Your Personal Information Is Probably Being Used to Train Generative AI Models
Companies are training their generative AI models on vast swathes of the Internet—and there’s no real way to stop them
Companies are training their generative AI models on vast swathes of the Internet—and there’s no real way to stop them
Human scent signatures could one day be collected at places like crime scenes and COVID testing sites
An investigative report reveals that new spyware can slip in unseen through online ads—and there is currently no defense against it
In Iran and elsewhere, governments restrict Internet access to restrict freedoms. Companies that launch communications satellites can ensure a free and open Internet for all
Controversial policy proposals such as the Kids Online Safety Act (KOSA) are making headway across the country, but there are other ways to help protect young people in the digital world...
Drivers may sacrifice safety and privacy in exchange for the advanced tech features in their “smart” cars
To steal cars that rely on remotes and computer networks, thieves are trading their pry bars for laptops and wireless devices
AI chatbots blur the line between intimacy and secrecy, posing risks for users with national security interests and access to sensitive information
Hackers have already infiltrated electric vehicle chargers, usually for innocuous reasons, but bad actors could use that foothold to bring down the power grid
In steganography, an ordinary message masks the presence of a secret communication. Humans can never do it perfectly, but a new study shows it’s possible for machines
In the guise of collecting scientific data, data brokers are running a massive privacy invasion. Researchers should stop helping them
Indigenous groups are developing data storage technology that gives users privacy and control. Could their work influence those fighting back against invasive apps?
A cybersecurity expert explains how the FBI’s operation against the ransomware group Hive will impact the rest of this criminal industry
A new algorithm is probably not efficient enough to crack current encryption keys—but that’s no reason for complacency, researchers say
Scientific American technology editor Sophie Bushwick explains how Iran is using surveillance tech against vulnerable citizens.
The Iranian government is taking advantage of Internet shutdowns to push citizens onto a local intranet that is vulnerable to surveillance and censorship
The Census Bureau must improve its data anonymization methods to protect vulnerable groups
A cybersecurity expert explains how we might learn to trust our phones again
Data breaches involve the same old mistakes; we must break the cycle
Support science journalism.
Thanks for reading Scientific American. Knowledge awaits.
Already a subscriber? Sign in.
Thanks for reading Scientific American. Create your free account or Sign in to continue.
Create Account