Security news

Security

Each year, landmines kill residents of war-torn countries. This innovative tool could save lives

As he grew up in Bogotá, Colombia, Mateo Dulce Rubio would hear a familiar news story every few days—someone had stepped on another landmine. The explosion had killed or injured them. Though the capital city was far from ...

Security

US seizes internet domains allegedly used by Russian hackers

The United States announced the seizure on Thursday of 41 internet domains allegedly used by Russian intelligence agents to try to gain access to the computers and email accounts of Pentagon, State Department and other US ...

Business

California enacts law to protect brain data

A new California law extends consumer privacy protection to brainwave data gathered by implants or wearable devices.

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Security

Goodbye, login. Hello, heart scan.

Forget fingerprint computer identification or retinal scanning. A University at Buffalo-led team has developed a computer security system using the dimensions of your heart as your identifier.

Security

Apache vulnerability is reported

(Tech Xplore)—The Fuzzing Project blog this week carried a report we really do not like to hear but must know about regardless. Another "bleed" has been discovered. A bug in the Apache Web Server may result in contents ...

Software

Privacy streams helps developers create privacy friendly apps

A smartphone app that uses the raw feed from the device's microphone or accesses its contact list can raise red flags for a user concerned about privacy. In many cases, however, the app doesn't need all the details that users ...

Security

Choose better passwords with the help of science

For years, computer users have been told they should have complicated passwords, including numbers, punctuation marks and other symbols, and upper- and lowercase letters. Despite those being hard to remember, people were ...

Security

Tricking the eye to defeat shoulder surfing attacks

Every ATM or smartphone user can attest to the discomfort of having a stranger standing close enough to observe a financial transaction—and potentially note a PIN or account number. Now researchers at the NYU Tandon School ...

Security

Blockchain making houses safer

Blockchain technology developed to guarantee the value of cryptocurrencies such as Bitcoin and Ethereum is now being adopted by engineers as a way to fight off the risk of a hacker breaking into the connected appliances of ...

Security

Tracing the sources of today's Russian cyberthreat

Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military personnel probing weaknesses in corporate, national and even ...

Security

USB connections make snooping easy

USB connections, the most common interface used globally to connect external devices to computers, are vulnerable to information leakage, making them even less secure than has been thought, Australian research shows.