Security news
Security
Ransomware attacks drive majority of US health data breaches, analysis shows
A new study led by researchers from Michigan State University, Yale University and Johns Hopkins University reveals that ransomware attacks—which involve a hacker putting encryption controls into a file and then demanding ...
50 minutes ago
0
0
Security
M&S cyberattacks used a little-known but dangerous technique—and anyone could be vulnerable
The cyberattack that has targeted Marks & Spencer's (M&S) is the latest in a growing wave of cases involving something called sim-swap fraud. While the full technical details remain under investigation, a report in the Times ...
3 hours ago
0
0

How we think about protecting data: Game-based study reveals how context shapes decisions
How should personal data be protected? What are the best uses of it? In our networked world, questions about data privacy are ubiquitous and matter for companies, policymakers, and the public.
May 13, 2025
0
9

Computer scientists discover new security vulnerability in Intel processors
Anyone who speculates on likely events ahead of time and prepares accordingly can react quicker to new developments. What practically every person does every day, consciously or unconsciously, is also used by modern computer ...
May 13, 2025
0
17

Customer data stolen in Marks & Spencer cyberattack
British retailer Marks & Spencer said on Tuesday that some personal data of its customers was stolen in a cyberattack that has crippled its online services for weeks.
May 13, 2025
0
0
Computer Sciences
Quantum computers could crack the security codes used by satellites
Satellites are the invisible backbone of modern life. They guide airplanes, help us find our way with GPS, deliver TV and the internet, and even help emergency services respond to disasters. But a new kind of computer—quantum ...
May 12, 2025
0
0
Security
What lessons in cyber resilience can be learned from the UK high street attacks?
Dr. Patricia Esteve-Gonzalez from Oxford University's Global Cyber Security Capacity Center (GCSCC), Department of Computer Science, and Luna Rohland from the World Economic Forum Center for Cybersecurity, outline how organizations ...
May 12, 2025
0
0
Business

Decentralized finance is booming, and so are the security risks
When the first cryptocurrency, Bitcoin, was proposed in 2008, the goal was simple: to create a digital currency free from banks and governments. Over time, that idea evolved into something much bigger: "decentralized finance," ...
May 8, 2025
0
0
Security

Dramatic rise in publicly downloadable deepfake image generators, study finds
Researchers from the Oxford Internet Institute (OII) at the University of Oxford have uncovered a dramatic rise in easily accessible AI tools specifically designed to create deepfake images of identifiable people, finding ...
May 7, 2025
0
20
Consumer & Gadgets

Smart home devices used to monitor domestic workers raise safety concerns
The growing use of smart home devices is undermining the privacy and safety of domestic workers. New research from King's College London reveals how surveillance technologies reinforce a sense of constant monitoring and control ...
May 7, 2025
0
36
Security

Avoiding AI is hard—but our freedom to opt out must be protected
Imagine applying for a job, only to find out that an algorithm powered by artificial intelligence (AI) rejected your résumé before a human even saw it. Or imagine visiting a doctor where treatment options are chosen by ...
May 7, 2025
0
7
Security

Spy vs. spy: Researchers work to secure messaging
When you send a message through WhatsApp or iMessage, you might think only you and the recipient can read it. Thanks to end-to-end encryption (E2EE), that's usually true, but it's not the whole story, says Dr. Nitesh Saxena, ...
May 5, 2025
0
25
Computer Sciences

Computer scientists create algorithm to protect videos from quantum hacking
Researchers at FIU's College of Engineering and Computing have developed an encryption algorithm to defend videos from attackers with access to the world's most powerful computers.
May 5, 2025
0
0
Security

Developing privacy-aware building automation
Researchers at the University of Tokyo developed a framework to enable decentralized artificial intelligence-based building automation with a focus on privacy. The system enables AI-powered devices like cameras and interfaces ...
May 5, 2025
0
0
Consumer & Gadgets

UK research identifies attitudes toward personal data processing for national security
Almost 80% of U.K. adults support national security agencies collecting and processing personal data to investigate terrorism and serious crime, according to new research by the Center for Emerging Technology and Security ...
May 1, 2025
0
0
Security

Deepfakes now come with a realistic heartbeat, making them harder to unmask
Imagine a world where deepfakes have become so good that no detection mechanism can unmask them as impostors. This would be a bonanza for criminals and malignant state actors: for example, these might use deepfakes to slander ...
Apr 30, 2025
0
39
Internet

Unequal internet: Study highlights differences between websites from developing and developed countries
The Internet may be a global phenomenon, but its often-claimed global nature is tempered by the "digital divide"—digital participation still heavily depends on economic conditions.
Apr 29, 2025
0
0
Security

Information of more than 9,000 people potentially exposed in Blue Cross and Blue Shield of Illinois data breach
The personal information of more than 9,300 people may have been exposed in a recent data breach at health insurer Blue Cross and Blue Shield of Illinois, according to the company.
Apr 29, 2025
0
0
Business

Cyberattacks: How companies can communicate effectively after being hit
In its latest annual publication, insurance group Hiscox surveyed more than 2,000 cybersecurity managers in eight countries, including France. Two-thirds of the companies in the survey reported having been the victim of a ...
Apr 29, 2025
0
0
Security

Oregon agency won't say if hackers stole data in cyberattack
Oregon's environmental agency won't say if a group of hackers stole data in a cyberattack that was first announced earlier this month.
Apr 26, 2025
0
0
Computer Sciences

Spy vs. spy: A new automated removal tool can stop most remote-controlled malware
Cyberattacks can snare workflows, put vulnerable client information at risk, and cost corporations and governments millions of dollars. A botnet—a network infected by malware—can be particularly catastrophic. A new Georgia ...
Apr 25, 2025
0
46
Security

'Poisoned' AI models can unleash real-world chaos; study shows how these attacks could be prevented
An unrelenting, ravenous appetite for more and more data may be artificial intelligence's fatal flaw; or at least the fastest way for "poison" to seep in.
Apr 24, 2025
2
0
Security

S. Korea says DeepSeek transferred data to Chinese company without consent
Chinese artificial intelligence app DeepSeek was transferring personal data to a cloud services platform without users' consent while it was still available for download, South Korea's data protection authority said on Thursday.
Apr 24, 2025
0
0
Security

From help to harm: How the government is quietly repurposing everyone's data for surveillance
A whistleblower at the National Labor Relations Board reported an unusual spike in potentially sensitive data flowing out of the agency's network in early March 2025 when staffers from the Department of Government Efficiency, ...
Apr 23, 2025
0
0
Security

Severance: What the hit show can teach us about cybersecurity and human risk
What if your work self didn't know about your personal life, and your home self had no idea what you did for a living? In Apple TV's Severance, that's exactly the deal: a surgical procedure splits the memories of employees ...
Apr 23, 2025
0
0