups

Governments must work with restaurants on a no-fee delivery app

Apple’s new ‘app tracking transparency’ has angered Facebook. How does it work, what’s all the fuss about, and should you use it?

Safety app for drivers debuts in flood-plagued Virginia city

Highlights

  • Are digital marketing agencies profitable businesses?
    June 20, 2022
  • How many bots are on Twitter? The question is difficult to answer and misses the point
    June 3, 2022
Latest In Tech

Meta's Quest VR gear to let people 'hang out' in metaverse

Old tricks, new crises: how US misinformation spreads

Sandberg exit unlikely to improve Facebook: whistleblower

Facebook fails again to detect hate speech in ads

Latest in Social Sciences

Seat assignments drive friendships among elementary school children

New resources designed to prevent cruel and inaccurate representation of self-harm in literature

School-based intervention aims to reduce behavioral health impact for LGBTQ+ youth

Overturning Roe v. Wade will put even more of an economic burden on women, says economist

Latest in Retail

Facebook, Instagram take down posts offering abortion pills

Variability in total cost of vehicle ownership across vehicle and user profiles

TERMS OF USE

PRIVACY POLICY

INSTAGRAM

CONTACT US

  • Home
  • Apps
  • Artificial Intelligence
  • Computers
  • Health
  • Internet
  • Mobile
  • Security
  • Software
  • Technology & Software
  • Video Games

© 2022 E-RADIO.CA - CANADA'S LATEST TECH NEWS HEADLINES, STORIES AND MORE.