Security news

Security

Online surveys susceptible to automated bot fraud

Imagine you're filling out an online survey about the future of your city. You thoughtfully answer each question, adding your personal insights.

Internet

How secure is your Wi-Fi network? Research uncovers major vulnerability in wireless networking technology

We often take for granted just how ubiquitous Wi-Fi has become over the past two decades, explains Northeastern University electrical and computer engineering professor Francesco Restuccia, who is also a member of the Institute ...

Security

Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data

Japan on Wednesday linked more than 200 cyberattacks over the past five years targeting the country's national security and high technology data to a Chinese hacking group, MirrorFace, detailing their tactics and calling ...

Security

Weaponized disinformation can pose serious threat to urban transit systems

As every straphanger knows, public transit systems are fantastic—except when they aren't. A single station closure can ruin a commuter's morning, and even minor delays or disruptions can snowball into major problems as ...

Computer Sciences

Fake credentials offer novel solution to e-voting challenges

As we come to the end of a year in which half the world's population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter ...

Security

Can we convince AI to answer harmful requests?

New research from EPFL demonstrates that even the most recent large language models (LLMs), despite undergoing safety training, remain vulnerable to simple input manipulations that can cause them to behave in unintended or ...

Computer Sciences

Computer scientists unveil novel attacks on cybersecurity

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use.

Security

DeFake tool protects voice recordings from cybercriminals

In what has become a familiar refrain when discussing artificial intelligence (AI)-enabled technologies, voice cloning makes possible beneficial advances in accessibility and creativity while also enabling increasingly sophisticated ...

Security

Colorado law protects brain data captured by gadgets

Colorado on Wednesday expanded its privacy law to include brain data gathered by the booming array of gadgets people use for feedback about sleep, fitness, sports, and lifestyle.

Security

Russian 'cyber sabotage' a global threat: Security firm

A cyber group with links to Russian military intelligence is set to become a significant global threat after playing an increasing critical role in the ongoing conflict in Ukraine, a leading cybersecurity firm warned Wednesday.