Security news
Telecom
Governments continue losing efforts to gain backdoor access to secure communications
Reports that prominent American national security officials used a freely available encrypted messaging app, coupled with the rise of authoritarian policies around the world, have led to a surge in interest in encrypted apps ...
May 16, 2025
0
0

Mathematical method allows individuals to prove their locations without revealing them
Location data is considered particularly sensitive—its misuse can have serious consequences. Researchers at the Technical University of Munich (TUM) have developed a method that allows individuals to cryptographically prove ...
May 15, 2025
0
25

NFTs in sports: How to be on alert to the dangers of fraud and counterfeiting
Non-fungible tokens (NFTs) are experiencing spectacular growth thanks to the new opportunities they offer for interaction and monetization to fans, clubs and athletes in the sports industry.
May 15, 2025
0
0

Coinbase said cyber crooks stole customer information and demanded $20 million ransom payment
Coinbase, the largest cryptocurrency exchange based in the U.S., said Thursday that criminals had improperly obtained personal data on the exchange's customers for use in crypto-stealing scams and were demanding a $20 million ...
May 15, 2025
0
0
Security
Retail cyber-attacks reflective of 'patchwork' IT infrastructures and weak regulatory systems, says expert
Too many businesses are treating cybersecurity as an optional extra rather than a necessary investment, says a Bayes Business School expert in technology and innovation, responding to recent cyber-attacks on Co-op and Marks ...
May 15, 2025
0
0
Security
Ransomware attacks drive majority of US health data breaches, analysis shows
A new study led by researchers from Michigan State University, Yale University and Johns Hopkins University reveals that ransomware attacks—which involve a hacker putting encryption controls into a file and then demanding ...
May 14, 2025
0
24
Security

M&S cyberattacks used a little-known but dangerous technique—and anyone could be vulnerable
The cyberattack that has targeted Marks & Spencer's (M&S) is the latest in a growing wave of cases involving something called sim-swap fraud. While the full technical details remain under investigation, a report in the Times ...
May 14, 2025
0
1
Consumer & Gadgets

How we think about protecting data: Game-based study reveals how context shapes decisions
How should personal data be protected? What are the best uses of it? In our networked world, questions about data privacy are ubiquitous and matter for companies, policymakers, and the public.
May 13, 2025
0
9
Hardware

Computer scientists discover new security vulnerability in Intel processors
Anyone who speculates on likely events ahead of time and prepares accordingly can react quicker to new developments. What practically every person does every day, consciously or unconsciously, is also used by modern computer ...
May 13, 2025
0
17
Security

Customer data stolen in Marks & Spencer cyberattack
British retailer Marks & Spencer said on Tuesday that some personal data of its customers was stolen in a cyberattack that has crippled its online services for weeks.
May 13, 2025
0
0
Security

What lessons in cyber resilience can be learned from the UK high street attacks?
Dr. Patricia Esteve-Gonzalez from Oxford University's Global Cyber Security Capacity Center (GCSCC), Department of Computer Science, and Luna Rohland from the World Economic Forum Center for Cybersecurity, outline how organizations ...
May 12, 2025
0
0
Computer Sciences

Quantum computers could crack the security codes used by satellites
Satellites are the invisible backbone of modern life. They guide airplanes, help us find our way with GPS, deliver TV and the internet, and even help emergency services respond to disasters. But a new kind of computer—quantum ...
May 12, 2025
0
0
Business

Decentralized finance is booming, and so are the security risks
When the first cryptocurrency, Bitcoin, was proposed in 2008, the goal was simple: to create a digital currency free from banks and governments. Over time, that idea evolved into something much bigger: "decentralized finance," ...
May 8, 2025
0
0
Security

Dramatic rise in publicly downloadable deepfake image generators, study finds
Researchers from the Oxford Internet Institute (OII) at the University of Oxford have uncovered a dramatic rise in easily accessible AI tools specifically designed to create deepfake images of identifiable people, finding ...
May 7, 2025
0
20
Consumer & Gadgets

Smart home devices used to monitor domestic workers raise safety concerns
The growing use of smart home devices is undermining the privacy and safety of domestic workers. New research from King's College London reveals how surveillance technologies reinforce a sense of constant monitoring and control ...
May 7, 2025
0
36
Security

Avoiding AI is hard—but our freedom to opt out must be protected
Imagine applying for a job, only to find out that an algorithm powered by artificial intelligence (AI) rejected your résumé before a human even saw it. Or imagine visiting a doctor where treatment options are chosen by ...
May 7, 2025
0
7
Security

Spy vs. spy: Researchers work to secure messaging
When you send a message through WhatsApp or iMessage, you might think only you and the recipient can read it. Thanks to end-to-end encryption (E2EE), that's usually true, but it's not the whole story, says Dr. Nitesh Saxena, ...
May 5, 2025
0
25
Computer Sciences

Computer scientists create algorithm to protect videos from quantum hacking
Researchers at FIU's College of Engineering and Computing have developed an encryption algorithm to defend videos from attackers with access to the world's most powerful computers.
May 5, 2025
0
0
Security

Developing privacy-aware building automation
Researchers at the University of Tokyo developed a framework to enable decentralized artificial intelligence-based building automation with a focus on privacy. The system enables AI-powered devices like cameras and interfaces ...
May 5, 2025
0
0
Consumer & Gadgets

UK research identifies attitudes toward personal data processing for national security
Almost 80% of U.K. adults support national security agencies collecting and processing personal data to investigate terrorism and serious crime, according to new research by the Center for Emerging Technology and Security ...
May 1, 2025
0
0
Security

Deepfakes now come with a realistic heartbeat, making them harder to unmask
Imagine a world where deepfakes have become so good that no detection mechanism can unmask them as impostors. This would be a bonanza for criminals and malignant state actors: for example, these might use deepfakes to slander ...
Apr 30, 2025
0
39
Internet

Unequal internet: Study highlights differences between websites from developing and developed countries
The Internet may be a global phenomenon, but its often-claimed global nature is tempered by the "digital divide"—digital participation still heavily depends on economic conditions.
Apr 29, 2025
0
0
Security

Information of more than 9,000 people potentially exposed in Blue Cross and Blue Shield of Illinois data breach
The personal information of more than 9,300 people may have been exposed in a recent data breach at health insurer Blue Cross and Blue Shield of Illinois, according to the company.
Apr 29, 2025
0
0
Business

Cyberattacks: How companies can communicate effectively after being hit
In its latest annual publication, insurance group Hiscox surveyed more than 2,000 cybersecurity managers in eight countries, including France. Two-thirds of the companies in the survey reported having been the victim of a ...
Apr 29, 2025
0
0