Last update:

US seizes internet domains allegedly used by Russian hackers

The United States announced the seizure on Thursday of 41 internet domains allegedly used by Russian intelligence agents to try to gain access to the computers and email accounts of Pentagon, State Department and other US ...

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?
Hi Tech & Innovation
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronics
Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Korean researchers develop AI CCTVs to detect, predict criminal activities
Computer Sciences
Hybrid optimization algorithm helps detect hidden messages in digital images
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher

Other news

Plants & Animals
Study of global primate populations reveals predictors of extinction risk
Astronomy
Large radio bubble detected in galaxy NGC 4217
Analytical Chemistry
Using AI to figure out the chemical composition of paints used in classical paintings
Space Exploration
Nuclear rockets could travel to Mars in half the time, but designing the reactors that would power them isn't easy
Earth Sciences
Limestone and iron reveal puzzling extreme rain in Western Australia 100,000 years ago
Astronomy
The earliest galaxies formed amazingly fast after the Big Bang. Do they break the universe or change its age?
Earth Sciences
Extensive afforestation and reforestation can brake global warming
Nanophysics
Theoretical physicist uncovers how twisting layers of a material can generate mysterious electron-path-deflecting effect
Evolution
Study determines when and how pterosaurs went from tiny tree-climbers to towering terrestrial titans
Cell & Microbiology
Dietary zinc inhibits antimicrobial resistance gene transmission in lab tests
Condensed Matter
Harnessing magnetic relaxation: 'Pac-Man effect' enables precise organization of superparamagnetic beads
Space Exploration
ESA's Hera spacecraft set for asteroid 'crime scene investigation'
Space Exploration
Investigating the possibility of using asteroid material to grow edible biomass for astronauts
Earth Sciences
Antarctic 'greening' at dramatic rate, satellite data show
Superconductivity
Direct measurement of a subtle current phase relation shows potential for more stable superconducting qubits
Astronomy
Traces of antimatter in cosmic rays reopen the search for 'WIMPs' as dark matter
Molecular & Computational biology
Phage cocktail shows promise against drug-resistant bacteria
Materials Science
Innovative method targets removal of PFAS from wastewater
Plants & Animals
Scientists uncover auditory 'sixth sense' in geckos
Social Sciences
Survey experiment reveals celebrities and politicians could be the 'missing link' to mitigate climate change

Keeping web-browsing data safe from hackers

Malicious agents can use machine learning to launch powerful attacks that steal information in ways that are tough to prevent and often even more difficult to study.

Radio waves for the detection of hardware tampering

As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data from a card reader. Researchers ...

An approach for detecting LDoS attacks based on cloud model

Cybersecurity has always been a focus of Internet research. An LDoS attack is an intelligent type of DoS attack, which reduces the quality of network service by periodically sending high-speed but short-pulse attack traffic. ...

Securing systems from cyber-physical system hackers

When it comes to computer security, there are three main objectives: confidentiality—ensuring no one can steal your data; integrity—ensuring that your data has not been changed in any unauthorized way; and availability—making ...

Costa Rica public health system targeted by ransomware

Another attempted hacking of a Costa Rican government agency's computer system led the country's public health agency to shut down its systems Tuesday to protect itself, complicating the medical care of thousands of people.

Peekaboo! Here's a system to guarantee smart home privacy

Many internet-connected devices—let's use smart speakers as an example—share data to the cloud when you interact with them. How do you know your speaker isn't always listening? How do you know it's not sharing more information ...