Roe v. Wade Was Overturned: Here’s How Your Phone Could Be Used to Spy on You
From figuring out how often you go to the bathroom to potentially being used to prosecute you, your trusty smartphone might not be so trusty in a post-Roe world.
From figuring out how often you go to the bathroom to potentially being used to prosecute you, your trusty smartphone might not be so trusty in a post-Roe world.
It’s not government Americans don’t trust with their data; it’s the opposite political party
To protect personal information from companies that sell data, some individuals are relying on privacy guides instead of government regulation or industry transparency
Scams and volatility plague this market, and the Biden administration is still trying to decide where the federal government fits in
The technology could help patients exert control over their medical data
When Russia invaded Ukraine, many analysts expected an unprecedented level of cyberattacks—which so far haven’t materialized
The Putin regime has a portfolio of digital tools to control information and crack down on protests within the country
A falsified video would be an update on the traditional use of propaganda campaigns during warfare
Government agencies are tapping a facial recognition company to prove you’re you
Organizations can act to protect themselves, but collaboration is the best defense
A cybersecurity expert explains how the widely used logging software is already making us more vulnerable
The technique is the latest method to glean a surprising amount of surveillance from a meager source
The answer is not as simple as replacing each nine-digit number with a longer one
The platform strictly limits and controls data access, which stymies scientists
Users can display images as usual, but neither attackers nor tech platforms can see them
The science is clear: abortion by medication is safe and effective
A cybersecurity expert explains the NSO Group’s stealthy software
A massive amount of information downloaded from Parler includes potentially incriminating material. But innocuous posts on mainstream platforms can also create vulnerabilities
A cybersecurity expert explains how hackers used SolarWinds to steal information from government and industry organizations
Apps and human tracers both have pros and cons. To be effective, they have to work together
Support science journalism.
Thanks for reading Scientific American. Knowledge awaits.
Already a subscriber? Sign in.
Thanks for reading Scientific American. Create your free account or Sign in to continue.
Create Account