Firefighters learn from experts about electric vehicle batteries, safety
There's a reason that electric vehicles (EV) in salvage yards are kept by themselves and spaced far apart. Their lithium-ion batteries can hold a lot of energy, and if one catches fire, it's sometimes hard for firefighters ...
Jan 9, 2025
0
7
Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data
Japan on Wednesday linked more than 200 cyberattacks over the past five years targeting the country's national security and high technology data to a Chinese hacking group, MirrorFace, detailing their tactics and calling ...
Jan 8, 2025
0
0
Weaponized disinformation can pose serious threat to urban transit systems
As every straphanger knows, public transit systems are fantastic—except when they aren't. A single station closure can ruin a commuter's morning, and even minor delays or disruptions can snowball into major problems as ...
Jan 7, 2025
0
0
New labels will help people pick devices less at risk of hacking
The federal government is rolling out a consumer labeling system designed to help Americans pick smart devices that are less vulnerable to hacking.
Jan 7, 2025
0
0
From logs to security: How process analysis is transforming access control
Researchers at the University of Electro-Communications have developed a framework for improving system security by analyzing business process logs. The research is published in the International Journal of Software Engineering ...
Jan 7, 2025
0
0
Tesla data helped police after Las Vegas truck explosion, but experts have wider privacy concerns
Your car is spying on you. That is one takeaway from the fast, detailed data that Tesla collected on the driver of one of its Cybertrucks that exploded in Las Vegas earlier this week. Privacy data experts say the deep dive ...
Jan 5, 2025
0
1
Digital fingerprint: Cascading style sheets leaves users vulnerable to tracking
Processor type, IP address, browser in use, installed fonts—by collecting these and other characteristics of browser settings and the underlying operating system, it is possible to create a highly detailed and, in some ...
Jan 3, 2025
0
2
Selling fear: Marketing for cybersecurity products often leaves consumers less secure
You have likely seen multiple ads for products and services designed to make you more secure online. When you turn on your television, see online ads, or even when you get in-app notifications, you are likely to encounter ...
Jan 2, 2025
0
0
Japan Airlines was hit by a cyberattack, delaying flights during the year-end holiday season
Japan Airlines said it was hit by a cyberattack Thursday, causing delays to more than 20 domestic flights but the carrier said it was able to stop the onslaught and restore its systems hours later. There was no impact on ...
Dec 26, 2024
0
0
Cryptographic protocol enables secure data sharing in floating wind energy sector
Floating wind power offers enormous potential for deepwater offshore energy development. However, the management and secure exchange of data between stakeholders represents a key challenge for its evolution.
Dec 23, 2024
0
14
3D-printed guns, like the one Luigi Mangione allegedly used, are a growing threat
Police investigating the shooting of UnitedHealthcare CEO Brian Thompson on Dec. 4, 2024, have announced that the suspected assailant had used a 3D-printed gun. Several high-profile crimes in recent years have involved this ...
Dec 22, 2024
0
5
AI-driven gait analysis bridges health care and security fields
The analysis of a person's individual walking pattern, or gait, can reveal details about their identity and reflect differences between individuals, groups and even populations.
Dec 20, 2024
0
13
Fake credentials offer novel solution to e-voting challenges
As we come to the end of a year in which half the world's population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter ...
Dec 20, 2024
0
2
AI system reveals hidden drug dark jargon unknown even to police officers
Drug trafficking and other criminal activities on social media have become a growing social concern. To evade detection by law enforcement and automated monitoring systems, offenders use dark jargons, often combining multiple ...
Dec 20, 2024
0
4
Five cybersecurity tips to protect yourself from scams and deepfakes
In an age when misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Falling for a scam can have devastating social, financial, and personal consequences. ...
Dec 20, 2024
0
1
Can we convince AI to answer harmful requests?
New research from EPFL demonstrates that even the most recent large language models (LLMs), despite undergoing safety training, remain vulnerable to simple input manipulations that can cause them to behave in unintended or ...
Dec 19, 2024
0
16
Study: New method of privacy enhancement for AI-powered medical data
Artificial intelligence has the potential to improve doctors' ability to diagnose and treat sleep apnea. But the technology is not widely adopted due to fears that it does not safeguard patient data.
Dec 19, 2024
0
17
The federal government wants you to adopt 'end-to-end encryption' methods. Here's why you should adopt them
After revealing that it was the target of a sweeping hacking campaign, the federal government issued a public service announcement this week urging the public to use "end-to-end encryption" in order to better secure its digital ...
Dec 19, 2024
0
1