Last update:

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Korean researchers develop AI CCTVs to detect, predict criminal activities
Computer Sciences
Hybrid optimization algorithm helps detect hidden messages in digital images
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher
Business
French police have arrested the founder of Telegram—what happens next could change the course of big tech
Security
Future cybersecurity incidents are almost a certainty, asserts US policy arm of global computing society

Other news

Earth Sciences
Closer look at New Jersey earthquake rupture could explain shaking reports
Social Sciences
Scientists unlock secret of 'Girl With Pearl Earring'
Space Exploration
New triple star system sets shortest orbital period record
Molecular & Computational biology
First map of every neuron in an adult brain has been produced for a fruit fly
Planetary Sciences
Surprising amount and variety of gamma radiation is produced in large tropical thunderstorms, observations reveal
Planetary Sciences
New super-Neptune exoplanet discovered
Social Sciences
AI-generated college admissions essays tend to sound male and privileged, study finds
Plants & Animals
As temperatures rise, researchers identify mechanisms behind plant response to warming
Planetary Sciences
NASA powers down Voyager 2 plasma instrument to extend mission
Biotechnology
Filament structure found to activate and regulate CRISPR-Cas 'protein scissors'
Optics & Photonics
Quantum research paves the way toward efficient, ultra-high-density optical memory storage
Analytical Chemistry
Chemist challenges traditional views on crystal growth
Condensed Matter
New materials and techniques show promise for microelectronics and quantum technologies
Social Sciences
Loyalty influences support for indirect ties in moral dilemmas, study finds
Social Sciences
Climate shocks associated with higher rates of intimate partner violence against women
Nanophysics
Researchers create orientation-independent magnetic field-sensing nanotube spin qubits
Ecology
Monkey fossils found in cave shed light on the animals' extinction centuries ago
Nanomaterials
Beyond 'one pore at a time': New method of generating multiple, tunable nanopores
Social Sciences
How do 'double skeptics' affect government policy on climate and vaccination?
Earth Sciences
Iron nuggets in the Pinnacles unlock secrets of ancient and future climates

Breakthrough enables perfectly secure digital communications

A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.

Zero trust in 'zero trust'

In May 2021, the President of the United States issued an executive order, initiating a government-wide effort to sure up its cybersecurity practices. The mandate tasked agencies with implementing zero-trust architectures ...

EPA mandates states report on cyber threats to water systems

The Biden administration on Friday said it would require states to report on cybersecurity threats in their audits of public water systems, a day after it released a broader plan to protect critical infrastructure against ...

BetterHelp shared users' sensitive health data, FTC says

The online counseling service BetterHelp has agreed to return $7.8 million to customers to settle with the Federal Trade Commission for sharing health data it had promised to keep private—including information about mental ...

Security vulnerabilities detected in drones made by DJI

Researchers from Bochum and Saarbrücken have detected security vulnerabilities, some of them serious, in several drones made by the manufacturer DJI. These enable users, for example, to change a drone's serial number or ...