Toggle light / dark theme

Google Chrome has dominated the internet browser market for the last decade with a staggering near-60% market share and users stretching into the billions.

Rivals to Google Chrome, including Apple’s Safari, Microsoft’s Edge (formerly known as Internet Explorer), and Mozilla’s Firefox have largely failed to convince users to switch—but browser choices are becoming more complex.

Users’ desire for greater security, better privacy, and an ill-defined need to “take back control” from the likes of Google and Microsoft has opened the door for alternatives—including blockchain-based privacy browser Brave, whose chief executive thinks Google “is going to be taken apart over coming years.”

Although hackers managed to defeat TouchID with a fake fingerprint less than 48 hours after the technology was rolled out in the iPhone 5S, fingerprint-based authentication over the past few years has become much harder to defeat. Today, fingerprints are widely accepted as a safe alternative over passwords when unlocking devices in many, but not all, contexts.

A study published on Wednesday by Cisco’s Talos security group makes clear that the alternative isn’t suitable for everyone—namely those who may be targeted by nation-sponsored hackers or other skilled, well-financed, and determined attack groups. The researchers spent about $2,000 over several months testing fingerprint authentication offered by Apple, Microsoft, Samsung, Huawei, and three lock makers. The result: on average, fake fingerprints were able to bypass sensors at least once roughly 80 percent of the time.

The percentages are based on 20 attempts for each device with the best fake fingerprint the researchers were able to create. The results may not be fully applicable to Apple products since they limit users to five attempts before asking for the PIN or password. Other products tested permitted significantly more or even an unlimited number of unsuccessful tries.

A new programme from the US Defense Advanced Research Projects Agency (DARPA) aims to address a key weakness of autonomous and semi-autonomous land systems: the need for active illumination to navigate in low-light conditions.

Unmanned systems rely on active illumination — anything that emits light or electromagnetic radiation, such as light detection and ranging (LIDAR) systems — to navigate at night or underground.

However, according to Joe Altepeter, programme manager in DARPA’s Defense Sciences Office, this approach creates significant security concerns, as such emissions could be detected by potential adversaries.

Circa 2018: In January 2017, while one of us was serving as a homeland security advisor to outgoing President Barack Obama, a deadly pandemic was among the scenarios that the outgoing and incoming U.S. Cabinet officials discussed in a daylong exercise that focused on honing interagency coordination and rapid federal response to potential crises. The exercise is an important element of the preparations during transitions between administrations, and it seemed things were off to a good start with a commitment to continuity and a focus on biodefense, preparedness, and the Global Health Security Agenda—an initiative begun by the Obama administration to help build health security capacity in the most critically at-risk countries around the world and to prevent the spread of infectious disease. But that commitment was short-lived.


Deadly diseases like Ebola and the avian flu are only one flight away. The U.S. government must start taking preparedness seriously.

Terahertz (THz) waves fall between microwave and infrared radiation in the electromagnetic spectrum, oscillating at frequencies of between 100 billion and 30 trillion cycles per second. These waves are prized for their distinctive properties: they can penetrate paper, clothing, wood and walls, as well as detect air pollution. THz sources could revolutionize security and medical imaging systems. What’s more, their ability to carry vast quantities of data could hold the key to faster wireless communications.

THz waves are a type of non-ionizing radiation, meaning they pose no risk to human health. The technology is already used in some airports to scan passengers and detect dangerous objects and substances.

Despite holding great promise, THz waves are not widely used because they are costly and cumbersome to generate. But new technology developed by researchers at EPFL could change all that. The team at the Power and Wide-band-gap Electronics Research Laboratory (POWERlab), led by Prof. Elison Matioli, built a nanodevice that can generate extremely high-power signals in just a few picoseconds, or one trillionth of a second, which produces high-power THz waves.

As they increasingly log on from home, Americans are having to meld their personal technology with professional tools at unprecedented scale. For employers, the concern isn’t just about capacity, but also about workers introducing new potential vulnerabilities into their routine — whether that’s weak passwords on personal computers, poorly secured home WiFi routers, or a family member’s device passing along a computer virus.


The dramatic expansion of teleworking by US schools, businesses and government agencies in response to the coronavirus is raising fresh questions about the capacity and security of the tools many Americans use to connect to vital workplace systems and data.

At one major US agency, some officials have resorted to holding meetings on iPhone group calls because the regular conference bridges haven’t always been working, according to one federal employee. But the workaround has its limits: The group calls support only five participants at a time, the employee noted.

“Things have worked better than I anticipated, but there are lots of hiccups still,” said the employee, who spoke on condition of anonymity because he is not authorized to speak on the record.

Sam Harris discusses the coronavirus withAmesh Adalja.


In this episode of the podcast, Sam Harris speaks with Amesh Adalja about the spreading coronavirus pandemic. They discuss the contagiousness of the virus and the severity of the resultant illness, the mortality rate and risk factors, vectors of transmission, how long coronavirus can live on surfaces, the importance of social distancing, possible anti-viral treatments, the timeline for a vaccine, the importance of pandemic preparedness, and other topics.

Amesh Adalja, MD, is an infectious disease specialist at the Johns Hopkins University Center for Health Security. His work is focused on emerging infectious disease, pandemic preparedness, and biosecurity. Amesh has served on US government panels tasked with developing guidelines for the treatment of plague, botulism, and anthrax. He is an Associate Editor of the journal Health Security, co-editor of the volume Global Catastrophic Biological Risks, and a contributing author for the Handbook of Bioterrorism and Disaster Medicine. Amesh actively practices infectious disease, critical care, and emergency medicine in the Pittsburgh metropolitan area.

Website: www.trackingzebra.com

Twitter: @AmeshAA

The discovery of an East German secret police ID card wouldn’t normally attract much attention, but things get a lot more interesting when it’s Vladimir Putin’s.

Issued in 1985, the document belonged to the then mid-ranking Soviet officer, now the President of Russia. At the time, Putin worked for the KGB spy service as a liaison with the East German State Security Service (Staatssicherheitsdienst), nicknamed the “Stasi.”

From 1985 to 1990, Putin was stationed in Dresden, East Germany. The German newspaper Bild says the ID card found in the archives proves Putin was working for the Stasi, but the Stasi Records Agency (BStU) says it served a purely practical purpose.