Last update:
Security news
Tech industry urges G7 to unify cloud security standards
A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...
Business
2 hours ago
0
1
California enacts law to protect brain data
A new California law extends consumer privacy protection to brainwave data gathered by implants or wearable devices.
Business
2 hours ago
0
1
Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations
U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.
Security
Sep 26, 2024
0
1
Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked
The recent attacks on walkie-talkies and pagers in Lebanon have highlighted the hidden vulnerabilities in everyday technology. These incidents underscore the need for individuals to understand the potential risks associated ...
Consumer & Gadgets
Sep 25, 2024
1
1
AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?
It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.
Security
Sep 25, 2024
0
2
Meta's AI-powered smart glasses raise concerns about privacy and user data
Ray-Ban Meta smart glasses are just one of many wearable tech devices on the market. The glasses, which first launched in 2021, are a collaboration between Meta and Italian-French eyewear company EssilorLuxottica, which owns ...
Consumer & Gadgets
Sep 24, 2024
0
29
AI model beats CAPTCHA every time
A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.
How did they get my data? I uncovered the hidden web of networks behind telemarketers
Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...
Security
Sep 23, 2024
0
1
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat
Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...
Business
Sep 20, 2024
0
1
How a national lab retires—and shreds—large computing resources
Ever wonder what happens to massive supercomputing systems when they're retired? Surprisingly, when it comes to the data, it's not too different from disposing of old documents—they go straight into a shredder and sent ...
Hardware
Sep 19, 2024
1
1
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack
Hackers are demanding $6 million in bitcoin from the operator of the Seattle-Tacoma International Airport for documents they stole during a cyberattack last month and posted on the dark web this week, an airport official ...
Security
Sep 19, 2024
0
1
Encrypted 'Ghost' app: What we know
Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.
Security
Sep 18, 2024
0
12
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Australian police said Wednesday they have infiltrated Ghost, an encrypted global communications app developed for criminals, leading to dozens of arrests.
Security
Sep 18, 2024
0
20
Study finds that thousands of browser extensions compromise user data
Browser extensions, the software add-ons that help users customize and enhance their web browsers, are wildly popular. Some of the most-used extensions find shopping deals, fix grammar and typos, manage passwords, or translate ...
Internet
Sep 17, 2024
0
12
'Good complexity' can make hospital networks more cybersecure
In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...
Security
Sep 17, 2024
0
19
Seeking help for crypto wallet problems on social media can attract scammers
The increasing popularity of cryptocurrencies has turned social media into a central place where users look for help when they have problems with their crypto wallet or private key. Scammers take advantage of this situation ...
Business
Sep 17, 2024
0
13
Global powers are grappling with 'responsible' use of military AI. What would that look like?
Last week, some 2,000 government officials and experts from around the world met for the REAIM (Responsible Artificial Intelligence in the Military Domain) summit in Seoul, South Korea. This was the second event of its kind, ...
Security
Sep 17, 2024
0
22
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronics
A flexible screen inspired in part by squid can store and display encrypted images like a computer—using magnetic fields rather than electronics. The research is reported in Advanced Materials by University of Michigan ...
Hi Tech & Innovation
Sep 16, 2024
0
8
Hybrid optimization algorithm helps detect hidden messages in digital images
Research in the International Journal of Computational Science and Engineering describes a new approach to spotting messages hidden in digital images. The work contributes to the field of steganalysis, which plays a key role ...
Computer Sciences
Sep 12, 2024
0
0
Korean researchers develop AI CCTVs to detect, predict criminal activities
A Korean research team has succeeded in developing a technology that can detect and predict signs of criminal activities utilizing real-time CCTVs and AI technology. With this new technology, CCTV is now evolving beyond its ...
Security
Sep 12, 2024
0
10