Last update:

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Korean researchers develop AI CCTVs to detect, predict criminal activities
Computer Sciences
Hybrid optimization algorithm helps detect hidden messages in digital images
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher
Business
French police have arrested the founder of Telegram—what happens next could change the course of big tech
Security
Future cybersecurity incidents are almost a certainty, asserts US policy arm of global computing society

Other news

Earth Sciences
Closer look at New Jersey earthquake rupture could explain shaking reports
Plants & Animals
As temperatures rise, researchers identify mechanisms behind plant response to warming
Biotechnology
Filament structure found to activate and regulate CRISPR-Cas 'protein scissors'
Social Sciences
AI-generated college admissions essays tend to sound male and privileged, study finds
Social Sciences
Scientists unlock secret of 'Girl With Pearl Earring'
Optics & Photonics
Quantum research paves the way toward efficient, ultra-high-density optical memory storage
Social Sciences
Loyalty influences support for indirect ties in moral dilemmas, study finds
Condensed Matter
New materials and techniques show promise for microelectronics and quantum technologies
Analytical Chemistry
Chemist challenges traditional views on crystal growth
Planetary Sciences
NASA powers down Voyager 2 plasma instrument to extend mission
Space Exploration
New triple star system sets shortest orbital period record
Planetary Sciences
New super-Neptune exoplanet discovered
Nanophysics
Researchers create orientation-independent magnetic field-sensing nanotube spin qubits
Nanomaterials
Beyond 'one pore at a time': New method of generating multiple, tunable nanopores
Ecology
Monkey fossils found in cave shed light on the animals' extinction centuries ago
Plants & Animals
Preserving nature's genetic resources: Wild banana relatives of mainland Southeast Asia reveal hidden diversity
Mathematics
How higher-order interactions can remodel the landscape of complex systems
Social Sciences
How do 'double skeptics' affect government policy on climate and vaccination?
Earth Sciences
Iron nuggets in the Pinnacles unlock secrets of ancient and future climates
Social Sciences
Climate shocks associated with higher rates of intimate partner violence against women

Making the Internet of Things more secure

With wearable fitness trackers, car key fobs and smart home devices, the Internet of Things (IoT) has become ubiquitous in our lives. Unfortunately, much of this flow of information is vulnerable to malicious activity and ...

Report: Chinese state-sponsored hacking group highly active

A Chinese hacking group that is likely state-sponsored and has been linked previously to attacks on U.S. state government computers is still "highly active" and is focusing on a broad range of targets that may be of strategic ...

US to adopt new restrictions on using commercial spyware

The U.S. government will restrict its use of commercial spyware tools that have been used to surveil human rights activists, journalists and dissidents around the world, under an executive order issued Monday by President ...