How a 30-year-old technology – WiFi – will turn into our next big privacy problem

How a 30-year-old technology – WiFi – will turn into our next big privacy problem

Even if viable approaches could be developed, which is by no means clear, it’s easy to imagine that the default state for WiFi stations supporting the new 802.11bf will be for the privacy algorithms to be turned off.

Amazon just started sharing your internet connection with your neighbors

Amazon just started sharing your internet connection with your neighbors

Amazon recently emailed Ring and Echo owners to let them know that they've been opted in automatically to its new Sidewalk initiative.Tap Account Settings , followed by Amazon Sidewalk .3.

A Paranoid Guide to Fighting the ‘Bugging Epidemic’

A Paranoid Guide to Fighting the ‘Bugging Epidemic’

“I used to sell mostly cameras, but in last few years it’s more detection devices,” said Jill Johnston, chief executive of KJB Security Products in Nashville.Also popular are radio frequency, or R.F., detectors that can pick up signals emitted by surveillance devices.

New 5G flaws can track phone locations and spoof emergency alerts

New 5G flaws can track phone locations and spoof emergency alerts

Last week, the researchers found several security flaws in the baseband protocol of popular Android models — including Huawei’s Nexus 6P and Samsung’s Galaxy S8+ — making them vulnerable to snooping attacks on their owners.

Facial recognition is on the rise, but artificial intelligence is already being trained to recognize humans in new ways — including gait detection and heartbeat sensors

Facial recognition is on the rise, but artificial intelligence is already being trained to recognize humans in new ways — including gait detection and heartbeat sensors

But emerging technology presents alternate means of identifying and tracking humans beyond facial recognition.Here's a rundown of emerging technology that can detect humans and track their location.

How to Set a Sleep Timer on iPhone, iPad and Android

How to Set a Sleep Timer on iPhone, iPad and Android

You can ask the sleep timer feature of Music for help, which allows you to fall asleep to Apple Music or Beats 1 radio without it playing all night. The sleep timer will start and will automatically turn off Apple Music or Beats 1 radio after the time set by you.

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

Protect freedom on radio devices: raise your voice today!

Protect freedom on radio devices: raise your voice today!

It requires hardware manufacturers of most devices sending and receiving radio signals to implement a barrier that disallows installing software which has not been certified by the manufacturer. It will send a signal to the European Commission that there are people who care about freedom on radio devices.

Denver to encrypt police radio traffic, blocking the public — but not news organizations — from listening

Denver to encrypt police radio traffic, blocking the public — but not news organizations — from listening

RELATED: Denver police could be next to go silent as more Colorado agencies encrypt their radio traffic News organizations will have to sign a memorandum of understanding with the city before gaining access, and the city attorney’s office was working this week to finalize what that document will say, Pazen said.

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

(Raybaby did not respond immediately to a request for comment.) Here are some of the newest technologies to track and care for your infant: Video and audio monitors The classic audio-based baby monitor has been upgraded through enhanced sound quality and range.

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

"The people who are doing that are getting a lot of money and are doing that [full time]." Dubbed "AirHopper" by the researchers at Cyber Security Labs at Ben Gurion University , the proof-of-concept technique allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer using radio signals generated and transmitted by the computer and received by a mobile phone.

How to wipe your data from your car

How to wipe your data from your car

Paired phones: These are easy to delete when you sell, loan or service your car. Black boxes: Properly called event data recorders, these have been common since the late 90s and record a rolling snapshot of your car's controls and how you were using them.

GM’s data mining is just the beginning of the in-car advertising blitz

GM’s data mining is just the beginning of the in-car advertising blitz

It wasn’t until The Detroit Free Press reported on General Motors’ radio-tracking program — which monitored the listening habits of 90,000 drivers in the Los Angeles and Chicago areas for three months in late 2017 — that it became clear that the future of targeted advertising in cars is… well, it’s practically already here.

No Cash Needed At This Cafe. Students Pay The Tab With Their Personal Data

No Cash Needed At This Cafe. Students Pay The Tab With Their Personal Data

"We definitely have some people that walk in off the street that are a little confused and a little taken aback when we can't sell them any coffee," said Sarah Ferris, assistant manager at the Shiru Cafe branch in Providence, R.I., located near Brown University.

GM Collected Radio-Listening Data on 90,000 Cars

GM Collected Radio-Listening Data on 90,000 Cars

People who drive the same types of cars also sometimes consistently listen to the same stations, an insight that, once you think about it, kind of makes sense.