Security news

Security

Scam centers in southeast Asia are on the rise despite crackdowns to root out the illegal industry

It often starts with a text message asking if you are available on weekends, looking for a part-time job or you get a simple "hello" from an unknown number. Halfway across the world, a laborer is usually pulling in 12-16 ...

Energy & Green Tech

Nature's resilience inspires an improved power grid

Natural ecosystems made up of plants, animals and microorganisms face constant challenges from natural hazards, like extreme weather or invasive species.

Security

Lay intuition as effective at jailbreaking AI chatbots as technical methods, research suggests

It doesn't take technical expertise to work around the built-in guardrails of artificial intelligence (AI) chatbots like ChatGPT and Gemini, which are intended to ensure that the chatbots operate within a set of legal and ...

Telecom

Researchers uncover critical security flaws in global mobile networks

In an era when recent cyberattacks on major telecommunications providers have highlighted the fragility of mobile security, researchers at the Korea Advanced Institute of Science and Technology have identified a class of ...

Software

To fight cybercrime, student unravels the layers of 3D printing

To most people, a 3D printer is a cool piece of technology that can make toys, tools or parts in minutes. But for Hala Ali, it can be a partner in crime, and the doctoral student at Virginia Commonwealth University earned ...

Consumer & Gadgets

How blind and low-vision users manage their passwords

Passwords remain the go-to authentication tool in everyday life, says CISPA researcher Alexander Ponticello. At the same time, passwords are often a security weak spot: too short, too simple, and reused far too often. Blind ...

Security

Q&A: Can the tech behind crypto help align AI with human values?

As people increasingly use artificial intelligence (AI) in various areas of life to either save time or improve performance, the influence of AI systems grows—as does the risk of untrustworthy results in high-stakes decision-making, ...

Computer Sciences

Anonymity's ARX nemesis

A team of faculty and students from George Mason University recently discovered a vulnerability in a widely used anonymization tool. They presented their findings last week in Taiwan at the Association for Computing Machinery ...

Consumer & Gadgets

New study uncovers data protection gaps in popular mHealth apps

Researchers at the University of Bremen have uncovered significant discrepancies between the data protection claims and the actual behavior of mobile health applications (mHealth apps). Many apps transmit personal data before ...

Security

Robotaxis keep riders safe, but what about their data?

A robotaxi pulls up to the curb in Los Angeles. The front seat is empty, no driver in sight. The customer slides into the back seat, and off the ride goes to a destination typed into the app, its cameras and sensors silently ...

Security

A RADIANT future for cybersecurity

Stealth cyber-attacks against power grids, water systems and other critical infrastructure often go undetected until it is too late. Led by Dr. Irfan Khan, researchers from the Clean and Resilient Energy Systems (CARES) Laboratory ...

Hardware

Vulnerability in confidential cloud environments uncovered

Some data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now found a vulnerability ...