Last update:

US seizes internet domains allegedly used by Russian hackers

The United States announced the seizure on Thursday of 41 internet domains allegedly used by Russian intelligence agents to try to gain access to the computers and email accounts of Pentagon, State Department and other US ...

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?
Hi Tech & Innovation
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronics
Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Korean researchers develop AI CCTVs to detect, predict criminal activities
Computer Sciences
Hybrid optimization algorithm helps detect hidden messages in digital images
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher

Other news

Earth Sciences
Arctic ozone reaches record high in positive step for climate
Analytical Chemistry
Chemists use light to replace an oxygen atom with a nitrogen atom in a molecule
Astronomy
Discovery of most distant rotating disk galaxy challenges current formation theories
Nanophysics
Modeling system could enable future generations of self-sensing materials
Plants & Animals
Researchers source new drugs from toxic birds
Plants & Animals
Enzymes in spider venom have bioeconomic potential
Cell & Microbiology
Advanced single-cell genomics approach maps antibiotic resistance
Polymers
New polymer technology targets engineering failure to enhance sustainability
Analytical Chemistry
Material informatics aids in developing high-performance solid electrolytes for rechargeable batteries
Cell & Microbiology
How cells maintain their central processing unit for cell division
Astronomy
Astronomers investigate the nature of a fast-spinning intermediate polar
Molecular & Computational biology
Ending jet lag: Scientists discover secret to regulating our body clock
Space Exploration
Weather may delay launch of mission to study deflected asteroid
Quantum Physics
Unlocking heat management with quantum thermal transistors
Polymers
New polymer design breaks the tradeoff between toughness and recyclability
Astronomy
Astronomers detect multiple extended tidal tails in an old globular cluster
Evolution
Asteroid that wiped out the dinosaurs may have led to the invention of 'ant agriculture'
Bio & Medicine
Paper-based sensor offers rapid cardiac diagnostics in 15 minutes
Earth Sciences
Why is Mount Everest so big? New research highlights a rogue river—but deeper forces are at work
Environment
Study shows EV owners have bigger carbon footprint than average because they are wealthier

Poland spyware cases 'tip of the iceberg': watchdog

Recent allegations that Pegasus spyware was used against three Polish government opponents are likely the "tip of the iceberg," said a cyber expert Wednesday who helped identify the phone taps.

IT security: Computer attacks with laser light

Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts of the Karlsruhe Institute of Technology (KIT) in the LaserShark project. ...