Child sexual exploitation impacts everyone around the world. As predators are increasingly using the internet to find victims, law enforcement have also been employing technology in order to apprehend suspects. Thankfully, a new algorithm may allow law enforcement to find these predators before they can cause harm.
Joe Westby is Amnesty International's Technology and Human Rights researcher. Recently, in response to Google's launch of a new messaging service, Westby argued that Google, "shows total contempt for Android users' privacy."
Margot Lee Shetterly delivered a keynote address at the RSA Conference last week. The topic of her speech was "Hidden Figures: The Untold Story of the Black Women Who Helped Win the Space Race," a reference to her bestselling book by the same name.
Hacking the brain of someone with an implanted medical device is not a far-fetched illusion. While at one time a concept relegated to hair-raising Hollywood movies, scientists in Belgium have found that a wireless brain implant, known as a neurostimulator, can be hacked using off-the-shelf materials. By utilizing remote exploitation,
According to Thales e-Security's 2018 Data Threat Report—Federal Government Edition, US federal agencies are experiencing more data breaches than other sectors.
Police in South Wales employed a pioneering fingerprint technique which led to the conviction a drug ring. An image of a man holding ecstasy tablets in his palm was discovered on the cell phone of one of the detained suspects. It was then sent to the Scientific Support Unit of the South Wales Police.
The RSA Conference, an annual security conference with over 40,000 attendees expected this year, runs from April 16th through the 20th. Additionally, there will be 500 vendors who will be on site to brandish the latest tech in the field.