Last update:

New tool can detect malware on Android phones

Screen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.

For AI, secrecy often does not improve security

Concern about misuse of artificial intelligence has led political leaders to consider regulating the emerging technology in ways that could limit access to AI models' inner workings. But researchers at a group of leading ...

More news

Security
Influential resource on international cyber law updated for 2024
Security
Each year, landmines kill residents of war-torn countries. This innovative tool could save lives
Security
US seizes internet domains allegedly used by Russian hackers
Internet
Researchers develop innovative approaches to tackle false information on multiple fronts
Security
Police arrest Australian 'distributor' of Ghost crime app
Business
Tech industry urges G7 to unify cloud security standards
Business
California enacts law to protect brain data
Security
Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations
Security
AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?
Consumer & Gadgets
Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked
Security
AI model beats CAPTCHA every time
Consumer & Gadgets
Meta's AI-powered smart glasses raise concerns about privacy and user data
Security
How did they get my data? I uncovered the hidden web of networks behind telemarketers
Business
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat
Security
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack
Hardware
How a national lab retires—and shreds—large computing resources
Security
Encrypted 'Ghost' app: What we know
Security
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Internet
Study finds that thousands of browser extensions compromise user data
Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?

Other news

General Physics
Investigating the impact of ultralight dark matter on gravitational wave signals
Plants & Animals
Scientists find southern killer whales of the Pacific have access to enough food, deepening mystery of their struggles
Political science
Megastudy tests crowdsourced ideas for reducing political polarization
Other
Saturday Citations: Brown dwarf actually brown dwarfs; the adaptability of ice-age humans; archaeologists excited
Optics & Photonics
All-optical switch device paves way for faster fiber-optic communication
Plants & Animals
Worms and snails handle the pressure 2,500m below the Pacific surface
Earth Sciences
Could injecting diamond dust into the atmosphere help cool the planet?
Astronomy
Physicists show that neutron stars may be shrouded in clouds of axions
Astronomy
First results from the Axion Dark-Matter Birefringent Cavity experiment establish a new technique for axion search
Environment
Global study reveals people, including those most affected by climate change, do not understand climate justice
Plants & Animals
Bumblebee queens choose to hibernate in pesticide-contaminated soil, scientists discover
Nanomaterials
New fabrication strategy enhances graphene aerogel sensitivity and durability for human-machine interfaces
Biochemistry
Team develops promising new form of antibiotic that makes bacterial cells self-destruct
Nanophysics
Controlling sound waves with Klein tunneling improves acoustic signal filtration
Biochemistry
Lignin molecular property discovery could help turn trees into affordable, greener industrial chemicals
Cell & Microbiology
Cellular senescence research identifies key enzyme to promote healthy aging
Plants & Animals
American lobster population and habitat preferences shifting, study finds
Cell & Microbiology
Scientists show how sperm and egg come together like a key in a lock
Earth Sciences
Scientists identify potential deep-ocean greenhouse gas storage solution
Analytical Chemistry
New strategy unlocks magnetic switching with hydrogen bonding at molecular level

Can anyone be completely anonymous?

Research published in the International Journal of Electronic Governance has investigated whether any of five "anonymous" social media applications are secure in that they do not allow a third party to see personal data or ...

How smartphones can verify your identity

Anyone who wants to open a bank account or buy a mobile phone plan has to identify themselves to the respective service provider. The ETH spin-off PXL Vision has a simpler solution: just use an ID scan and a selfie video. ...