<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
                    <title>Security News - Software vulnerabilities, data leaks, malware, viruses</title>
            <link>https://techxplore.com/rss-feed/security-news/</link>
            <language>en-us</language>
            <description>The latest news on cyber security, network security, software vulnerabilities, data leaks, malware, and viruses</description>

                            <item>
                    <title>Facial recognition data is a key to your identity. If stolen, you can&#039;t just change the locks</title>
                    <description>A woman strolls into a grocery store, thinking about grabbing some apples. Before she even reaches the produce aisle, a security camera has scanned her face. Whether the system is checking for shoplifters or simply logging her arrival, her face has joined a digital ledger, a trace she can&#039;t easily erase. Retailers, banks, airports, stadiums and office buildings are doing the same.</description>
                    <link>https://techxplore.com/news/2026-04-facial-recognition-key-identity-stolen.html</link>
                    <category>Business</category>                    <pubDate>Tue, 28 Apr 2026 12:20:01 EDT</pubDate>
                    <guid isPermaLink="false">news696597121</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2022/facial-recognition-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>UK biobank records listed for sale in China: Why open data might be the answer</title>
                    <description>The chief executive of the UK Biobank, one of the world&#039;s largest biomedical databases, recently wrote to more than 500,000 participants telling them that some of their data had been made available for sale online through a Chinese website. This wasn&#039;t a data breach or hack, but rather researchers who had legitimately accessed the data trying to sell it.</description>
                    <link>https://techxplore.com/news/2026-04-uk-biobank-sale-china.html</link>
                    <category>Security</category>                    <pubDate>Tue, 28 Apr 2026 10:40:03 EDT</pubDate>
                    <guid isPermaLink="false">news696588002</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/health-data.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>&#039;Not just an IT issue&#039;: The human threat to cybersecurity</title>
                    <description>Organizations could be better protected from cybercrime by investing in more leadership and staff decision-making, a University of Queensland study has found.</description>
                    <link>https://techxplore.com/news/2026-04-issue-human-threat-cybersecurity.html</link>
                    <category>Security</category>                    <pubDate>Tue, 28 Apr 2026 07:00:04 EDT</pubDate>
                    <guid isPermaLink="false">news696577441</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/not-just-an-it-issue-t.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Germany launches spying probe into Signal attacks targeting MPs</title>
                    <description>German prosecutors Friday launched a spying investigation into phishing attacks targeting lawmakers on the Signal messaging app, with an MP saying the latest Russia-directed plot against Germany was a &quot;wake-up call.&quot;</description>
                    <link>https://techxplore.com/news/2026-04-germany-spying-probe-mps.html</link>
                    <category>Security</category>                    <pubDate>Fri, 24 Apr 2026 12:22:10 EDT</pubDate>
                    <guid isPermaLink="false">news696252107</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/german-parliament-spea.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI has crossed a threshold. What Claude Mythos means for the future of cybersecurity</title>
                    <description>The limit of what artificial intelligence can achieve, known as frontier AI, has crossed another threshold. AI can now plan and execute sophisticated cyber operations with minimal guidance at speeds far beyond human capability.</description>
                    <link>https://techxplore.com/news/2026-04-ai-threshold-claude-mythos-future.html</link>
                    <category>Security</category>                    <pubDate>Thu, 23 Apr 2026 16:20:02 EDT</pubDate>
                    <guid isPermaLink="false">news696178981</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/frontier-ai-sandbox.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Needle-tip chip can secure pacemakers and insulin pumps against quantum attacks</title>
                    <description>As quantum computers advance, they are expected to be able to break tried-and-true security schemes that currently keep most sensitive data secure from attackers. Scientists and policymakers are working to design and implement post-quantum cryptography to defend against these future attacks.</description>
                    <link>https://techxplore.com/news/2026-04-needle-chip-pacemakers-insulin-quantum.html</link>
                    <category>Hi Tech &amp; Innovation</category>                    <pubDate>Thu, 23 Apr 2026 15:00:03 EDT</pubDate>
