Last update:

New tool can detect malware on Android phones

Screen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.

For AI, secrecy often does not improve security

Concern about misuse of artificial intelligence has led political leaders to consider regulating the emerging technology in ways that could limit access to AI models' inner workings. But researchers at a group of leading ...

More news

Security
Influential resource on international cyber law updated for 2024
Security
Each year, landmines kill residents of war-torn countries. This innovative tool could save lives
Security
US seizes internet domains allegedly used by Russian hackers
Internet
Researchers develop innovative approaches to tackle false information on multiple fronts
Security
Police arrest Australian 'distributor' of Ghost crime app
Business
Tech industry urges G7 to unify cloud security standards
Business
California enacts law to protect brain data
Security
Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations
Security
AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?
Consumer & Gadgets
Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked
Security
AI model beats CAPTCHA every time
Consumer & Gadgets
Meta's AI-powered smart glasses raise concerns about privacy and user data
Security
How did they get my data? I uncovered the hidden web of networks behind telemarketers
Business
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat
Security
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack
Hardware
How a national lab retires—and shreds—large computing resources
Security
Encrypted 'Ghost' app: What we know
Security
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Internet
Study finds that thousands of browser extensions compromise user data
Security
Global powers are grappling with 'responsible' use of military AI. What would that look like?

Other news

Archaeology
Archaeologist reveals factors affecting ocher application in ancient burials at Khok Phanom Di
Paleontology & Fossils
Smallest dinosaur egg ever found confirmed in China
Planetary Sciences
'Time capsule' lunar samples link the moon's past and present
Environment
Study shows wind patterns key in causing coral bleaching on Great Barrier Reef
Earth Sciences
Scientists update eruption history of Oregon's South Sister volcano
Biochemistry
Chemical trick activates antibiotic directly at the pathogen
Plants & Animals
Turtle genome provides new clues on the evolution of vertebrates
Astronomy
Astronomers explore the properties of an obscured hyperluminous quasar
Cell & Microbiology
Deciphering the language of cells: How they sense and respond to mechanical forces
Archaeology
Integrated space-ground technologies empower archaeological research into ancient tombs
Plants & Animals
Male stalk-eyed flies with short eyestalks are less attractive to females but fight more fiercely, scientists discover
General Physics
Investigating the impact of ultralight dark matter on gravitational wave signals
Plants & Animals
Scientists find southern killer whales of the Pacific have access to enough food, deepening mystery of their struggles
Political science
Megastudy tests crowdsourced ideas for reducing political polarization
Other
Saturday Citations: Brown dwarf actually brown dwarfs; the adaptability of ice-age humans; archaeologists excited
Optics & Photonics
All-optical switch device paves way for faster fiber-optic communication
Plants & Animals
Worms and snails handle the pressure 2,500m below the Pacific surface
Earth Sciences
Could injecting diamond dust into the atmosphere help cool the planet?
Astronomy
Physicists show that neutron stars may be shrouded in clouds of axions
Astronomy
First results from the Axion Dark-Matter Birefringent Cavity experiment establish a new technique for axion search

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

New tool determines threats to networked 3-D printers

In the rising era of industrial Internet of Things (IoT) devices, factories are being upgraded. Devices, such as networked 3-D printers, can now interact with other machines and be controlled remotely to improve efficiency. ...

Microsoft and partners toughen firmware defense

For many people who are not tech professionals, the word "firmware" first appears to them in the negative. News items over the past years have used the word over and over again to report attacks. What is firmware? If software ...

Man sentenced for hacking LA court system

A man who hacked Los Angeles County court computers, sent 2 million malicious phishing emails and stole hundreds of credit card numbers has been sentenced in Los Angeles.