Security news

Security

Each year, landmines kill residents of war-torn countries. This innovative tool could save lives

As he grew up in Bogotá, Colombia, Mateo Dulce Rubio would hear a familiar news story every few days—someone had stepped on another landmine. The explosion had killed or injured them. Though the capital city was far from ...

Security

US seizes internet domains allegedly used by Russian hackers

The United States announced the seizure on Thursday of 41 internet domains allegedly used by Russian intelligence agents to try to gain access to the computers and email accounts of Pentagon, State Department and other US ...

Business

California enacts law to protect brain data

A new California law extends consumer privacy protection to brainwave data gathered by implants or wearable devices.

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Security

The long history, and short future, of the password

In Western history, the concept of the password can be traced as far back as the so-called "shibboleth incident" in the 12th chapter of the biblical Book of Judges. In the chaos of battle between the tribes of Gilead and ...

Security

A more secure biometric authentication system

EPFL's Security and Cryptography Laboratory joined forces with startup Global ID to develop an encryption technique for processing biometric data captured via 3-D finger vein recognition – a system that's next to impossible ...

Security

The next cyberattack could come from sound waves

You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from "side-channel" attacks, where an intruder can bypass ...

Security

The age of hacking brings a return to the physical key

With all the news about Yahoo accounts being hacked and other breaches of digital security, it's easy to wonder if there's any real way to keep unauthorized users out of our email and social media accounts.

Security

How companies can stay ahead of the cybersecurity curve

If you're like me, on a given day you interact with a whole range of connected technologies for work and play. Just today, I used Box to share and download files for work, called up Tile to find my keys, relied on Google ...

Security

Tor upgrades to make anonymous publishing safer

In the coming months, the Seattle-based nonprofit The Tor Project will be making some changes to improve how the Tor network protects users' privacy and security. The free network lets users browse the internet anonymously. ...

Security

Phishing scams are becoming ever more sophisticated

Companies are bombarded with phishing scams every day. In a recent survey of more than 500 cyber security professionals across the world, 76% reported that their organisation fell victim to a phishing attack in 2016.

Security

How governments and companies can prevent the next insider attack

Now that they are in office, President Donald Trump and his team must protect the nation from many threats – including from insiders. Insider threats could take many forms, such as the next Edward Snowden, who leaked hundreds ...