(#18) Scientists In China Created A Camera That Can Take Clear Photographs 28 Miles Away Through Smog
Zheng-Ping Li is a researcher at the University of Science and Technology of China and in 2019, he and his team created a compact camera that can take photographs with "unparalleled clarity" from 28 miles away, through smog, and can even create 3D models of the subjects.
By focusing a 1550nm low-power infrared laser on a subject and telling the computer to only receive photons from whatever distance the subject stands, the clarity of the image is upgraded and any excess noise is reduced.
The MIT Technology Review says this camera can be used for "remote sensing, airborne surveillance, and target recognition and identification."
(#16) Researchers Know How To Hack Robots
In addition to being used on computers, Ransomware can also be used to hack into robots. In March, 2018, researchers hacked into a SoftBank Robotics NAO humanoid robot as part of a security test. They successfully infiltrated the robot and were able to demand bitcoins as payment to end the hacking. They could also make the robot access data, say curse words, and display controversial material like adult videos. These brands of robots are typically used in stores and classrooms to assist staff, and are becoming increasingly common. In addition to humanoid robots, AI like Amazon Echo are also becoming more widely used nationwide.
What are the implications of this? AI manufacturers need to up their security measures to protect the public. Hacking into robots that assist with stores, hospitals, and more can shut down services and compromise customer data. The effects could potentially even be deadly given WannaCry ransomware shut down UK hospitals in 2017. Workers were forced to turn sick and injured patients away. Had any patients been in need of immediate medical care, causalities were a possibility.
(#20) Your Fitbit Might Know You're Dying Before You Do
Technology is getting more and more personal, and now we have devices that can look inside your body to give you updates on your health. Wearable electronics like Fitbit are surging in popularity, which is allowing companies to gather intimate information about their customers anatomy. On top of that, many of these devices have the capability to alert their users of incoming medical emergencies. People's lives have been saved thanks to products like Fitbit, but it's still pretty weird that one of your devices could possibly predict your untimely death.
(#13) FakeApp Is A Program That Can Swap Faces In Videos At A Hollywood Level
Thanks to powerful computers and user-friendly programs, Hollywood level special effects can be pulled off by people in their pajamas. That sounds like a good thing, but people have already found ways to use the new tech for morally questioanble purposes. FakeApp, a new program that allows you to face swap with hyper-realistic accuracy, has recently caused controversy after users began putting the faces of famous actresses onto adult film stars. High profile celebrities like Michelle Obama have been victims of this practice, and it's becoming clear that nobody is safe from this sort of technology.
Anyone can be inserted into one of these programs and the implications of this are terrified. Could angry exes create their own revenge porn via FakeApp, for example? New laws may have to be drafted to protect people from having their likeness used in explicit video content.
(#5) Ransomeware Can Be Used To Shut Down Critical Services
Cyber attacks are increasingly appearing in the headlines, and their sophistication and potential for damage is growing every day. One common tool used in cyber attacks is something called ransomware, a type of computer virus that holds data hostage until the victim pays a ransom to get it back. Posing as an e-mail from a familiar company - like FedEx, a cable or internet provider, or the gas company - hackers get victims to open a link. The link then downloads a computer's hard drive and locks the user out, presenting a message saying they can only get back into the computer after paying ransom.
A ransomware virus known as WannaCry was behind a 2017 cyber attack that targeted the UK's National Health Service. The attack locked down computers in hospitals throughout the country, causing a national emergency that would last for several days before the virus could be deactivated. Without serious upgrades in computer security, attacks like these could happen with devastating regularity. So, next time you get a seemingly innocent email from a familiar company, use extreme precaution before opening any attachments.
(#6) Your DNA Code Can Be Sold By Sites Like Ancestry.com
Genetic analysis has made its way into the commercial market, and now anyone can have their genome sequenced at a relatively low cost. While finding out your genetic roots might sound appealing, you might want to read the fine print before you give over your DNA. When you ship off your genetic sample to be analyzed, you are giving away the right to use your DNA in any number of ways. While you don't lose your personal ownership to your genetic code, you are giving permission for companies to sell data taken from your genes to third parties. From there, there's no telling what kind of experiments will be run on your personal DNA.
New Random Displays Display All By Ranking
About This Tool
Since the first industrial revolution, human beings have always worried about technological progress at the beginning of the application of new technologies. People used to be afraid of electricity, fear of roaring trains and cars. Indeed, many technologies will cause harm to mankind or nature in some way. There are currently some moral and political reasons that make humans worry or even fear new technologies.
We are in a technological revolution all the time. With the development of technology, more and more frightening inventions are born. This generator collated 20 of the scariest current technologies, you could check more descriptions on this page and welcome to try to refresh the collection.
Our data comes from Ranker, If you want to participate in the ranking of items displayed on this page, please click here.