Last update:

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Korean researchers develop AI CCTVs to detect, predict criminal activities
Computer Sciences
Hybrid optimization algorithm helps detect hidden messages in digital images
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher
Business
French police have arrested the founder of Telegram—what happens next could change the course of big tech
Security
Future cybersecurity incidents are almost a certainty, asserts US policy arm of global computing society

Other news

Cell & Microbiology
Scientists find plant-like behavior in human cells
Environment
Africa's famous Serengeti and Maasai Mara are being hit by climate change—a major threat to wildlife and tourism
Plants & Animals
Study sheds light on limitations of zooplankton for inactivating pathogen contaminated water
Earth Sciences
Miami-Dade study questions reliability of land surface temperature for heat risk assessment
Optics & Photonics
Logic with light: Introducing diffraction casting, optical-based parallel computing
Environment
Wastewater bacteria can break down plastic for food, yielding new possibilities for cleaning up plastic waste
Bio & Medicine
Scientists design silver nanoparticle–based self-hygienic resin for use in dental applications
Plants & Animals
Study reveals oyster reefs once thrived along Europe's coasts—now they're gone
Earth Sciences
Decades-long research reveals new understanding of how climate change may impact caches of Arctic soil carbon
Earth Sciences
Geological surveys shed light on the formation mystery of Uruguay's amethyst geodes
Other
Will AI one day win a Nobel Prize?
Social Sciences
Scientists unlock secret of 'Girl With Pearl Earring'
Earth Sciences
Closer look at New Jersey earthquake rupture could explain shaking reports
Space Exploration
New triple star system sets shortest orbital period record
Social Sciences
How do 'double skeptics' affect government policy on climate and vaccination?
Planetary Sciences
NASA powers down Voyager 2 plasma instrument to extend mission
Social Sciences
AI-generated college admissions essays tend to sound male and privileged, study finds
Plants & Animals
As temperatures rise, researchers identify mechanisms behind plant response to warming
Optics & Photonics
Quantum research paves the way toward efficient, ultra-high-density optical memory storage
Biotechnology
Filament structure found to activate and regulate CRISPR-Cas 'protein scissors'

How concerned should you be about AirTags?

I didn't even know what an AirTag was until I attended a cybersecurity talk by Nick Tripp, senior manager of Duke's IT Security Office, but according to Tripp, AirTag technology is "something that the entire Duke community ...

Hive ransomware: modern, efficient business model

The US Justice Department's shutdown Thursday of the Hive ransomware operation—which extorted some $100 million from more than 1,500 victims worldwide—highlights how hacking has become an ultra-efficient, specialized ...

US infiltrates big ransomware gang: 'We hacked the hackers'

The FBI and international partners have at least temporarily disrupted the network of a prolific ransomware gang they infiltrated last year, saving victims including hospitals and school districts a potential $130 million ...

A three-stage authentication system for the metaverse

In recent years, many computer scientists have been exploring the notion of metaverse, an online space in which users can access different virtual environments and immersive experiences, using VR and AR headsets. While navigating ...