                    <guid isPermaLink="false">news696174481</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/new-chip-can-protect-w.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers</title>
                    <description>For digital nomads, logging on to work from a cafe, co-working space, hotel lobby or airport lounge is a way of life.</description>
                    <link>https://techxplore.com/news/2026-04-tech-cafe-privacy-guidelines-remote.html</link>
                    <category>Security</category>                    <pubDate>Thu, 23 Apr 2026 04:06:03 EDT</pubDate>
                    <guid isPermaLink="false">news696135935</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/one-tech-tip-logging-o.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Generative AI may cut costs in machine-learning systems, but it increases risks of cyberattacks and data leaks</title>
                    <description>Using generative AI to design, train, or perform steps within a machine-learning system is risky, argues computer scientist Micheal Lones in a paper appearing in Patterns. Though large language models (LLMs) could expand the capabilities of machine-learning systems and decrease costs and labor needs, Lones warns that using them reduces transparency and control for the people developing and using these systems and increases the risk of malicious cyberattacks, data leaks, and bias against underrepresented groups.</description>
                    <link>https://techxplore.com/news/2026-04-generative-ai-machine-cyberattacks-leaks.html</link>
                    <category>Security</category>                    <pubDate>Wed, 22 Apr 2026 11:00:09 EDT</pubDate>
                    <guid isPermaLink="false">news695918949</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2024/generative-ai-2.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>North Korean hackers suspected of $300 mn crypto heist</title>
                    <description>A notorious North Korean hacking group is likely behind the theft of nearly $300 million in cryptocurrency over the weekend, an affected party has said, in the biggest known crypto heist this year.</description>
                    <link>https://techxplore.com/news/2026-04-north-korean-hackers-mn-crypto.html</link>
                    <category>Security</category>                    <pubDate>Wed, 22 Apr 2026 04:30:01 EDT</pubDate>
                    <guid isPermaLink="false">news696050229</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2019/hack.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Industrial electrification is now a security imperative, finds analysis</title>
                    <description>Industrial electrification is becoming a matter of economic security as well as decarbonization, according to new Oxford analysis. Continued reliance on fossil fuels leaves 75% of global industry exposed to recurring price shocks, while electrification offers a pathway to stable and resilient energy costs.</description>
                    <link>https://techxplore.com/news/2026-04-industrial-electrification-imperative-analysis.html</link>
                    <category>Energy &amp; Green Tech</category>                    <pubDate>Tue, 21 Apr 2026 19:10:07 EDT</pubDate>
                    <guid isPermaLink="false">news696009961</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2019/electricgrid.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>From floppy disks to Claude Mythos, how ransomware grew into a multibillion‑dollar industry</title>
                    <description>When evolutionary biologist Joseph Popp coded the first documented piece of ransomware in 1989, he had little idea it would become a major criminal business model capable of bringing economies to their knees.</description>
                    <link>https://techxplore.com/news/2026-04-floppy-disks-claude-mythos-ransomware.html</link>
                    <category>Security</category>                    <pubDate>Tue, 21 Apr 2026 14:00:01 EDT</pubDate>
                    <guid isPermaLink="false">news695998321</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2024/ransomware.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>What could your voice give away?</title>
                    <description>With AI, the voice has acquired a new significance. Behind the words lies data that can be used both to diagnose a health problem and to steal someone&#039;s identity. Speaking to machines is no longer the stuff of science fiction. Alexa (Amazon) has been present in homes for over a decade, and an increasing number of users now favor voice interactions with chatbots.</description>
                    <link>https://techxplore.com/news/2026-04-voice.html</link>
                    <category>Security</category>                    <pubDate>Fri, 17 Apr 2026 20:00:01 EDT</pubDate>
                    <guid isPermaLink="false">news695646637</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/speaking-into-smartpho.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back</title>
                    <description>From an advertisement for an herbal remedy that promises to cure all to a video featuring a voice that sounds just like a movie star, you&#039;ve surely encountered spam and scam advertisements online. And they have likely been created with artificial intelligence.</description>
