Author: Malavika Madgula

Malavika Madgula is a writer and coffee lover from Mumbai, India, with a post-graduate degree in finance and an interest in the world. She can usually be found reading dystopian fiction cover to cover. Currently, she works as a travel content writer and hopes to write her own dystopian novel one day.

The digital revolution in healthcare has reached our bodies, with wearable technology having made significant progress in sensing biochemical and physiological markers for telehealth and remote patient monitoring They’ve revolutionised personalised healthcare by facilitating a shift from traditional, hospital-centred environments to more decentralised, patient-centric models. Wearable sensors are now collecting real-time physiological data, providing deep analysis, and generating actionable insights for personalised therapy and point-of-care precise diagnostics. In fact, wearable tech devices, such as smartwatches and fitness trackers, have become pervasive, ensuring continuous monitoring of vital physiological parameters, including sleep patterns, activity levels, heart rate, and even advanced metrics like…

Read More

Could you imagine a data centre sharing space with quarries that store cheeses, wine, and apples? You don’t have to imagine anymore, as it’s already happening. The Dolomites in the Italian Alps are to be home to Intacture, Europe’s very first digital data centre being built deep inside the active underground San Romedio mine. Sitting just outside the city of Trento in the province of Trentino, this mine data centre is a 5MW facility that’ll even support colocation services beginning in 2026. Who knew that nature and cutting-edge technology would meet in such an interesting way? Miracle Beneath The Mountain…

Read More

In 2018, Singapore declared its plans for nationwide monitoring by deciding to embed facial recognition cameras in lampposts.. Likewise, Malaysia, around the same time, was readying to partner with China’s Yitu Technology to provide a central database-linked artificial intelligence (AI)-powered facial recognition system to its police. The reason? Using body camera footage to identify citizens in real time. These aren’t isolated examples. There’s a new breed of digital eyes that are keeping watch over citizens around the world. While mass surveillance isn’t a new concept, these AI-powered systems have allowed the governments to keep much more efficient tabs on the…

Read More

In the 1995 Sandra Bullock movie The Net, a supposedly secure and safe security program is actually a Trojan horse of sorts, allowing hackers “backdoor access” into business mainframes. It might have sounded high-tech at the time, but backdoor attacks are anything but new…. They were originally developed in the 1960s as troubleshooting tools, but transformed into malicious methods of unauthorised access by the 1980s. As the cybersecurity landscape has rapidly evolved since then, they’ve constantly faced this particularly insidious threat: backdoors. Basically, they’re already existing clandestine entry points that allow hackers to gain unauthorised access to systems by bypassing…

Read More

Tangible investments and assets increasingly look like a thing of the past… As our world becomes progressively digital, the conversation is getting noisy, with the concept of ownership is also going through a profound transformation. We’re moving beyond mere physical possession of assets and exploring new ways of ownership, trading, and managing them. For many, the terms ‘digital assets’ conjure images of unique digital items and NFT art collections that have intrigued and enthralled the masses. However, two terms that are cutting through the noise and frequently appearing just about everywhere: NFTs (non-fungible tokens) and RWA (Real World Asset) Tokenization.…

Read More

Imagine creating artificial intelligence (AI) for your benefit, only for it to be used to create ransomware that could potentially even destroy your own data. It sounds straight out of a Black Mirror episode, but it’s very much the reality. Recently, cybersecurity firm ESET’s researchers discovered the world’s very first AI-powered ransomware, ‘PromptLock.’ Interestingly, it was created using OpenAI’s gpt-oss-20b model and leverages Lua scripts to perform reconnaissance on the local filesystem. It not only sweeps through the target files and exfiltrates selected data, but can also encrypt and possibly destroy it. If that didn’t scare you enough, these Lua…

Read More

Do you use different versions of the same password for your 300+ social media, app delivery, and shopping accounts? Have you used password managers to generate and store all login credentials? Or have you used the same nightmare combination that your system auto-generated simply because it checks all boxes and has the least chances of getting hacked? No matter which category you fall into, the way we’ve been using passwords has been broken for a long time. However, that’s finally changing with the advent of passkeys, which are here to replace passwords. Widely considered to be more secure than passwords,…

Read More

According to BrightEdge Research, nearly 68% of internet activity begins on search engines, with around 90% of those searches taking place on Google…. This arrangement has held so strong for the last few decades that even a seemingly minor change has convinced some people that the system might be crumbling. We’re talking about the new (artificial intelligence) AI tool that appears atop the results when you perform a Google Search. Despite generating iffy results sometimes, these AI-generated overviews succinctly summarise whatever information you’re looking for – so much so that sometimes you don’t even need to go past them to…

Read More

In the last week alone, three different people with vastly different lives have told me how easy it is to talk to ChatGPT as compared to the people in their lives. They told me that chatting with the chatbot has been therapeutic and there’s finally someone – or rather, something – that finally understands them. Does it ring alarm bells in your head? It should, given that an increasing number of people are having full-blown, persuasive conversations with generative AI (artificial intelligence) chatbots that have sadly led to instances of institutionalisation, divorce, and even death. Not only are your chats private, as we…

Read More

Imagine this: a job applicant submitting a resume that’s been polished by artificial intelligence (AI). However, inside the file is a hidden, invisible instruction which, when scanned by the hiring system’s AI, confidently reports that this particular applicant is an ideal candidate – even if their resume says otherwise. There’s no malware involved, there are no hacking attempts. All it took was carefully crafted language that’s designed to exploit how the AI interprets “prompts.” Aptly called a prompt injection attack, it’s quickly transforming into one of the most important and critical cybersecurity issues that generative AI (GenAI) systems are facing…

Read More