Menu Close

Articles on Technology

Displaying 1 - 20 of 760 articles

This Russian short-range cruise missile, the Iskander-K, can carry nuclear warheads for several hundred miles. Russian Defense Ministry Press Service photo via AP

What are tactical nuclear weapons? An international security expert explains and assesses what they mean for the war in Ukraine

Tactical nuclear weapons were designed to be used on the battlefield rather than for strategic defense, but that doesn’t mean there’s a plausible case for using them.
Same app, same app store, different risks if you download it in, say, Tunisia rather than in Germany. NurPhoto via Getty Images

The same app can pose a bigger security and privacy threat depending on the country where you download it, study finds

Mobile apps are sometimes ‘regionalized’ to better serve the needs of users, functioning differently in, for example, China than in Canada. But some of those differences pose security and privacy risks.
With deepfake audio, that familiar voice on the other end of the line might not even be human let alone the person you think it is. Knk Phl Prasan Kha Phibuly/EyeEm via Getty Images

Deepfake audio has a tell – researchers use fluid dynamics to spot artificial imposter voices

AI-generated voice-alikes can be indistinguishable from the real person’s speech to the human ear. A computer model that gives voice to the dinosaurs turns out to be a good way to tell the difference.
The last operating reactor at the Zaporizhzhia Nuclear Power Plant, reactor No. 6, has been safely shut down. Xinhua News Agency via Getty Images

Cold shutdown reduces risk of disaster at Zaporizhzhia nuclear plant – but combat around spent fuel still poses a threat

The power plant’s sixth reactor has been shut down, all but eliminating the risk of a nuclear meltdown. But fighting at the site could still release radioactive material.
Blockchain transactions are carried in blocks. The amount of energy it takes to add a new block varies widely depending on how it’s done. Yuichiro Chino/Moment via Getty Images

What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions

Ethereum, one of the world’s largest blockchains and host of decentralized finance, NFTs and billions of dollars’ worth of cryptocurrency, is poised to dramatically reduce its energy consumption.
Peiter “Mudge” Zatko was Twitter’s security chief. What he claims he found there is a security nightmare. Photo by Matt McClain/The Washington Post via Getty Images

Did Twitter ignore basic security measures? A cybersecurity expert explains a whistleblower’s claims

Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
The U.S. could soon catch up to the European Union in protecting people’s data privacy. Teera Konakan/Moment via Getty Images

A new US data privacy bill aims to give you more control over information collected about you – and make businesses change how they handle data

Data collection is big business in the US, but a bipartisan data privacy bill rapidly moving through Congress promises to affect the information websites, social media platforms and all other businesses collect.

Top contributors

More