Security news

Security

Making AI safer for victims of intimate partner violence

Conversational AI tools denied blunt requests for harmful content by researchers posing as intimate partner abusers, but these guardrails were easily circumvented when they requested the content under false pretenses, a new ...

Security

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

From an advertisement for an herbal remedy that promises to cure all to a video featuring a voice that sounds just like a movie star, you've surely encountered spam and scam advertisements online. And they have likely been ...

Security

Does 'federated unlearning' in AI improve data privacy, or create a new cybersecurity risk?

As the capacity of artificial intelligence (AI) increases at an exponential rate, so do concerns about the privacy of user data.

Security

Fake QR codes make for easy scams—be careful what you scan out there

It's a simple thing we encounter many times every single week—often while in a hurry. You pull up at a parking spot, scan a QR code and pay within seconds. Or you sit down at a cafe, scan a code to view the menu and order ...

Software

New software safeguards research participants' privacy

Which details in a de-identified scientific record are enough to still identify a person? If, for example, the record includes that a person is a CEO, the abundance of CEOs in the world would make identification nearly impossible. ...

Security

AI blueprints can be stolen with a single small antenna

From smartphone facial recognition to autonomous vehicles, artificial intelligence (AI) has long been protected as a black box. However, a joint research team from KAIST and international institutions has uncovered a new ...

Hi Tech & Innovation

Vibrations in your skull may be your next password

A team led by Rutgers University researchers has developed a security system that could change how people log in to virtual and augmented reality platforms by eliminating passwords, personal identification numbers and eye ...

Security

Photon framework scales AI vulnerability discovery

Oak Ridge National Laboratory's Center for Artificial Intelligence Security Research (CAISER) is shining a light on AI vulnerabilities. While AI models offer tremendous economic, humanitarian and national security potential, ...

Security

AI making cyber attacks costlier and more effective: Munich Re

Artificial intelligence is making cyberattacks increasingly sophisticated and costlier for businesses, reinsurer Munich Re said Wednesday, warning of methods ranging from highly personalized phishing emails to computer-generated, ...

Security

Risk highlighted as Chinese hackers hit Microsoft

Software giant Microsoft is at the center of cybersecurity storm after China-linked hackers exploited flaws in SharePoint servers to target hundreds of organizations.

Security

Two-factor authentication just got easier

A new, simpler version of two-factor authentication could broaden its protection to many smart devices that currently cannot support it.

Security

Watermarks offer no defense against deepfakes, study suggests

New research from the University of Waterloo's Cybersecurity and Privacy Institute demonstrates that any artificial intelligence (AI) image watermark can be removed, without the attacker needing to know the design of the ...

Business

Chinese state hackers targeting Microsoft customers

Chinese state-sponsored hackers are actively exploiting critical security vulnerabilities in users of Microsoft's popular SharePoint servers to steal sensitive data and deploy malicious code, the US tech giant warned Tuesday.

Security

Singapore military helps battle cyberattack: minister

Units in Singapore's military have been called in to help combat a cyberattack against critical infrastructure, the country's defense minister said Saturday—a hack attempt attributed to an espionage group experts have linked ...

Security

The tap trap: Android security vulnerability discovered

What we see on our mobile phone screens is not always what we are actually operating. This has been demonstrated by a research team at TU Wien (Vienna, Austria), consisting of Philipp Beer, Sebastian Roth, Marco Squarcina, ...