Last update:

New tool can detect malware on Android phones

Screen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.

For AI, secrecy often does not improve security

Concern about misuse of artificial intelligence has led political leaders to consider regulating the emerging technology in ways that could limit access to AI models' inner workings. But researchers at a group of leading ...

More news

Security
Influential resource on international cyber law updated for 2024
Security
Each year, landmines kill residents of war-torn countries. This innovative tool could save lives
Security
US seizes internet domains allegedly used by Russian hackers
Internet
Researchers develop innovative approaches to tackle false information on multiple fronts
Security
Police arrest Australian 'distributor' of Ghost crime app
Business
Tech industry urges G7 to unify cloud security standards
Business
California enacts law to protect brain data
Security
Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations
Security
AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?
Consumer & Gadgets
Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked
Security
AI model beats CAPTCHA every time
Consumer & Gadgets
Meta's AI-powered smart glasses raise concerns about privacy and user data
Security
How did they get my data? I uncovered the hidden web of networks behind telemarketers
Business
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat
Security
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack
Hardware
How a national lab retires—and shreds—large computing resources
Security
Encrypted 'Ghost' app: What we know
Security
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Internet
Study finds that thousands of browser extensions compromise user data
Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?

Other news

Other
Saturday Citations: Brown dwarf actually brown dwarfs; the adaptability of ice-age humans; archaeologists excited
Political science
Megastudy tests crowdsourced ideas for reducing political polarization
Plants & Animals
Worms and snails handle the pressure 2,500m below the Pacific surface
Biochemistry
Team develops promising new form of antibiotic that makes bacterial cells self-destruct
Nanophysics
Controlling sound waves with Klein tunneling improves acoustic signal filtration
Cell & Microbiology
Cellular senescence research identifies key enzyme to promote healthy aging
Biochemistry
Lignin molecular property discovery could help turn trees into affordable, greener industrial chemicals
Plants & Animals
American lobster population and habitat preferences shifting, study finds
Analytical Chemistry
New strategy unlocks magnetic switching with hydrogen bonding at molecular level
Analytical Chemistry
Leveraging skyscraper architecture: New design enhances porosity and structural stability for metal-organic frameworks
Cell & Microbiology
Team achieves successful reproduction of hematopoietic stem cell developmental process in an in vitro culture system
Earth Sciences
Scientists untangle the challenging complexities of radiocarbon in ice cores
Cell & Microbiology
Uncovering new regulatory mechanisms in embryo implantation
Earth Sciences
Could injecting diamond dust into the atmosphere help cool the planet?
Astronomy
First results from the Axion Dark-Matter Birefringent Cavity experiment establish a new technique for axion search
Plants & Animals
Bumblebee queens choose to hibernate in pesticide-contaminated soil, scientists discover
Astronomy
Physicists show that neutron stars may be shrouded in clouds of axions
Nanomaterials
New fabrication strategy enhances graphene aerogel sensitivity and durability for human-machine interfaces
Environment
Global study reveals people, including those most affected by climate change, do not understand climate justice
Plants & Animals
Butterfly brains reveal the tweaks required for cognitive innovation

Leaked report shows United Nations suffered hack

Sophisticated hackers infiltrated U.N. networks in Geneva and Vienna last year in an apparent espionage operation that top officials at the world body kept largely quiet. The hackers' identity and the extent of the data they ...

Hey Google, are my housemates using my smart speaker?

Surveys show that consumers are worried that smart speakers are eavesdropping on their conversations and day-to-day lives. Now University of British Columbia researchers have found that people are also concerned about something ...

Facebook rolls out tool globally to clear third-party data

Facebook said Tuesday a new tool allowing users of the social network to view and delete data it collects from third parties is rolling out to the estimated two billion members of the leading social network worldwide.

Understanding emerging blockchain identity management systems

Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results in concerns over interoperability, security, and privacy. However, ...