Car Thieves Can Hack into Today’s Computerized Vehicles
To steal cars that rely on remotes and computer networks, thieves are trading their pry bars for laptops and wireless devices
To steal cars that rely on remotes and computer networks, thieves are trading their pry bars for laptops and wireless devices
AI chatbots blur the line between intimacy and secrecy, posing risks for users with national security interests and access to sensitive information
Hackers have already infiltrated electric vehicle chargers, usually for innocuous reasons, but bad actors could use that foothold to bring down the power grid
In steganography, an ordinary message masks the presence of a secret communication. Humans can never do it perfectly, but a new study shows it’s possible for machines
In the guise of collecting scientific data, data brokers are running a massive privacy invasion. Researchers should stop helping them
Indigenous groups are developing data storage technology that gives users privacy and control. Could their work influence those fighting back against invasive apps?
A cybersecurity expert explains how the FBI’s operation against the ransomware group Hive will impact the rest of this criminal industry
A new algorithm is probably not efficient enough to crack current encryption keys—but that’s no reason for complacency, researchers say
Scientific American technology editor Sophie Bushwick explains how Iran is using surveillance tech against vulnerable citizens.
The Iranian government is taking advantage of Internet shutdowns to push citizens onto a local intranet that is vulnerable to surveillance and censorship
The Census Bureau must improve its data anonymization methods to protect vulnerable groups
A cybersecurity expert explains how we might learn to trust our phones again
Data breaches involve the same old mistakes; we must break the cycle
From figuring out how often you go to the bathroom to potentially being used to prosecute you, your trusty smartphone might not be so trusty in a post-Roe world.
It’s not government Americans don’t trust with their data; it’s the opposite political party
To protect personal information from companies that sell data, some individuals are relying on privacy guides instead of government regulation or industry transparency
Scams and volatility plague this market, and the Biden administration is still trying to decide where the federal government fits in
The technology could help patients exert control over their medical data
When Russia invaded Ukraine, many analysts expected an unprecedented level of cyberattacks—which so far haven’t materialized
Support science journalism.
Thanks for reading Scientific American. Knowledge awaits.
Already a subscriber? Sign in.
Thanks for reading Scientific American. Create your free account or Sign in to continue.
Create Account