Last update:

New tool can detect malware on Android phones

Screen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.

For AI, secrecy often does not improve security

Concern about misuse of artificial intelligence has led political leaders to consider regulating the emerging technology in ways that could limit access to AI models' inner workings. But researchers at a group of leading ...

More news

Security
Influential resource on international cyber law updated for 2024
Security
Each year, landmines kill residents of war-torn countries. This innovative tool could save lives
Security
US seizes internet domains allegedly used by Russian hackers
Internet
Researchers develop innovative approaches to tackle false information on multiple fronts
Security
Police arrest Australian 'distributor' of Ghost crime app
Business
Tech industry urges G7 to unify cloud security standards
Business
California enacts law to protect brain data
Security
Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations
Security
AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?
Consumer & Gadgets
Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked
Security
AI model beats CAPTCHA every time
Consumer & Gadgets
Meta's AI-powered smart glasses raise concerns about privacy and user data
Security
How did they get my data? I uncovered the hidden web of networks behind telemarketers
Business
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat
Security
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack
Hardware
How a national lab retires—and shreds—large computing resources
Security
Encrypted 'Ghost' app: What we know
Security
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Internet
Study finds that thousands of browser extensions compromise user data
Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?

Other news

Other
Saturday Citations: Brown dwarf actually brown dwarfs; the adaptability of ice-age humans; archaeologists excited
Optics & Photonics
All-optical switch device paves way for faster fiber-optic communication
Political science
Megastudy tests crowdsourced ideas for reducing political polarization
Plants & Animals
Worms and snails handle the pressure 2,500m below the Pacific surface
Earth Sciences
Could injecting diamond dust into the atmosphere help cool the planet?
Astronomy
First results from the Axion Dark-Matter Birefringent Cavity experiment establish a new technique for axion search
Plants & Animals
Bumblebee queens choose to hibernate in pesticide-contaminated soil, scientists discover
Astronomy
Physicists show that neutron stars may be shrouded in clouds of axions
Environment
Global study reveals people, including those most affected by climate change, do not understand climate justice
Nanomaterials
New fabrication strategy enhances graphene aerogel sensitivity and durability for human-machine interfaces
Biochemistry
Team develops promising new form of antibiotic that makes bacterial cells self-destruct
Nanophysics
Controlling sound waves with Klein tunneling improves acoustic signal filtration
Cell & Microbiology
Cellular senescence research identifies key enzyme to promote healthy aging
Biochemistry
Lignin molecular property discovery could help turn trees into affordable, greener industrial chemicals
Plants & Animals
American lobster population and habitat preferences shifting, study finds
Analytical Chemistry
New strategy unlocks magnetic switching with hydrogen bonding at molecular level
Plants & Animals
Butterfly brains reveal the tweaks required for cognitive innovation
Earth Sciences
Scientists identify potential deep-ocean greenhouse gas storage solution
Analytical Chemistry
Leveraging skyscraper architecture: New design enhances porosity and structural stability for metal-organic frameworks
Cell & Microbiology
Scientists show how sperm and egg come together like a key in a lock

How blockchain could prevent future data breaches

Just before the new year, approximately 15 million Canadians —about 40 percent of the entire population of Canada —learned that their sensitive personal data, collected by one of Canada's major lab diagnostic and testing ...

US military claimed 'success' in hacking ISIS: documents

The US military claims to have "successfully" disrupted the online propaganda efforts of the Islamic State in a hacking operation dating back at least to 2016, according to declassified national security documents released ...

Cybercrime: Internet erodes teenage impulse controls

Many Australian teenagers are struggling to control their impulses on the internet, in a scramble for quick thrills and a sense of power online. This potentially increases their risks of becoming cybercriminals.

Securing radiological sources on the go

Radioactive materials are a critical tool in a number of industrial applications particularly oil and gas drilling and welding. While these sources are safe and well-regulated for their intended use; if lost or stolen the ...

Homomorphic encryption for cloud users

A new approach to encryption could improve user perception of cloud computing services where the users are concerned about private or personal data being exposed to third parties. Writing in the International Journal of Cloud ...

UK police use of facial recognition tests public's tolerance

When British police used facial recognition cameras to monitor crowds arriving for a soccer match in Wales, some fans protested by covering their faces. In a sign of the technology's divisiveness, even the head of a neighboring ...