<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
                    <title>Security News - Software vulnerabilities, data leaks, malware, viruses</title>
            <link>https://techxplore.com/rss-feed/security-news/</link>
            <language>en-us</language>
            <description>The latest news on cyber security, network security, software vulnerabilities, data leaks, malware, and viruses</description>

                            <item>
                    <title>Deepfakes, job losses, opaque models: Exploring the dark side of AI</title>
                    <description>Artificial intelligence (AI) has become one of the defining technologies of what economists and policymakers describe as the Fourth Industrial Revolution. This is an era in which digital, physical, and biological systems are increasingly intertwined. In practical terms, AI refers to computer systems capable of performing tasks that typically require human intelligence, such as recognizing patterns, learning from data, making predictions, and assisting in complex decisions.</description>
                    <link>https://techxplore.com/news/2026-03-deepfakes-job-losses-opaque-exploring.html</link>
                    <category>Security</category>                    <pubDate>Wed, 04 Mar 2026 16:00:08 EST</pubDate>
                    <guid isPermaLink="false">news691861801</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/intelligence.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>How AI could end online anonymity</title>
                    <description>The internet is rife with anonymous accounts as users adopt pseudonyms, sometimes for genuine reasons like speaking freely, and other times for nefarious ones. But this era of online privacy could be coming to a close. In a study available on the arXiv preprint server, researchers demonstrate that large language models (LLMs) can identify the people behind these accounts at scale.</description>
                    <link>https://techxplore.com/news/2026-03-ai-online-anonymity.html</link>
                    <category>Security</category>                    <pubDate>Wed, 04 Mar 2026 12:40:04 EST</pubDate>
                    <guid isPermaLink="false">news691850205</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-could-end-online-an.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Deepfake songs are exploding, but a new tool shuts them down</title>
                    <description>Artificial intelligence models can now clone a voice with just a few seconds of audio, fueling a surge of deepfake songs online and creating a growing crisis for musicians who don&#039;t want their voices hijacked. Beyond the obvious intellectual property rights issue, this can lead to lost revenue and take an emotional toll on artists who put their heart and soul into their songs. But researchers now have a solution.</description>
                    <link>https://techxplore.com/news/2026-03-deepfake-songs-tool.html</link>
                    <category>Security</category>                    <pubDate>Tue, 03 Mar 2026 17:20:10 EST</pubDate>
                    <guid isPermaLink="false">news691780081</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/bad-bunny.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>From Anthropic to Iran: Who sets the limits on AI&#039;s use in war and surveillance?</title>
                    <description>Anthropic, a leading AI company, recently refused to sign a Pentagon contract that would allow the United States military &quot;unrestricted access&quot; to its technology for &quot;all lawful purposes.&quot; To sign, Anthropic CEO Dario Amodei required two clear exceptions: no mass surveillance of Americans and no fully autonomous weapons without human oversight.</description>
                    <link>https://techxplore.com/news/2026-03-anthropic-iran-limits-ai-war.html</link>
                    <category>Security</category>                    <pubDate>Tue, 03 Mar 2026 16:00:09 EST</pubDate>
                    <guid isPermaLink="false">news691775462</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2018/1-war.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>New ensemble AI model enhances cyber intrusion detection with high accuracy</title>
                    <description>A study published in The Journal of Engineering Research at Sultan Qaboos University presents an advanced intrusion detection system (IDS) designed to improve the accuracy and efficiency of identifying cyberattacks. The proposed model combines a double feature selection technique with a stacked ensemble machine learning approach to enhance detection performance while reducing computational complexity.</description>
                    <link>https://techxplore.com/news/2026-03-ensemble-ai-cyber-intrusion-high.html</link>
                    <category>Security</category>                    <pubDate>Tue, 03 Mar 2026 12:10:01 EST</pubDate>
                    <guid isPermaLink="false">news691759300</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/new-ensemble-ai-model.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI education could be crucial in tackling rising voice scams</title>
                    <description>A new study from Abertay University reveals that the most effective way to protect people from AI voice scams is not through traditional warning messages, but by educating them about how advanced and authentic AI voices have become. Published in the Journal of Cybersecurity, the study provides one of the first psychological countermeasures against AI voices, offering a proactive approach to fraud prevention.</description>
