Security news

Security

Each year, landmines kill residents of war-torn countries. This innovative tool could save lives

As he grew up in Bogotá, Colombia, Mateo Dulce Rubio would hear a familiar news story every few days—someone had stepped on another landmine. The explosion had killed or injured them. Though the capital city was far from ...

Security

US seizes internet domains allegedly used by Russian hackers

The United States announced the seizure on Thursday of 41 internet domains allegedly used by Russian intelligence agents to try to gain access to the computers and email accounts of Pentagon, State Department and other US ...

Business

California enacts law to protect brain data

A new California law extends consumer privacy protection to brainwave data gathered by implants or wearable devices.

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Security

How a personality trait puts you at risk for cybercrime

Impulse online shopping, downloading music and compulsive email use are all signs of a certain personality trait that make you a target for malware attacks. New research from Michigan State University examines the behaviors—both ...

Security

Researchers discover computer chip vulnerabilities

A Washington State University research team has uncovered significant and previously unknown vulnerabilities in high-performance computer chips that could lead to failures in modern electronics.

Computer Sciences

The privacy risks of compiling mobility data

A new study by MIT researchers finds that the growing practice of compiling massive, anonymized datasets about people's movement patterns is a double-edged sword: While it can provide deep insights into human behavior for ...

Security

Electric vehicles send real-time data to Chinese government

When Shan Junhua bought his white Tesla Model X, he knew it was a fast, beautiful car. What he didn't know is that Tesla constantly sends information about the precise location of his car to the Chinese government.

Security

Chinese 'gait recognition' tech IDs people by how they walk

Chinese authorities have begun deploying a new surveillance tool: "gait recognition" software that uses people's body shapes and how they walk to identify them, even when their faces are hidden from cameras.

Security

New attacks on graphics processors endanger user privacy

Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer's graphics processing unit, or GPU, to spy on web activity, steal passwords, and break ...

Security

To fight email scammers, take a different view. Literally.

A team of researchers is helping law enforcement crack down on email scammers, thanks to a new visual analytics tool that dramatically speeds up forensic email investigations and highlights critical links within email data. ...