Last update:

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher
Business
French police have arrested the founder of Telegram—what happens next could change the course of big tech
Security
Future cybersecurity incidents are almost a certainty, asserts US policy arm of global computing society
Security
Gift card scams generate billions for fraudsters and industry—how one 83-year-old fell into the 'fear bubble'
Computer Sciences
Researchers propose a smaller, more noise-tolerant quantum factoring circuit for cryptography

Other news

Environment
Study finds dust from Southern Africa causes bloom of marine phytoplankton off southeast Madagascar coast
Biochemistry
Study shows spider silk bioproduction presents opportunities and challenges
Bio & Medicine
Light-based microcapillary monitoring sparks innovation in manufacturing and biotechnology
Biotechnology
Structure of a eukaryotic CRISPR-Cas homolog, Fanzor2, shows promise for gene editing
Evolution
New study sheds light on ancient protoribosome and its role in early life evolution
Cell & Microbiology
Scientists take a major step in understanding how to stop the transmission of malaria
Quantum Physics
Proof-of-concept design shrinks quantum rotation sensor to micron scale
Planetary Sciences
Webb telescope detects traces of carbon dioxide on the surface of Pluto's largest moon
General Physics
Using antimatter to detect nuclear radiation: Byproducts of fission reactors provide insight into nuclear reactor use
Planetary Sciences
Scientists discover planet orbiting closest single star to our sun
Quantum Physics
First-ever teleportation of logical qubit using fault-tolerant methods
Earth Sciences
Tongan volcanic eruption triggered by explosion equivalent to 'five underground nuclear bombs,' new research reveals
Plants & Animals
Syrian hamsters reveal genetic secret to hibernation
Bio & Medicine
Novel DNA nanopores can open and close on demand for controlled drug delivery
Bio & Medicine
Siloxane-enhanced nanoparticles unlock precise organ targeting for mRNA therapy
General Physics
A modular neutrino detector years in the making
Analytical Chemistry
Building better solar cells: Assembly of 2D molecular structures with triptycene scaffold
Molecular & Computational biology
3D structure of key protein could advance development of hormone-free male contraceptive pill
Ecology
Bacterial contamination and microplastics threaten Colombia's largest and most productive coastal lagoon
Optics & Photonics
Researchers harness liquid crystal structures to design simple, yet versatile bifocal lenses

Field campaign assesses vulnerabilities of 5G networks

Fifth-generation, or 5G, mobile network technology is all the hype these days. Compared to 4G, this newest way of connecting wireless devices to cellular networks is designed to provide higher data rates, ultralow latency, ...

China drafts rules for using facial recognition data

Firms using facial recognition in China will be required to obtain consent or legal permission before collecting personal information, draft regulations released Tuesday said, while stipulating the rules would not apply to ...

Smart devices: Putting a premium on peace of mind

Two out of five homes worldwide have at least one smart device that is vulnerable to cyber-attacks. Soon, that new smart TV or robot vacuum you've been considering for your home will come with a label that helps you gauge ...

Community-based app for managing mobile privacy and security

Mamtaj Akter, a Vanderbilt computer science graduate student in the lab of Pamela Wisniewski, Flowers Family Fellow in Engineering and associate professor of computer science, has co-authored a study evaluating how technology ...