Educational

Examples, Explainer, Educational Case Study, Course, Guide

30 Jan 2016
By 2016, a logical direction for data-driven personalisation efforts to go was toward the "Internet of Emotions": equipping devices with facial, vocal, and biometric sensors that use affective computing to analyse and influence the feelings of device owners. Of particular concern is the potential
02 Jun 2016
The discovery in 2016 of previous hacker break-ins such as the 2013 theft of 360 million old MySpace accounts and the 2012 hack of LinkedIn suggest that although websites come and go and "linkrot" means web pages have a short half-life, user data lives on for a deceptively long time. This is
24 Nov 2015
In 2015, ABI Research discovered that the power light on the front of Alphabet's Nest Cam was deceptive: even when users had used the associated app to power down the camera and the power light went off, the device continued to monitor its surroundings, noting sound, movement, and other activities
14 May 2015
In 2015, Chinese authorities banned the 1.6 million members of the country's People's Liberation Army from using smartwatches and other wearable technology in order to prevent security breaches. Army leaders announced the decision after a soldier in the city of Nanjing was reported for trying to use
10 Nov 2016
In 2016, researchers at Dalhousie University in Canada and the Weizman Institute of Science in Israel developed a proof-of-concept attack that allowed them to take control of LED light bulbs from a distance of up to 400 metres by exploiting a flaw in the Zigbee protocol implementation used in the
28 Jul 2016
In 2016, when Australia was planning to introduce a new welfare system based on data collection, experts from New Zealand, where a similar system was set up in 2012, warned that experience showed that the most vulnerable people were checking out of any relationship with the state. They warned, for
03 Apr 2016
At the 2016 Usenix conference, MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) presented a system called Chronos that could use wifi signals to detect the position of a person or object inside a room to within tens of centimetres. MIT claimed Chronos was 20 times more accurate
28 Oct 2016
In a presentation at London's 2016 Black Hat cybersecurity conference, researchers from UCL showed that it was possible to use ultrasound to track consumers across multiple devices. Marketers were already using beacons inaudible to the human ear to activate functions on devices via their microphones
10 Jun 2016
In June 2016, National Security Agency deputy director Richard Ledgett told a conference on military technology conference that the agency was researching whether internet-connected biomedical devices such as pacemakers could be used to collect foreign intelligence. Ledgett identified the complexity
05 Sep 2016
In September 2016, an algorithm assigned to pick the winners of a beauty contest examined selfies sent in by 600,000 entrants from India, China, the US, and all over Africa, and selected 44 finalists, almost all of whom were white. Of the six non-white finalists, all were Asian and only one had
06 Oct 2015
In 2015, the Canadian Department of National Defence issued a procurement request for a contractor who could find "vulnerabilities and security measures" in a 2015 pick-up truck whose model and make were not specified and "develop and demonstrate exploits" for the military. The contractor was to
07 Oct 2015
The news that connected TVs and set-top boxes were listening in on their owners' conversations led the state of California to pass legislation (AB1116) prohibiting companies from operating a voice recognition feature without prominently informing the user or installer during initial setup. In
25 Sep 2015
In a 2015 study of 79 apps listed in NHS England's Health Apps Library, which tests programs to ensure they meet standards of clinical and data safety, researchers at Imperial College London discovered that 70 of them sent personal data to associated online services and 23 sent that data without
16 Apr 2016
In 2016, 21-year-old Russian photographer Egor Tsvetkov launched the "Your Face is Big Data" project. He created the project by semi-secretly photographing passengers seated across from him on the St. Petersburg metro, then uploading the images to an online service called FindFace. FindFace's
05 Apr 2015
Because banks often decline to give loans to those whose "thin" credit histories make it hard to assess the associated risk, in 2015 some financial technology startups began looking at the possibility of instead performing such assessments by using metadata collected by mobile phones or logged from
A new generation of technology has given local law enforcement officers in some parts of the US unprecedented power to peer into the lives of citizens. The police department of Frenso California uses a cutting-edge Real Time Crime Center that relies on software like Beware. As officers respond to