Last update:

New tool can detect malware on Android phones

Screen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.

For AI, secrecy often does not improve security

Concern about misuse of artificial intelligence has led political leaders to consider regulating the emerging technology in ways that could limit access to AI models' inner workings. But researchers at a group of leading ...

More news

Security
Influential resource on international cyber law updated for 2024
Security
Each year, landmines kill residents of war-torn countries. This innovative tool could save lives
Security
US seizes internet domains allegedly used by Russian hackers
Internet
Researchers develop innovative approaches to tackle false information on multiple fronts
Security
Police arrest Australian 'distributor' of Ghost crime app
Business
Tech industry urges G7 to unify cloud security standards
Business
California enacts law to protect brain data
Security
Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations
Security
AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?
Consumer & Gadgets
Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked
Security
AI model beats CAPTCHA every time
Consumer & Gadgets
Meta's AI-powered smart glasses raise concerns about privacy and user data
Security
How did they get my data? I uncovered the hidden web of networks behind telemarketers
Business
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat
Security
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack
Hardware
How a national lab retires—and shreds—large computing resources
Security
Encrypted 'Ghost' app: What we know
Security
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Internet
Study finds that thousands of browser extensions compromise user data
Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?

Other news

Optics & Photonics
All-optical switch device paves way for faster fiber-optic communication
Other
Saturday Citations: Brown dwarf actually brown dwarfs; the adaptability of ice-age humans; archaeologists excited
Plants & Animals
Worms and snails handle the pressure 2,500m below the Pacific surface
Political science
Megastudy tests crowdsourced ideas for reducing political polarization
Earth Sciences
Could injecting diamond dust into the atmosphere help cool the planet?
Astronomy
First results from the Axion Dark-Matter Birefringent Cavity experiment establish a new technique for axion search
Plants & Animals
Bumblebee queens choose to hibernate in pesticide-contaminated soil, scientists discover
Environment
Global study reveals people, including those most affected by climate change, do not understand climate justice
Astronomy
Physicists show that neutron stars may be shrouded in clouds of axions
Nanomaterials
New fabrication strategy enhances graphene aerogel sensitivity and durability for human-machine interfaces
Biochemistry
Team develops promising new form of antibiotic that makes bacterial cells self-destruct
Nanophysics
Controlling sound waves with Klein tunneling improves acoustic signal filtration
Cell & Microbiology
Cellular senescence research identifies key enzyme to promote healthy aging
Biochemistry
Lignin molecular property discovery could help turn trees into affordable, greener industrial chemicals
Plants & Animals
American lobster population and habitat preferences shifting, study finds
Analytical Chemistry
New strategy unlocks magnetic switching with hydrogen bonding at molecular level
Earth Sciences
Scientists identify potential deep-ocean greenhouse gas storage solution
Plants & Animals
Butterfly brains reveal the tweaks required for cognitive innovation
Cell & Microbiology
Scientists show how sperm and egg come together like a key in a lock
Analytical Chemistry
Leveraging skyscraper architecture: New design enhances porosity and structural stability for metal-organic frameworks

Blockchain to trace agricultural supply chains

The impacts of unsustainable agriculture on the environment can be devastating. With increasing pressure from consumers for sustainably sourced products, companies need to act to minimise their impacts. But how can a company ...

Explainer: Not all cyber threats equally worrisome

West Virginia reported unusual cyber activity targeting its election systems. The Texas governor said the state was encountering attempted "attacks" at the rate of "about 10,000 per minute" from Iran. Information technology ...

Data ownership is a recipe for better living in the city

Today, both public enterprises and private companies in the major cities collect large quantities of data about the citizens living in those cities, and most people derive little benefit from this. However, if the citizens ...

Report: Ransomware takes down online currency exchange

A week after a malicious virus infected its network, the London-based foreign currency exchange company Travelex had yet to restore digital sales and was reported infected with ransomware by hackers threatening to release ...

China facial-recognition case puts Big Brother on trial

Facial-recognition technology has become embedded in China, from airports to hotels, e-commerce sites and even public toilets, but a law professor had enough when asked to scan his face at a safari park.

Get ready for a bumpy ride: Cybersecurity trends in 2020

What will 2020 have in store for cybersecurity? Tighter regulation, increasingly sophisticated attacks on key infrastructure and AI-driven cyber warfare, according to Dr. Suranga Seneviratne from the School of Computer Science.

CES Gadget Show: Surveillance is in—and in a big way

From the face scanner that will check in some attendees to the cameras-everywhere array of digital products, the CES gadget show is all-in on surveillance technology—whether it calls it that or not.