Last update:

US seizes internet domains allegedly used by Russian hackers

The United States announced the seizure on Thursday of 41 internet domains allegedly used by Russian intelligence agents to try to gain access to the computers and email accounts of Pentagon, State Department and other US ...

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?
Hi Tech & Innovation
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronics
Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Korean researchers develop AI CCTVs to detect, predict criminal activities
Computer Sciences
Hybrid optimization algorithm helps detect hidden messages in digital images
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher

Other news

Astronomy
Large radio bubble detected in galaxy NGC 4217
Analytical Chemistry
Using AI to figure out the chemical composition of paints used in classical paintings
Cell & Microbiology
Dietary zinc inhibits antimicrobial resistance gene transmission in lab tests
Evolution
Study determines when and how pterosaurs went from tiny tree-climbers to towering terrestrial titans
Astronomy
The earliest galaxies formed amazingly fast after the Big Bang. Do they break the universe or change its age?
Condensed Matter
Harnessing magnetic relaxation: 'Pac-Man effect' enables precise organization of superparamagnetic beads
Earth Sciences
Extensive afforestation and reforestation can brake global warming
Space Exploration
ESA's Hera spacecraft set for asteroid 'crime scene investigation'
Molecular & Computational biology
Phage cocktail shows promise against drug-resistant bacteria
Social Sciences
Survey experiment reveals celebrities and politicians could be the 'missing link' to mitigate climate change
Materials Science
Innovative method targets removal of PFAS from wastewater
Plants & Animals
Scientists uncover auditory 'sixth sense' in geckos
Superconductivity
Niobium-tin magnet could be key to unlocking potential of heavy-ion accelerator
Space Exploration
Solar flares may cause faint auroras across top of Northern Hemisphere
Earth Sciences
Better monitoring of mining remediation: Selenium isotopes are good gauge of clean-up efforts
Quantum Physics
Quantum communication: Using microwaves to efficiently control diamond qubits
Soft Matter
Scientists achieve unprecedented control of active matter
Archaeology
Archaeologists shed light on the Tartessos culture's sustainable construction skills
Biochemistry
New molecule can mimic the effects of fasting and exercise
Plants & Animals
Drier winter habitat impacts songbirds' ability to survive migration

Researchers: Chinese-made GPS tracker highly vulnerable

A popular Chinese-made automotive GPS tracker used in 169 countries has severe software vulnerabilities, posing a potential danger to highway safety, national security and supply chains, cybersecurity researchers have found.

Navigating data privacy in a post-Roe world

The end of Roe v. Wade—a woman's constitutional right to an abortion—has led some digital privacy experts, including Stanford's Riana Pfefferkorn, to ask what could happen to women seeking reproductive healthcare in a ...

New research puts your online privacy preferences to the test

When it comes to privacy, you've probably heard some say they "don't care about privacy if there's nothing to hide." Typically, someone who says this is not taking into account that you may have strong beliefs on the very ...

Log4j software flaw 'endemic,' new cyber safety panel says

A computer vulnerability discovered last year in a ubiquitous piece of software is an "endemic" problem that will pose security risks for potentially a decade or more, according to a new cybersecurity panel created by President ...

New computing architecture protects sensitive private data

As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for computing architectures. Applications that process ...

Rolling privacy into collaborative tools for online working

The rise in online working and collaboration wrought by the ongoing COVID-19 pandemic that started in 2020 continues apace. In parallel we see a rise in security issues surrounding the enabling technologies. A team from India ...