                    <link>https://techxplore.com/news/2026-03-ai-crucial-tackling-voice-scams.html</link>
                    <category>Security</category>                    <pubDate>Mon, 02 Mar 2026 15:20:03 EST</pubDate>
                    <guid isPermaLink="false">news691684502</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-education-could-be.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Biometric IDs are being rolled out in Africa. Study reveals the risks and pitfalls</title>
                    <description>Across Africa, governments are introducing digital systems that use individuals&#039; unique physical measurements to identify them. These systems collect citizens&#039; biometric and personal data and use it to give people access to essential public services like voting, health care, education and social protection. Biometric digital identification systems are often promoted as tools to improve efficiency, inclusion and service delivery.</description>
                    <link>https://techxplore.com/news/2026-03-biometric-ids-africa-reveals-pitfalls.html</link>
                    <category>Security</category>                    <pubDate>Mon, 02 Mar 2026 13:20:06 EST</pubDate>
                    <guid isPermaLink="false">news691679461</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2015/africa.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI often escalates to nuclear action in war games</title>
                    <description>There are some things perhaps we might not want artificial intelligence to handle, at least for the time being. When leading chatbots were put through war-game simulations, they opted for nuclear signaling or escalation in 95% of cases.</description>
                    <link>https://techxplore.com/news/2026-03-ai-escalates-nuclear-action-war.html</link>
                    <category>Security</category>                    <pubDate>Mon, 02 Mar 2026 13:20:03 EST</pubDate>
                    <guid isPermaLink="false">news691678634</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-chat-2.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Safe AI isn&#039;t enough: Fairness, honesty and transparency are needed to benefit humanity, argues researcher</title>
                    <description>Artificial intelligence (AI) loves to cheat. When matched against a chess bot, an OpenAI model preferred hacking into its opponent&#039;s system to winning the game fairly, according to a recent study. While chess doesn&#039;t have moral stakes, more serious ethical issues could arise in everything from medicine to self-driving cars as AI becomes even more pervasive. So, what does it mean for AI to be safe?</description>
                    <link>https://techxplore.com/news/2026-02-safe-ai-isnt-fairness-honesty.html</link>
                    <category>Security</category>                    <pubDate>Fri, 27 Feb 2026 07:00:01 EST</pubDate>
                    <guid isPermaLink="false">news691381502</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-safety.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Your car&#039;s tire sensors could be used to track you</title>
                    <description>Researchers at IMDEA Networks Institute, together with European partners, have found that tire pressure sensors in modern cars can unintentionally expose drivers to tracking. Over a ten-week study, they collected signals from more than 20,000 vehicles, revealing a hidden privacy risk and highlighting the need for stronger security measures in future vehicle sensor systems.</description>
                    <link>https://techxplore.com/news/2026-02-car-sensors-track.html</link>
                    <category>Security</category>                    <pubDate>Wed, 25 Feb 2026 17:00:05 EST</pubDate>
                    <guid isPermaLink="false">news691252054</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/your-cars-tire-sensors-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Researchers expose critical security vulnerability in autonomous drones</title>
                    <description>University of California, Irvine computer scientists have discovered a critical security vulnerability in autonomous target-tracking drones that could have far-reaching implications for public safety, border security and personal privacy. The UC Irvine team demonstrated how attackers could use an ordinary umbrella to manipulate drones, drawing the aircraft close enough to capture them or cause them to crash.</description>
                    <link>https://techxplore.com/news/2026-02-expose-critical-vulnerability-autonomous-drones.html</link>
                    <category>Robotics</category>                    <pubDate>Wed, 25 Feb 2026 13:20:06 EST</pubDate>
                    <guid isPermaLink="false">news691247442</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/researchers-expose-cri.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Ensuring smartphones have not been tampered with</title>
                    <description>With increasing cyberattacks and government data breaches, one of the most important devices to keep secure is the one in everyone&#039;s pocket: smartphones. The problem is that it is difficult to check that a smartphone has not been tampered with without the risk of unintentionally damaging the device itself.</description>
