Security news
Consumer & Gadgets
Researchers find 'dark patterns' in Japanese mobile apps
Popular Japanese mobile apps have malicious design elements called dark patterns or deceptive user interface designs, researchers from Tokyo Tech have found. A new class of dark patterns, called "Linguistic Dead-Ends," of ...
Sep 29, 2023
0
17

Enhancing AI robustness for more secure and reliable systems
By completely rethinking the way that most Artificial Intelligence (AI) systems protect against attacks, researchers at EPFL's School of Engineering have developed a new training approach to ensure that machine learning models, ...
Sep 28, 2023
0
58

Q&A: Assessing the risks of existential terrorism and AI
Gary Ackerman, an associate professor and associate dean at the State University of New York's University at Albany College of Emergency Preparedness, Homeland Security and Cybersecurity (CEHC), has spent decades studying ...
Sep 28, 2023
0
8

New revised guide to operational technology (OT) security published
The impact of cybersecurity breaches on infrastructure control system owners/operators is more significant and visible than ever before. Whether you work for an infrastructure owner/operator or are a consumer of an infrastructure ...
Sep 28, 2023
0
7
Security
New York bans facial recognition in schools after report finds risks outweigh potential benefits
New York state banned the use of facial recognition technology in schools Wednesday, following a report that concluded the risks to student privacy and civil rights outweigh potential security benefits.
Sep 27, 2023
0
3
Business

Remote workers are more aware of cybersecurity risks than in-office employees: New study
Workers who telecommute tend to be more aware of cybersecurity threats than those who spend most of their time in a physical office and are more likely to take action to ward them off, according to our new peer-reviewed study.
Sep 26, 2023
0
2
Security

Researcher finds way to get audio from still images and silent videos
With video calls becoming more common in the age of remote and hybrid workplaces, "mute yourself" and "I think you're muted" have become part of our everyday vocabularies. But it turns out muting yourself might not be as ...
Sep 25, 2023
2
315
Security

There are ghosts in your machine: Cybersecurity researcher can make self-driving cars hallucinate
Have you ever seen a dark shape out of the corner of your eye and thought it was a person, only to breathe a sigh of relief when you realize it's a coat rack or another innocuous item in your house? It's a harmless trick ...
Sep 25, 2023
0
42
Energy & Green Tech

Privacy choices for smart meters may have consequences for decades
Smart meters have become commonplace in the Netherlands: the vast majority of households now have one in their fuse box. And yet, some 10 years after their introduction, there are still many questions and challenges surrounding ...
Sep 25, 2023
0
2
Security

Leading Egyptian opposition politician targeted with spyware, researchers find
A leading Egyptian opposition politician was targeted with spyware multiple times after announcing a presidential bid—including with malware that automatically infects smartphones, security researchers have found. They ...
Sep 24, 2023
0
13
Internet

Spyware can infect your phone or computer via the ads you see online—report
Each day, you leave digital traces of what you did, where you went, who you communicated with, what you bought, what you're thinking of buying, and much more. This mass of data serves as a library of clues for personalized ...
Sep 22, 2023
1
37
Internet

Investigating shadow profiles: The data of others
Shadow profiles in social networks contain information about people who are not members. At the moment, shadow profiles are almost impossible to prevent using technical means, pose a collective problem for society and are ...
Sep 22, 2023
0
1
Internet

Why do I get so much spam and unwanted email in my inbox? And how can I get rid of it?
Spam might not have brought an end to the internet or email, as some dire predictions in the early 2000s claimed it could—but it's still a massive pain.
Sep 21, 2023
0
4
Security

What's wrong with this picture? Face analysis program helps to find answers
Face recognition software is commonly used as a gatekeeper for accessing secure websites and electronic devices, but what if someone can defeat it by simply wearing a mask resembling another person's face? Newly published ...
Sep 20, 2023
0
6
Internet

Cracking the code: Examining why people fall for scams
Australians lost a staggering $3 billion to scammers last year, surpassing any previous year. That's equivalent to the cost of rebuilding three new hospitals. The latest Targeting Scams report from the Australian Competition ...
Sep 20, 2023
0
9