                    <link>https://techxplore.com/news/2026-04-ai-gold-spammers-scammers-google.html</link>
                    <category>Security</category>                    <pubDate>Thu, 16 Apr 2026 14:00:01 EDT</pubDate>
                    <guid isPermaLink="false">news695565592</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-is-a-gold-mine-for.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Making AI safer for victims of intimate partner violence</title>
                    <description>Conversational AI tools denied blunt requests for harmful content by researchers posing as intimate partner abusers, but these guardrails were easily circumvented when they requested the content under false pretenses, a new Cornell Tech study has found.</description>
                    <link>https://techxplore.com/news/2026-04-ai-safer-victims-intimate-partner.html</link>
                    <category>Security</category>                    <pubDate>Thu, 16 Apr 2026 12:40:09 EDT</pubDate>
                    <guid isPermaLink="false">news695560863</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-guardrail-bypass.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI system detects manipulated video frames with 95% accuracy</title>
                    <description>With the rapid spread of digital content, doctored videos pose growing risks across media, security, and legal domains. A new study published in The Journal of Engineering Research introduces an automated approach to detect interpolated frames—artificially inserted images used to smooth manipulated video sequences and make them appear authentic.</description>
                    <link>https://techxplore.com/news/2026-04-ai-video-accuracy.html</link>
                    <category>Security</category>                    <pubDate>Tue, 14 Apr 2026 15:20:04 EDT</pubDate>
                    <guid isPermaLink="false">news695397721</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-system-detects-mani.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Reactions to data breaches fade faster than expected</title>
                    <description>Data breaches, such as the recent incidents at Odido and Basic-Fit, trigger feelings of anxiety and loss of trust among both victims and those who may have been affected. New international research shows that although data breaches provoke strong emotional responses, users tend to adapt surprisingly quickly, even when their privacy has been violated.</description>
                    <link>https://techxplore.com/news/2026-04-reactions-breaches-faster.html</link>
                    <category>Consumer &amp; Gadgets</category>                    <pubDate>Tue, 14 Apr 2026 15:00:01 EDT</pubDate>
                    <guid isPermaLink="false">news695397362</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2024/facebook-ads.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Does &#039;federated unlearning&#039; in AI improve data privacy, or create a new cybersecurity risk?</title>
                    <description>As the capacity of artificial intelligence (AI) increases at an exponential rate, so do concerns about the privacy of user data.</description>
                    <link>https://techxplore.com/news/2026-04-federated-unlearning-ai-privacy-cybersecurity.html</link>
                    <category>Security</category>                    <pubDate>Mon, 13 Apr 2026 18:40:03 EDT</pubDate>
                    <guid isPermaLink="false">news695306794</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2025/data-center-4.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Quantum computers are coming to break our codes faster than anyone expected</title>
                    <description>Online data is generally pretty secure. Assuming everyone is careful with passwords and other protections, you can think of it as being locked in a vault so strong that even all the world&#039;s supercomputers, working together for 10,000 years, could not crack it.</description>
                    <link>https://techxplore.com/news/2026-04-quantum-codes-faster.html</link>
                    <category>Computer Sciences</category>                    <pubDate>Mon, 13 Apr 2026 08:40:05 EDT</pubDate>
                    <guid isPermaLink="false">news695288102</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/quantum-computers-are.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Fake QR codes make for easy scams—be careful what you scan out there</title>
                    <description>It&#039;s a simple thing we encounter many times every single week—often while in a hurry. You pull up at a parking spot, scan a QR code and pay within seconds. Or you sit down at a cafe, scan a code to view the menu and order your meal.</description>
                    <link>https://techxplore.com/news/2026-04-fake-qr-codes-easy-scams.html</link>
                    <category>Security</category>                    <pubDate>Thu, 09 Apr 2026 11:00:01 EDT</pubDate>
                    <guid isPermaLink="false">news694950601</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/qr-code.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>New software safeguards research participants&#039; privacy</title>
