News Article (145)

View options:

Find narratives by ethical themes or by technologies.

FILTERreset filters
Themes
  • Privacy
  • Accountability
  • Transparency and Explainability
  • Human Control of Technology
  • Professional Responsibility
  • Promotion of Human Values
  • Fairness and Non-discrimination
Show more themes
Technologies
  • AI
  • Big Data
  • Bioinformatics
  • Blockchain
  • Immersive Technology
Show more technologies
Additional Filters:
  • Media Type
  • Availability
  • Year
    • 1916 - 1966
    • 1968 - 2018
    • 2019 - 2069
  • Duration
  • 15 min
  • Splinter
  • 2015
image description
This Startup Promised 10,000 People Eternal Digital Life – Then it Died.

Intellitar marketed its service as a form of digital immortality. For a monthly fee of $25, clients could upload personal data, including voice recordings and photographs, to build a lifelike digital version of themselves. The company claimed to have attracted around 10,000 customers. However, despite its ambitious vision, Intellitar ceased operations, leaving its clients without access to their digital counterparts.

  • Splinter
  • 2015
  • 5 min
  • Tech Crunch
  • 2025
image description
The Meta AI app is a privacy disaster.

Users being able to upload conversations they have with Meta AI has led to some viral posts containing personal data with the world.

  • Tech Crunch
  • 2025
  • 10 min
  • The New York Times
  • 2025
image description
The Weapon that Terrorizes Ukraine by Night

This article reports how Ukraine recovered debris from a newly encountered Shahed drone variant during Russian nighttime strikes. The drone was discovered to have advanced jamming tech, decoys, and saturation. The drone utilized new war tactics and had increased effectiveness of remote warfare.

  • The New York Times
  • 2025
  • TechCrunch+
  • 2022
image description
Revolut confirms cyberattack exposed personal data of tens of thousands of users

This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.

  • TechCrunch+
  • 2022
  • 5 min
  • BBC
  • 2025
image description
Drone Use in Ghaza

A surgeon in the occupied West Bank talks about how Israeli military drones are coming to neighborhoods and picking off civilians, including injured children near hospitals.
 

  • BBC
  • 2025
  • 3 min
  • Cyber Security News
  • 2025
image description
Tesla Wall Connector Hacked in 18 Minute Attack

Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.

  • Cyber Security News
  • 2025
Load more