Security news
Software
Protecting audio privacy: Speech-filtering technology balances privacy and utility in smart devices
Sound is a powerful source of information. By training algorithms to identify distinct sound signatures, sound can reveal what a person is doing, whether it's cooking, vacuuming or washing the dishes. And while it's valuable ...
16 hours ago
0
14
Robotics
Electronic skin with unique fingerprint patterns offers enhanced security features
The likelihood of two human fingerprints being identical is extremely low—about 1 in 640 billion. Even identical twins, despite sharing the same genetic information, have unique fingerprints. A new technology now allows ...
17 hours ago
0
32

DNA sequencing at risk: Hackers could exploit genomic data vulnerabilities
Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking, and gene research—could become a prime target for hackers.
Apr 17, 2025
1
14

AI-powered intrusion detection system outperforms traditional methods in securing IoT networks
As Internet of Things (IoT) devices proliferate in sectors like smart cities, health care, and industrial systems, they have become prime targets for cyberattacks such as Distributed Denial of Service (DDoS), ransomware, ...
Apr 16, 2025
0
0

Silicon Valley crosswalks hacked to mock Musk, Zuckerberg
Pedestrian crosswalks in California's Silicon Valley were emitting recordings over the weekend that mocked US President Donald Trump and tech billionaires Mark Zuckerberg and Elon Musk, according to widely shared videos.
Apr 16, 2025
0
1
Security
Machine learning method cuts fraud detection costs by generating accurate labels from imbalanced datasets
Fraud is widespread in the United States and increasingly driven by technology. For example, 93% of credit card fraud now involves remote account access, not physical theft. In 2023, fraud losses surpassed $10 billion for ...
Apr 15, 2025
0
33
Business
Flaws found in tools used to enforce online ad standards
A new study finds about 10% of websites that claim to comply with online advertising standards are running ads that violate those standards. The finding tells researchers that the ad-filtering rules browser extensions use ...
Apr 15, 2025
0
17
Security

Lightweight AI model facilitates high-quality image generation without direct transmission of sensitive data
A new ultra-lightweight artificial intelligence (AI) model has been developed that assists in generating high-quality images without directly sending sensitive data to servers. This technological advancement paves the way ...
Apr 14, 2025
0
5
Telecom

New UK system to protect satellites against attack shows how global conflict has spilled into outer space
The UK government has announced £65 million in funding for a new system called Borealis which is intended to help the UK military defend its satellites against threats. Borealis is a software system that collates and processes ...
Apr 14, 2025
0
0
Business

Google accused of harming kids by secretly grabbing data from school-provided tech products
Google is secretly using its education products, including those used in many Bay Area schools, to identify students individually, track their online activity including sites they visit and links they click, and "steal" their ...
Apr 10, 2025
0
2
Computer Sciences

Wavelet-based adversarial training: Cybersecurity system protects medical digital twins from attacks
A digital twin is an exact virtual copy of a real-world system. Built using real-time data, they provide a platform to test, simulate, and optimize the performance of their physical counterpart. In health care, medical digital ...
Apr 10, 2025
0
0
Security

Hackers breach Morocco's social security database in an unprecedented cyberattack
Morocco's social security agency said troves of data were stolen from its systems in a cyberattack this week that resulted in personal information being leaked on the messaging app Telegram.
Apr 10, 2025
0
0
Security

One Tech Tip: Locking down your device when crossing borders
Planning an international trip? Travelers should prepare for the possibility of extra scrutiny of their phones when crossing borders, especially when entering the United States.
Apr 10, 2025
0
0
Security

Can you spot a financial fake? How AI is raising our risks of billing fraud
Along with the many benefits of artificial intelligence—from providing real-time navigation to early disease detection—the explosion in its use has increased opportunities for fraud and deception.
Apr 9, 2025
0
0
Software

AI threats in software development revealed in new study
UTSA researchers recently completed one of the most comprehensive studies to date on the risks of using AI models to develop software. In a new paper, they demonstrate how a specific type of error could pose a serious threat ...
Apr 8, 2025
0
18
Security

Probabilistic algorithm targets social media's fake news problem
Fake news across social media is becoming ever easier to spread and more difficult to detect. That's thanks to increasingly powerful artificial intelligence (AI) and cuts to fact-checking resources by major platforms.
Apr 8, 2025
0
38
Telecom

Development of a chaotic light receiver for secure communication in hostile environments
Researchers have developed a new type of optical receiver, able to restore chaotic signals in free-space optical communication links distorted by atmospheric turbulence. Using a system of optical antennas integrated into ...
Apr 8, 2025
0
50
Security

Selling your old laptop or phone? You might be handing over your data too
You're about to recycle your laptop or your phone, so you delete all your photos and personal files. Maybe you even reset the device to factory settings.
Apr 8, 2025
0
1
Hi Tech & Innovation

Encryption method for key exchange enables tap-proof communication to fend off future quantum tech threats
Quantum computers are a specter for future data security because they might break many of today's encryption methods. Among other things, this will affect encrypted emails, messenger services, or online banking. Together ...
Apr 7, 2025
0
0
Security

Hackers have hit major super funds—a cyber expert explains how to stop it from happening again
Several of Australia's biggest superannuation funds have suffered a suspected coordinated cyberattack, with scammers stealing hundreds of thousands of dollars of members' retirement savings.
Apr 6, 2025
0
0
Business

What users need to know about privacy and data after 23andMe's bankruptcy filing
23andMe, one of the first companies to provide direct-to-consumer genetic testing kits, has filed for bankruptcy. Since its founding in 2006, it has sold over 12 million DNA kits, with high-profile users including Oprah Winfrey ...
Mar 31, 2025
0
0
Security

Oracle warns health customers of patient data breach
Hackers broke into Oracle Corp.'s computer systems and stole patient data in an attempt to extort multiple medical providers in the U.S., according to a person familiar with the matter and a notification the software company ...
Mar 31, 2025
0
2
Security

Standardized security playbooks can improve protection against cyberattacks
One attack, many responses—organizations use various solutions to ward off online attacks. The playbooks that outline countermeasures also vary in their specifics. In the CyberGuard project, Fraunhofer researchers are working ...
Mar 31, 2025
0
0
Consumer & Gadgets

Everything you say to an Alexa speaker will be sent to Amazon—starting today
Amazon has disabled two key privacy features in its Alexa smart speakers, in a push to introduce artificial intelligence-powered "agentic capabilities" and turn a profit from the popular devices.
Mar 29, 2025
1
73
Internet

One Tech Tip: Don't give your email to strangers, use a decoy address instead
You've heard of burner phones. What about burner email?
Mar 27, 2025
0
1