                    <description>Which details in a de-identified scientific record are enough to still identify a person? If, for example, the record includes that a person is a CEO, the abundance of CEOs in the world would make identification nearly impossible. If the person is a CEO living in Missouri, the list becomes notably shorter but likely extensive enough to safeguard identity. But the name of a CEO living in St. Louis and working at a particular company is easy to figure out.</description>
                    <link>https://techxplore.com/news/2026-04-software-safeguards-privacy.html</link>
                    <category>Software</category>                    <pubDate>Tue, 07 Apr 2026 12:00:03 EDT</pubDate>
                    <guid isPermaLink="false">news694777944</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/new-software-safeguard.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Memristor chip combines security and compute-in-memory for edge devices</title>
                    <description>A cross-institutional research team has developed Co-Located Authentication and Processing (CLAP), a privacy-preserving system that overcomes the trade-off between security and performance in edge computing devices. The study, titled &quot;Privacy-preserving data analysis using a memristor chip with co-located authentication and processing,&quot; is published in Science Advances. The team was led by Professor Ngai Wong and Dr. Zhengwu Liu from the Department of Electrical and Computer Engineering in the Faculty of Engineering at The University of Hong Kong (HKU), in collaboration with Tsinghua University and the Southern University of Science and Technology.</description>
                    <link>https://techxplore.com/news/2026-04-memristor-chip-combines-memory-edge.html</link>
                    <category>Hardware</category>                    <pubDate>Mon, 06 Apr 2026 12:20:04 EDT</pubDate>
                    <guid isPermaLink="false">news694695661</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/privacy-preserving-sys-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI blueprints can be stolen with a single small antenna</title>
                    <description>From smartphone facial recognition to autonomous vehicles, artificial intelligence (AI) has long been protected as a black box. However, a joint research team from KAIST and international institutions has uncovered a new security threat capable of peeking at AI blueprints from behind walls. The team also presented corresponding defense technologies. This discovery is expected to be utilized in strengthening AI security across various sectors, including autonomous driving, health care, and finance.</description>
                    <link>https://techxplore.com/news/2026-04-ai-blueprints-stolen-small-antenna.html</link>
                    <category>Security</category>                    <pubDate>Wed, 01 Apr 2026 15:40:02 EDT</pubDate>
                    <guid isPermaLink="false">news694274582</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-blueprints-stolen-w.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI systems lack a fundamental property of human cognition: Understanding this gap may matter for safety</title>
                    <description>When a person reaches across a table to pass the salt, their brain is doing something far more complex than recognizing a request and executing a movement. It is drawing on a lifetime of bodily experience—where their hand is in space, what a saltshaker feels like, the social awareness of who asked and why. In a fraction of a second, their body and brain are working as one.</description>
                    <link>https://techxplore.com/news/2026-04-ai-lack-fundamental-property-human.html</link>
                    <category>Security</category>                    <pubDate>Wed, 01 Apr 2026 11:00:05 EDT</pubDate>
                    <guid isPermaLink="false">news694252981</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2024/large-language-models.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>North Korea hackers suspected of attack on widely used software tool</title>
                    <description>Hackers linked to North Korea are suspected of an ambitious attack on an inconspicuous but widely used software package, Google analysts and other cybersecurity experts said Wednesday.</description>
                    <link>https://techxplore.com/news/2026-04-north-korea-hackers-widely-software.html</link>
                    <category>Security</category>                    <pubDate>Wed, 01 Apr 2026 04:40:02 EDT</pubDate>
                    <guid isPermaLink="false">news694235959</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2021/hacker.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Who is using differential privacy? A new registry aims to make it visible</title>
                    <description>When Apple discovers trending popular emojis, or when Google reports traffic at a busy restaurant, they&#039;re analyzing large datasets made up of individual people. Those people&#039;s personal information is systematically protected thanks in large part to research by Harvard computer scientists. Now, after two decades of work on the cryptography-adjacent mathematical framework known as differential privacy, researchers in the John A. Paulson School of Engineering and Applied Sciences have reached a key milestone in moving privacy best practices from academia into real-world applications.</description>