                    <link>https://techxplore.com/news/2026-02-smartphones-tampered.html</link>
                    <category>Consumer &amp; Gadgets</category>                    <pubDate>Tue, 24 Feb 2026 11:00:05 EST</pubDate>
                    <guid isPermaLink="false">news691052170</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ensuring-smartphones-h.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Jailbreaking the matrix: How researchers are bypassing AI guardrails to make them safer</title>
                    <description>A paper written by University of Florida Computer &amp; Information Science &amp; Engineering, or CISE, Professor Sumit Kumar Jha, Ph.D., contains so many science fiction terms, you&#039;d be forgiven for thinking it&#039;s a Hollywood script: Nullspace steering. Red teaming. Jailbreaking the matrix. But Jha&#039;s work is decidedly focused on real life, most notably strengthening the security measures built into AI tools to ensure they are safe for all to use.</description>
                    <link>https://techxplore.com/news/2026-02-jailbreaking-matrix-bypassing-ai-guardrails.html</link>
                    <category>Security</category>                    <pubDate>Sun, 22 Feb 2026 12:00:01 EST</pubDate>
                    <guid isPermaLink="false">news690803473</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/security-ai.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Age verification online can be done safely and privately. Here&#039;s how</title>
                    <description>Online chat service Discord has announced it will begin testing age verification for some users, joining a growing list of platforms trying to work out who is actually behind the screen.</description>
                    <link>https://techxplore.com/news/2026-02-age-verification-online-safely-privately.html</link>
                    <category>Internet</category>                    <pubDate>Sat, 21 Feb 2026 19:00:03 EST</pubDate>
                    <guid isPermaLink="false">news690725304</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/girl-on-phone-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI model edits can leak sensitive data via update &#039;fingerprints&#039;</title>
                    <description>Artificial intelligence (AI) systems are now widely used by millions of people worldwide, as tools to source information or tackle specific tasks more rapidly and efficiently. Today, some of the most used are large language models (LLMs), computational models trained on large collections of texts that can process and generate written content in various languages.</description>
                    <link>https://techxplore.com/news/2026-02-ai-leak-sensitive-fingerprints.html</link>
                    <category>Security</category>                    <pubDate>Sat, 21 Feb 2026 12:00:02 EST</pubDate>
                    <guid isPermaLink="false">news690725126</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/editing-ai-models-coul.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI &#039;blind spot&#039; could allow attackers to hijack self-driving vehicles</title>
                    <description>A newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads. Georgia Tech cybersecurity researchers discovered the vulnerability, dubbed VillainNet, and found it can remain dormant in a self-driving vehicle&#039;s AI system until triggered by specific conditions. Once triggered, VillainNet is almost certain to succeed, giving attackers control of the targeted vehicle.</description>
                    <link>https://techxplore.com/news/2026-02-ai-hijack-vehicles.html</link>
                    <category>Security</category>                    <pubDate>Fri, 20 Feb 2026 14:40:05 EST</pubDate>
                    <guid isPermaLink="false">news690809490</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/researchers-warn-ai-bl.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Mississippi hospital system closes all clinics after ransomware attack</title>
                    <description>A ransomware attack forced the University of Mississippi Medical Center to close all of its roughly three dozen clinics around the state and cancel elective procedures for a second day on Friday, hobbling one of Mississippi&#039;s largest healthcare providers.</description>
                    <link>https://techxplore.com/news/2026-02-mississippi-hospital-clinics-ransomware.html</link>
                    <category>Security</category>                    <pubDate>Fri, 20 Feb 2026 12:40:05 EST</pubDate>
                    <guid isPermaLink="false">news690812405</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/mississippi-hospital-s.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Cyber-attacks could disrupt smart factories by targeting time itself</title>
                    <description>A cyber-attack does not always need to steal data or shut systems down to cause damage. Sometimes it only needs to shift the clock. Researchers at the University of East London (UEL), in collaboration with industry, have identified a critical weakness in the timing systems that keep modern automated industries running—and warn attackers could exploit it to quietly destabilize factories, robotics and other safety‑critical infrastructure. The work is published as a comprehensive analysis of threats to Time‑Triggered Ethernet (TTEthernet) clock synchronization in the Industrial Internet of Things (IIoT).</description>
