Security news

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Security

How did they get my data? I uncovered the hidden web of networks behind telemarketers

Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Security

AP news site hit by apparent denial-of-service attack

The Associated Press news website experienced an outage that appeared to be consistent with a denial-of-service attack, a federal criminal act that involves flooding a site with data in order to overwhelm it and knock it ...

Engineering

Monitoring nuclear weapons stockpiles with radio waves

An international research team has proposed a new method for monitoring nuclear disarmament treaties. The IT security experts developed a mechanism that uses radio waves to remotely monitor whether any changes are being made ...

Security

Accelerating AI tasks while preserving data security

With the proliferation of computationally intensive machine-learning applications, such as chatbots that perform real-time language translation, device manufacturers often incorporate specialized hardware components to rapidly ...

Internet

Your smart speaker data is used in ways you might not expect

Smart speakers offer amazing convenience—from playing your favorite tunes to re-ordering toilet paper—with only a simple voice command. But that convenience can come with a steep cost in privacy that many consumers aren't ...

Business

Most websites do not publish privacy policies, researchers say

Online privacy policies may not only be difficult to find but nonexistent, according to Penn State researchers who crawled millions of websites and found that only one-third of online organizations made their privacy policy ...

Security

Applying game theory on the front lines

The age-old game of strategy, often confined to chessboards and computer screens, is now being employed to tackle real-world threats against societies, economies and infrastructure, according to new University at Buffalo ...

Security

Sabotage tool takes on AI image scrapers

Artists who have stood by helplessly as their online works remained ripe for the picking without authorization by AI web scraping operations can finally fight back.