                    <link>https://techxplore.com/news/2026-03-differential-privacy-registry-aims-visible.html</link>
                    <category>Security</category>                    <pubDate>Tue, 31 Mar 2026 12:30:05 EDT</pubDate>
                    <guid isPermaLink="false">news694175201</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2020/privacy.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Vibrations in your skull may be your next password</title>
                    <description>A team led by Rutgers University researchers has developed a security system that could change how people log in to virtual and augmented reality platforms by eliminating passwords, personal identification numbers and eye scans and replacing them with something far more seamless.</description>
                    <link>https://techxplore.com/news/2026-03-vibrations-skull-password.html</link>
                    <category>Hi Tech &amp; Innovation</category>                    <pubDate>Tue, 31 Mar 2026 06:39:38 EDT</pubDate>
                    <guid isPermaLink="false">news694157757</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/vibrations-in-your-sku.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Researchers find training gaps impacting maritime cybersecurity readiness</title>
                    <description>Whether it&#039;s a fire or a flood, a ship&#039;s crew can only rely on itself and its training in emergencies at sea. The same is true for crews facing digital threats on oil tankers, cargo ships, and other commercial vessels.</description>
                    <link>https://techxplore.com/news/2026-03-gaps-impacting-maritime-cybersecurity-readiness.html</link>
                    <category>Security</category>                    <pubDate>Mon, 30 Mar 2026 07:10:01 EDT</pubDate>
                    <guid isPermaLink="false">news694071925</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2020/oiltanker.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Photon framework scales AI vulnerability discovery</title>
                    <description>Oak Ridge National Laboratory&#039;s Center for Artificial Intelligence Security Research (CAISER) is shining a light on AI vulnerabilities. While AI models offer tremendous economic, humanitarian and national security potential, they are also increasingly susceptible to exploitation. Identifying and characterizing these vulnerabilities has required considerable intellectual effort and specialized expertise.</description>
                    <link>https://techxplore.com/news/2026-03-photon-framework-scales-ai-vulnerability.html</link>
                    <category>Security</category>                    <pubDate>Sat, 28 Mar 2026 12:30:03 EDT</pubDate>
                    <guid isPermaLink="false">news693633970</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/photon-framework-scale.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Will a new border deal with the US open a backdoor into New Zealanders&#039; personal data?</title>
                    <description>Anyone who has recently traveled to the United States will be familiar with biometric checks—facial and fingerprint scans—used at the border. It is the same technology platform that is used in airports elsewhere in the world. New Zealand&#039;s passports, for instance, are among those that now carry encrypted biometric information, matched to a traveler&#039;s face as they pass through border smart gates.</description>
                    <link>https://techxplore.com/news/2026-03-border-backdoor-zealanders-personal.html</link>
                    <category>Security</category>                    <pubDate>Fri, 27 Mar 2026 10:20:01 EDT</pubDate>
                    <guid isPermaLink="false">news693825541</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2024/airport-security.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Hybrid AI tool unmasks hidden digital abuse to transform forensic investigations</title>
                    <description>Researchers from the University of Huddersfield have developed a hybrid AI tool to detect patterns of psychological abuse, including coercive control, in a bid to transform digital forensic investigations and mental health research.This innovation was developed as a primary outcome of Researcher Dhruv Patel&#039;s Ph.D. work under the mentorship of senior lecturer Dr. Anju Johnson and is designed to address a bottleneck in modern digital forensic investigations, integrating insights from a broader research team to ensure its real-world application.</description>
                    <link>https://techxplore.com/news/2026-03-hybrid-ai-tool-unmasks-hidden.html</link>
                    <category>Security</category>                    <pubDate>Wed, 25 Mar 2026 14:00:08 EDT</pubDate>
                    <guid isPermaLink="false">news693663961</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/hybrid-ai-tool-unmasks.jpg" width="90" height="90" />
                                    </item>
                        </channel>
</rss>