Anupam Joshi, University of Maryland, Baltimore County
The best way to protect a presidential device is to keep it off the internet altogether. If that’s not going to happen, how else can such a sensitive gadget be kept safe?
Computer programming is best learned through practice, but students in developing economies don’t always have access to desktop or laptop computers. Mobile phones may be the solution.
Mi Zhang, Michigan State University; David Mohr, Northwestern University, and Jingbo Meng, Michigan State University
Using sensors on smartphones and smartwatches can shed light on patients’ symptoms of depression, even identifying ones they didn’t notice or share with counselors.
‘Denial of service’ cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
M-PESA was launched nearly a decade ago in Kenya. New evidence suggests that the mobile money banking system has helped reduced poverty levels, particularly in households headed by women.
Did your holiday gift list include radiation-shielding undies to protect your privates from cellphone radio waves? A radiation expert explains they’re unnecessary – your phone won’t affect your fertility.
The biggest cyber security concern for many Tanzanians is the risk of inadvertently becoming a perpetrator of politically-defined cybercrime, rather than becoming a victim
Since spawning a global craze, Pokémon Go has shed a third of its players, while downloads have dried up. What did the developers do wrong, and what can others learn about keeping gamers happy?
Involving the public in data collection - through crowd sourcing - to produce critical public services such as maps and transit apps helps build new conversations on how the system can be improved.
In May this year, I led a paper published in Cancer Epidemiology, which looked at the incidence of brain cancer in Australia between 1982 and 2012. The first mobile phone call was made in Australia in…
Here’s to the Kodak camera, the transistor TV, the portable typewriter and other casualties of a throwaway age. They may be old hat but they are objects of beauty, as a new exhibition shows.
In what circumstances can police search your phone? Must they obtain a search warrant? And what will happen if you refuse to provide your passcode or fingerprint required to access your phone?
Don’t throw away your phone quite yet. There are a lot of unanswered questions surrounding the latest study that found a connection between mobile phones and cancer.