Remove 2030 Remove Surveillance Remove Technology
article thumbnail

GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

The Last Watchdog

Surrounded by the invisible hum of electromagnetic energy, we’ve harnessed its power to fuel our technological marvels for decades. Often overlooked, the SIM card —short for Subscriber Identification Module—acts as the nexus between our identity and technology, illuminating the thin line between connection and surveillance.

Mobile 203
article thumbnail

On the Need for an AI Public Option

Schneier on Security

But do we really want to entrust this revolutionary technology solely to a small group of US tech companies? These and countless other ethical lapses should prompt us to consider whether we want to give technology companies further abilities to learn our personal details and influence our day-to-day decisions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Chief Brad Smith wants AI to be controlled by 2024

CyberSecurity Insiders

Microsoft President Brad Smith has issued a warning against the use of Artificial Intelligence technology and said that if the tech remains uncontrolled, and then it can spell doom on mankind by 2024. . The post Microsoft Chief Brad Smith wants AI to be controlled by 2024 appeared first on Cybersecurity Insiders.

article thumbnail

The Challenges Facing the Passwordless Future

eSecurity Planet

In 2013, for example, the FIDO Alliance was created to solve the world’s password problem by replacing login technology. But beyond these cases, how advanced is the implementation of the technology that wants to end passwords once and for all? billion by 2030 — a stunning 2,000% in less than a decade.

Passwords 126
article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

Once a niche technology, drones are about to explode in terms of market growth and enterprise adoption. Naturally, threat actors follow the trend and exploit the technology for surveillance, payload delivery, kinetic operations, and even diversion. Original post at [link]. Market overview.

article thumbnail

White House Proposes Ban on Connected Vehicle Tech from China, Russia

SecureWorld News

The White House has put forward a plan to ban connected vehicle technologies from countries of concern, particularly China and Russia, in a move that underscores the growing intersection of transportation and cybersecurity. ADS refers to the technologies that allow for autonomous vehicle operation.

article thumbnail

Trade Wars: How U.S. Tariffs Are Reshaping Cyber Risk and Resilience

SecureWorld News

agricultural exports and expanded its export restrictions on critical technology components and cybersecurity-related industries. Any export controls from China could severely impact the availability of next-gen cybersecurity technology in the U.S. alcohol and other products off their shelves and canceling orders.