                    <link>https://techxplore.com/news/2026-02-cyber-disrupt-smart-factories.html</link>
                    <category>Business</category>                    <pubDate>Thu, 19 Feb 2026 13:25:22 EST</pubDate>
                    <guid isPermaLink="false">news690729901</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/cyber-attacks-could-di.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>People are overconfident about spotting AI faces, study finds</title>
                    <description>Most people believe they can spot AI-generated faces, but that confidence is out of date, research from UNSW Sydney and the Australian National University (ANU) has demonstrated. With AI-generated faces now almost impossible to distinguish from real ones, this misplaced confidence could make individuals and organizations more vulnerable to scammers, fraudsters and bad actors, the researchers warn.</description>
                    <link>https://techxplore.com/news/2026-02-people-overconfident-ai.html</link>
                    <category>Consumer &amp; Gadgets</category>                    <pubDate>Wed, 18 Feb 2026 11:00:49 EST</pubDate>
                    <guid isPermaLink="false">news690634801</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/people-are-overconfide.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Spanish police arrest hacker who booked luxury hotels for one cent</title>
                    <description>Spanish police said Wednesday they had arrested a 20-year-old man who allegedly hacked a hotel booking website to reserve luxury rooms for as little as one cent, in the first known cybercrime of its kind.</description>
                    <link>https://techxplore.com/news/2026-02-spanish-police-hacker-luxury-hotels.html</link>
                    <category>Security</category>                    <pubDate>Wed, 18 Feb 2026 09:40:12 EST</pubDate>
                    <guid isPermaLink="false">news690629727</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/one-cent-pieces-all-a.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Amazon&#039;s Ring wanted to track your pets. It revealed the future of surveillance</title>
                    <description>As a career counterintelligence officer for the US Federal Bureau of Investigation (FBI) and Defense Intelligence Agency, I worked inside a fully integrated intelligence system. Signals intelligence from the National Security Agency guided investigations. Satellite imagery from the National Reconnaissance Office provided visibility into hostile environments. Human intelligence came through Defense Intelligence Agency channels.</description>
                    <link>https://techxplore.com/news/2026-02-amazon-track-pets-revealed-future.html</link>
                    <category>Security</category>                    <pubDate>Tue, 17 Feb 2026 17:50:08 EST</pubDate>
                    <guid isPermaLink="false">news690545315</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/amazons-ring-wanted-to.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Advanced security technology is rarely used—research offers a solution</title>
                    <description>Modern and powerful security technology that protects against hacking attempts is used to a very limited extent—despite having been available to developers for more than a decade. Researchers at Umeå University can now reveal why the technology fails to take hold. &quot;At the same time, we present an automated solution that makes it easy to adopt the technology,&quot; says Sabine Houy, doctoral student at the Department of Computing Science, who is now defending her thesis.</description>
                    <link>https://techxplore.com/news/2026-02-advanced-technology-rarely-solution.html</link>
                    <category>Security</category>                    <pubDate>Tue, 17 Feb 2026 15:30:01 EST</pubDate>
                    <guid isPermaLink="false">news690561255</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/limited-adoption-of-mo.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Why &#039;zero-knowledge encryption&#039; may not stop password theft if servers are hacked</title>
                    <description>People who regularly use online services have between 100 and 200 passwords. Very few can remember every single one. Password managers are therefore extremely helpful, allowing users to access all their passwords with just a single master password.</description>
                    <link>https://techxplore.com/news/2026-02-knowledge-encryption-password-theft-servers.html</link>
                    <category>Computer Sciences</category>                    <pubDate>Mon, 16 Feb 2026 11:10:02 EST</pubDate>
                    <guid isPermaLink="false">news690461993</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2020/password.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Interpol backroom warriors fight cyber criminals &#039;weaponising&#039; AI</title>
                    <description>From perfectly spelled phishing emails to fake videos of government officials, artificial intelligence is changing the game for Interpol&#039;s cat-and-mouse fight against cybercrime at its high-tech war rooms in Singapore.</description>
                    <link>https://techxplore.com/news/2026-02-interpol-backroom-warriors-cyber-criminals.html</link>
                    <category>Security</category>                    <pubDate>Sun, 15 Feb 2026 07:20:01 EST</pubDate>
