Security news

Security

Apple, Android phones targeted by Italian spyware: Google

An Italy-based firm's hacking tools were used to spy on Apple and Android smartphones in Italy and Kazakhstan, Google said Thursday, casting a light on a "flourishing" spyware industry.

Security

A simple tool to make websites more secure and curb hacking

An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyberattacks.

Computer Sciences

Protecting computer vision from adversarial attacks

Advances in computer vision and machine learning have made it possible for a wide range of technologies to perform sophisticated tasks with little or no human supervision. From autonomous drones and self-driving cars to medical ...

Consumer & Gadgets

How math and language can combine to map the globe and create strong passwords, using the power of 3 random words

It's hard to imagine that three random words have the power to both map the globe and keep your private data secure. The secret behind this power is just a little bit of math.

Security

Costa Rica chaos a warning that ransomware threat remains

Teachers unable to get paychecks. Tax and customs systems paralyzed. Health officials unable to access medical records or track the spread of COVID-19. A country's president declaring war against foreign hackers saying they ...

Security

Why we need philosophy and ethics of cyber warfare

Cyber-attacks are rarely out of the headlines. We know state actors, terrorists, and criminals can leverage cyber-means to target the digital infrastructures of our societies. We have also learned that, insofar as our societies ...

Security

Keeping web-browsing data safe from hackers

Malicious agents can use machine learning to launch powerful attacks that steal information in ways that are tough to prevent and often even more difficult to study.

Security

More than 90% of cyberattacks are made possible by human error

In a ransomware attack, a company's computer systems are locked, and the attacker demands a ransom in cryptocurrency in return for unlocking the system. Malware infects a network of objects connected to the Internet of Things ...