Organic Interfaces; or, How Human Beings Augment Their Digital Devices
In theory, cell phones and other information and communication technologies (ICTs) are just a means for us to interact with people, businesses, and data sources.
In theory, cell phones and other information and communication technologies (ICTs) are just a means for us to interact with people, businesses, and data sources.
A German researcher known as Starbug has demonstrated that it is possible to extract a smartphone PIN code from a selfie image.
Security experts from FireEye have discovered four new methods to hack Android devices and extract user fingerprints remotely.
Unmanned aerial vehicle with the ability to run cyber attacks on computers and mobile devices through Wi-Fi networks.
Rony Abovitz, Graeme Devine, and Neal Stephenson, of Magic Leap in a fireside chat with MIT Technology Review editor in chief Jason Pontin.
Security researcher Seth Wahle of APA Wireless and Rod Soto of Hack Miami used a near-field communications (NFC) chip implant in his hand to demonstrate that it is possible to exploit Android devices and avoid detection by common body scanners located at airports and high-security environments.
Is your smartphone really an extended part of your mind?
The smartphone industry has made a remarkable impact on numerous aspects of human life, and can be seen as a foretaste of what might be achieved by emerging new technologies of human enhancement. Core smartphone technology frequently dropped in price,...
The Touch ID fingerprint reader on the new iPhone 6 can be fooled by the same trick that was working with iPhone 5S.
Location services are considered a serious threat to privacy because location data managed by companies like Google could be used for online surveillance.