Security news

Security

Each year, landmines kill residents of war-torn countries. This innovative tool could save lives

As he grew up in Bogotá, Colombia, Mateo Dulce Rubio would hear a familiar news story every few days—someone had stepped on another landmine. The explosion had killed or injured them. Though the capital city was far from ...

Security

US seizes internet domains allegedly used by Russian hackers

The United States announced the seizure on Thursday of 41 internet domains allegedly used by Russian intelligence agents to try to gain access to the computers and email accounts of Pentagon, State Department and other US ...

Business

California enacts law to protect brain data

A new California law extends consumer privacy protection to brainwave data gathered by implants or wearable devices.

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Computer Sciences

Securing the 'internet of things' in the quantum age

MIT researchers have developed a novel cryptography circuit that can be used to protect low-power "internet of things" (IoT) devices in the coming age of quantum computing.

Security

Researchers safeguard hardware from cyberattack

Researchers have developed an algorithm that safeguards hardware from attacks to steal data. In the attacks, hackers detect variations of power and electromagnetic radiation in electronic devices' hardware and use that variation ...

Computer Sciences

Supercomputers can spot cyber threats

Identifying cybersecurity threats from raw internet data can be like locating a needle in a haystack. The amount of internet traffic data generated in a 48-hour period, for example, is too massive for one or even 100 laptops ...

Security

Security team discussed weakness in bare-metal services

Back door open. Never a good sign in a computer security environment. Researchers poking around are sure to call out their discoveries in an instance such as the recent one, where cloud servers looked as if they could be ...

Security

Report finds uh-oh issues in popular password managers

Vulnerabilities have been identified in password managers running on Windows 10. Maryland-based Independent Security Evaluators published a report earlier this week baring examination results on a number of popular password ...

Computer Sciences

Could blockchain ensure integrity of clinical trial data?

UC San Francisco researchers have created a proof-of-concept method for ensuring the integrity of clinical trials data with blockchain. The system creates an immutable audit trail that makes it easy to spot any tampering ...

Security

Defending against cyberattacks by giving attackers 'false hope'

With almost every online purchase, a person's personal information—name, date of birth and credit card number—is stored electronically often in the "cloud," which is a network of internet servers. Now, as more people ...

Security

VeryMal: Campaign in image-based malware spotted

By this time, news stories have made words like bugs, viruses and malware familiar and by all means frequent, as computer users scramble to self-educate on how to avoid falling victim to a range of security invasions.

Computer Sciences

A new method to detect false data injection (FDI) attacks

Researchers at Beijing Institute of Technology (BIT) have recently developed a new method to detect false data injection (FDI) attacks on critical infrastructure such as power grids. Their solution, outlined in a paper presented ...