                    <guid isPermaLink="false">news690361783</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/from-perfectly-spelled.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Cybersecurity spending may pay off: Study links readiness to stronger returns</title>
                    <description>The infamous Target data breach during the 2013 holiday shopping season, which cost the company more than $200 million in damages, has since been hailed as a landmark case in cybersecurity. Exposure to these threats has only increased as businesses continue to expand their digital footprints. That&#039;s why, as a new study involving Binghamton University&#039;s School of Management found, businesses that sufficiently prepare to defend against cyberattacks are also more likely to perform better financially.</description>
                    <link>https://techxplore.com/news/2026-02-cybersecurity-pay-links-readiness-stronger.html</link>
                    <category>Security</category>                    <pubDate>Sat, 14 Feb 2026 11:00:05 EST</pubDate>
                    <guid isPermaLink="false">news690114174</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/cybersecurity.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Research shows companies can gain advantage by prioritizing customer privacy</title>
                    <description>For many companies, customer privacy is often seen as a regulatory burden that limits data use and personalization rather than as a business opportunity. Research by Natalie Chisam at the University of Nebraska–Lincoln reveals companies that handle customer data with transparency, care, and clear communication can gain a measurable competitive advantage through what researchers call privacy stewardship.</description>
                    <link>https://techxplore.com/news/2026-02-companies-gain-advantage-prioritizing-customer.html</link>
                    <category>Business</category>                    <pubDate>Fri, 13 Feb 2026 15:00:04 EST</pubDate>
                    <guid isPermaLink="false">news690197681</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/research-shows-compani.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Your AI chat may reveal more than you think</title>
                    <description>As the use of large language model agents, such as virtual assistants or chatbots, increases at work, at home and in schools, users may be sharing more private information than they realize, according to new research from the University at Buffalo School of Management.</description>
                    <link>https://techxplore.com/news/2026-02-ai-chat-reveal.html</link>
                    <category>Security</category>                    <pubDate>Thu, 12 Feb 2026 16:20:02 EST</pubDate>
                    <guid isPermaLink="false">news690114008</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/typing.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Privacy risk on your wrist: Smartwatch electromagnetic signals may expose users to cyber surveillance</title>
                    <description>Sometimes, cybersecurity isn&#039;t about passwords or computer chips or networks. Instead, it may be about what&#039;s on your wrist. New research led by WPI faculty members and students shows that electromagnetic signals from smartwatches that connect to cellular networks can be collected and used to make inferences about a wearer&#039;s behavior, activities, and even health.</description>
                    <link>https://techxplore.com/news/2026-02-privacy-wrist-smartwatch-electromagnetic-expose.html</link>
                    <category>Consumer &amp; Gadgets</category>                    <pubDate>Thu, 12 Feb 2026 13:04:20 EST</pubDate>
                    <guid isPermaLink="false">news690123842</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2025/smart-watch.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>A new wave of romance scams is washing across the internet—here&#039;s how to stay safe</title>
                    <description>Romance scams are among the most emotionally damaging forms of cyber crime because they combine carefully manufactured intimacy with financial theft—the scammers go after your heart, and then your wallet.</description>
                    <link>https://techxplore.com/news/2026-02-romance-scams-internet-stay-safe.html</link>
                    <category>Internet</category>                    <pubDate>Wed, 11 Feb 2026 11:06:35 EST</pubDate>
                    <guid isPermaLink="false">news690030362</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2024/phone-scam-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Why the OpenClaw AI agent is a &#039;privacy nightmare&#039;</title>
                    <description>A new AI agent that can run locally on computers is reverberating inside and outside Silicon Valley, performing everything from writing emails and updating calendars to implementing workflow automations and creating custom applications.</description>
                    <link>https://techxplore.com/news/2026-02-openclaw-ai-agent-privacy-nightmare.html</link>
                    <category>Security</category>                    <pubDate>Wed, 11 Feb 2026 10:42:31 EST</pubDate>
                    <guid isPermaLink="false">news690028922</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/why-the-openclaw-ai-ag.jpg" width="90" height="90" />
                                    </item>
                        </channel>
</rss>