Security news

Consumer & Gadgets

Adobe announces development of SLM that can run locally on a phone with no cloud connection

A small team of AI researchers at Adobe Inc., working with a colleague from Auburn University and another from Georgia Tech, has developed a small language model (SLM) that they claim can be run locally on a smart phone with ...

Security

Modern cars are surveillance devices on wheels with major privacy risks—new report

New research reveals serious privacy flaws in the data practices of new internet-connected cars in Australia. It's yet another reason why we need urgent reform of privacy laws.

Security

Russian extradited to US from SKorea to face ransomware charges

A Russian national has been extradited to the United States from South Korea to face charges he distributed ransomware that targeted schools, hospitals and other institutions, the Justice Department said Monday.

Security

Common way to test for leaks in large language models may be flawed

Large language models are everywhere, including running in the background of the apps on the device you're using to read this. The auto-complete suggestions in your texts and emails, the query responses composed by Gemni, ...

Consumer & Gadgets

Everyday routines as the key to logging in to smart homes

Smart homes are intended to make life easier, but logging into individual devices is often still an onerous task. Researchers from ETH Zurich have investigated how everyday routines could be used for secure and user-friendly ...

Security

50 countries warn UN of ransomware attacks on hospitals

The World Health Organization and some 50 countries issued a warning Friday at the United Nations about the rise of ransomware attacks against hospitals, with the United States specifically blaming Russia.

Internet

How common are fake profile pictures on Twitter?

Automated social media profiles are a powerful tool for spreading propaganda. They often feature AI-generated profile pictures. Researchers are currently looking into ways of identifying such images.

Computer Sciences

Researchers address quantum computing security challenges

Alongside artificial intelligence, quantum computing is one of the fastest-growing subsets in the high-performance computing community. But what happens when this relatively new and powerful computing method reaches the limit ...

Consumer & Gadgets

Health monitoring devices at risk of being hacked, study shows

Billions of people around the world are using internet-connected medical devices to monitor their health, but could be putting themselves at risk of hackers using their data for unhealthy reasons, according to a new cybersecurity ...

Security

Secure messaging through distributed messages

Most internet communications today rely on the TLS (Transport Layer Security) protocol, which protects against eavesdropping on the network, but not against access by service providers themselves. While end-to-end encryption ...