article thumbnail

GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

The Last Watchdog

Surrounded by the invisible hum of electromagnetic energy, we’ve harnessed its power to fuel our technological marvels for decades. Often overlooked, the SIM card —short for Subscriber Identification Module—acts as the nexus between our identity and technology, illuminating the thin line between connection and surveillance.

Mobile 203
article thumbnail

Microsoft Chief Brad Smith wants AI to be controlled by 2024

CyberSecurity Insiders

Microsoft President Brad Smith has issued a warning against the use of Artificial Intelligence technology and said that if the tech remains uncontrolled, and then it can spell doom on mankind by 2024. . The post Microsoft Chief Brad Smith wants AI to be controlled by 2024 appeared first on Cybersecurity Insiders.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the Need for an AI Public Option

Schneier on Security

But do we really want to entrust this revolutionary technology solely to a small group of US tech companies? These and countless other ethical lapses should prompt us to consider whether we want to give technology companies further abilities to learn our personal details and influence our day-to-day decisions.

article thumbnail

The Challenges Facing the Passwordless Future

eSecurity Planet

In 2013, for example, the FIDO Alliance was created to solve the world’s password problem by replacing login technology. But beyond these cases, how advanced is the implementation of the technology that wants to end passwords once and for all? billion by 2030 — a stunning 2,000% in less than a decade.

Passwords 122
article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

Once a niche technology, drones are about to explode in terms of market growth and enterprise adoption. Naturally, threat actors follow the trend and exploit the technology for surveillance, payload delivery, kinetic operations, and even diversion. Original post at [link]. Market overview.