Last update:

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

More news

Hi Tech & Innovation
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronics
Security
New tools use AI 'fingerprints' to detect altered photos, videos
Security
Korean researchers develop AI CCTVs to detect, predict criminal activities
Computer Sciences
Hybrid optimization algorithm helps detect hidden messages in digital images
Security
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
Software
Usable data hacked from air-gapped computer
Consumer & Gadgets
Most Australian teens have a phone—but many are not keeping their identity and location secure
Security
Researchers probe safety of AI in driverless cars, find vulnerabilities
Security
Five notorious cyberattacks that targeted governments
Security
What are 'click frauds'—and how can we stop them?
Business
Professor highlights challenges in adopting blockchain for asset-backed securities
Security
Large language models can help detect social media bots—but can also make the problem worse
Security
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
Security
Will congestion charging come with a privacy toll?
Security
Rural hospitals may be more vulnerable to ransomware attacks
Software
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Consumer & Gadgets
How smart toys may be spying on kids: What parents need to know
Internet
Boosting online safety through behavioral nudges: Delay, remind, and secure
Security
Space militarization could pose a challenge to global security, argues researcher
Business
French police have arrested the founder of Telegram—what happens next could change the course of big tech

Other news

Planetary Sciences
X-rays advance understanding of Earth's core-mantle boundary and super-Earth magma oceans
Space Exploration
NASA's laser comms demo makes deep space record, completes first phase
Planetary Sciences
A new era of solar observation: International team produces global maps of coronal magnetic field
Evolution
Genetic database shows some fungal crops became completely reliant on ants 27 million years ago
Evolution
The true global impact of species-loss caused by humans is far greater than expected, study reveals
Social Sciences
People infer the past better than the future, study finds
Space Exploration
Mercury's magnetic landscape mapped in 30 minutes
Earth Sciences
Five-mile asteroid impact crater below Atlantic captured in 'exquisite' detail by seismic data
Planetary Sciences
Lunar mission data analysis finds widespread evidence of ice deposits
Quantum Physics
Physicists achieve strong coupling of Andreev qubits via microwave resonator
Ecology
Unique IDs for individual (digital) specimens from natural history museums streamline and future-proof science
Astrobiology
2-billion-year-old rock could help understand very early life on Earth and the hunt for evidence of life on Mars
Optics & Photonics
Logic with light: Introducing diffraction casting, optical-based parallel computing
Environment
Wastewater bacteria can break down plastic for food, yielding new possibilities for cleaning up plastic waste
Optics & Photonics
Engineers create a chip-based tractor beam for biological particles
Quantum Physics
Quantum researchers come up with a recipe that could accelerate drug development
Paleontology & Fossils
Scientists offer a detailed look at the skeleton of an ancient predator that thrived in extreme conditions
Plants & Animals
Study sheds light on limitations of zooplankton for inactivating pathogen contaminated water
Earth Sciences
Mathematicians and climate researchers build new models for understanding polar sea ice
Evolution
Ancient protein structure may have enabled early molecular evolution and diversification

Fear can inspire remote workers to protect IT resources

Fear of what could go wrong is the greatest motivator when it comes to getting remote workers to protect their employer's information technology security, according to a recent study in Computers & Security. But it tends ...

Cyberattack keeps Iowa's largest school district closed

An apparent cyberattack on Iowa's largest school district has led officials to cancel classes for 30,000 students for a second day as technicians scramble to protect data and restore the computer system, the district's leader ...

Researchers work to avoid future FTX debacles

The Center for Research toward Advancing Financial Technologies (CRAFT), a collaboration between Rensselaer Polytechnic Institute and Stevens Institute of Technology, is dedicated to advancing blockchain technology so that ...

Twitter leak exposes 235 million email addresses from hack

Personal emails linked to 235 million Twitter accounts hacked some time ago have been exposed according to Israeli security researcher Alon Gal—making millions vulnerable to having their accounts compromised or identities ...

Identifying a vulnerability in critical spacecraft networks

When NASA docks two spacecraft in orbit, timing is critical. Their movements must be precisely synchronized with each other to prevent catastrophic failure, which means the computer networks that control their thrusters must ...