Smart speaker recordings reviewed by humans - BBC News
https://www.bbc.co.uk/news/technology-47893082
Amazon, Apple and Google all employ staff who listen to customer voice recordings from their smart speakers and voice assistant apps.
https://www.bbc.co.uk/news/technology-47893082
Amazon, Apple and Google all employ staff who listen to customer voice recordings from their smart speakers and voice assistant apps.
A global team reviews audio clips in an effort to help the voice-activated assistant respond to commands.
https://qz.com/1585027/when-it-comes-to-climate-change-cotton-totes-might-be-worse-than-plastic/
In a 2018 life-cycle assessment, Denmark’s ministry of environment and food agreed with previous similar studies, finding that classic plastic shopping bags have the least environmental impact.
The results of the study are consistent with our Facebook study: People don’t want surveillance advertising.
Several Toyota companies have announced that they might have suffered data breach attempts
https://www.nytimes.com/interactive/2019/04/04/world/asia/xinjiang-china-surveillance-prison.html
Researchers in Israel created malware to draw attention to serious security weaknesses in medical imaging equipment and networks.
https://arstechnica.com/gadgets/2019/04/googles-constant-product-shutdowns-are-damaging-its-brand/
in 2019, a Google-branded product, feature, or service has died, on average, about every nine days.
https://www.thedailybeast.com/beyond-sketchy-facebook-demanding-some-new-users-email-passwords
Just two weeks after admitting it stored hundreds of millions of its users’ own passwords insecurely, Facebook is demanding some users fork over the password for their outside email account
https://boingboing.net/2019/03/31/mote-in-cars-eye.html
Researchers from Tencent Keen Security Lab have published a report detailing their successful attacks on Tesla firmware, including remote control over the steering, and an adversarial example attack on the autopilot that confuses the car into driving into the oncoming traffic lane.
The researchers used an attack chain that they disclosed to Tesla, and which Tesla now claims has been eliminated with recent patches.
Crashed Tesla vehicles, sold at junk yards and auctions, contain deeply personal and unencrypted data including info from drivers’ paired mobile devices
https://www.nytimes.com/2019/03/28/science/frogs-fungus-bd.html
the most deadly pathogen known to science.
https://www.nytimes.com/2019/03/28/technology/huawei-security-british-report.html
A British review of Huawei found “significant” security problems with the Chinese company’s telecommunications equipment
https://www.wsj.com/graphics/apple-still-hasnt-fixed-its-macbook-keyboard-problem/
Apple’s third-generation butterfly keyboard was supposed to fix all the previous defects but buyers are still having problems
The machine uses lidar to navigate the rows between the trees, and machine vision to identify which apples are ripe […] It then uses a vacuum to gently “suck” apples off the trees.
https://www.wired.com/story/can-ai-be-fair-judge-court-estonia-thinks-so/
https://www.eff.org/deeplinks/2019/03/eus-parliament-signs-disastrous-internet-law-what-happens-next
https://techcrunch.com/2019/03/23/family-tracking-location-leak/
was leaking the real-time locations of more than 238,000 users for weeks
https://www.zdnet.com/article/almost-150-million-users-impacted-by-new-simbad-android-adware/
SimBad adware found in 210 Android apps available on the official Google Play Store.