Five cybersecurity tips to protect yourself from scams and deepfakes
In an age when misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Falling for a scam can have devastating social, financial, and personal consequences. ...
Dec 20, 2024
0
1
Can we convince AI to answer harmful requests?
New research from EPFL demonstrates that even the most recent large language models (LLMs), despite undergoing safety training, remain vulnerable to simple input manipulations that can cause them to behave in unintended or ...
Dec 19, 2024
0
16
Study: New method of privacy enhancement for AI-powered medical data
Artificial intelligence has the potential to improve doctors' ability to diagnose and treat sleep apnea. But the technology is not widely adopted due to fears that it does not safeguard patient data.
Dec 19, 2024
0
17
The federal government wants you to adopt 'end-to-end encryption' methods. Here's why you should adopt them
After revealing that it was the target of a sweeping hacking campaign, the federal government issued a public service announcement this week urging the public to use "end-to-end encryption" in order to better secure its digital ...
Dec 19, 2024
0
1
Expert warns of increasing drone swarms and the need for faster detection
Federal authorities have provided new details in the case of "the mysterious drones" spotted around the northeastern U.S.
Dec 19, 2024
0
8
UK study: Older adults less likely to experience cybercrime than younger adults—but it's more financially devastating
Adults aged 75 and older are more likely to repeatedly experience cybercrime and related financial loss, according to research published December 18, 2024, in the open-access journal PLOS ONE by Benjamin Havers from University ...
Dec 18, 2024
0
0
How can you stay safe from cyber attacks? Here are two simple checklists from experts
"Cyber security" may sound like a far-off worry for big corporations or telcos, but that's far from the case. Cyber security simply means the practice of safeguarding your sensitive data from unauthorized access, theft and ...
Dec 17, 2024
0
16
What's behind the surge in mysterious drone sightings over New Jersey, Massachusetts and other states?
A month after mysterious drones were first reported over New Jersey, authorities are still trying to determine where they are coming from as sightings increase in frequency and spread into neighboring states.
Dec 16, 2024
0
2
Beyond checking a box: How a social license can help communities benefit from data reuse and AI
The original excitement about the influence of artificial intelligence (AI) on developed countries is shifting toward how AI might influence developing nations. The Economist recently ran a cover story extolling the potential ...
Dec 16, 2024
0
1
Study reveals vulnerability of metaverse platforms to cyber attacks
Having access to virtual worlds from your home computer via your web browser and being able to interact with others in a secure and private manner: that is the promise of metaverse platforms.
Dec 13, 2024
0
18
Stealing AI models: New technique enables theft without hacking into a device
Researchers have demonstrated the ability to steal an artificial intelligence (AI) model without hacking into the device where the model was running. The technique is novel in that it works even when the thief has no prior ...
Dec 12, 2024
0
46
Cybersecurity 'insider threats' fall into seven categories, says researcher
Are you a fallible frog or a misbehaving magpie? Perhaps you feel more like a disempowered marionette? When it comes to the 'insider threat' posed to an organization's cybersecurity, every employee falls into one of seven ...
Dec 12, 2024
0
0
One Tech Tip: How to protect your communications through encryption
After a sprawling hacking campaign exposed the communications of an unknown number of Americans, U.S. cybersecurity officials are advising people to use encryption in their communications.
Dec 12, 2024
0
0
'BadRAM' exploit: Security flaw in computer memory leads to worldwide fixes
Cyber security experts studying memory modules in computers have uncovered a key weakness that has led to worldwide security fixes in AMD computer processors.
Dec 11, 2024
0
36
Smart TVs collect viewing data even when used as external screens, according to research
A team from Universidad Carlos III de Madrid (UC3M), in collaboration with University College London (England) and the University of California, Davis (U.S.), has found that smart TVs send viewing data to their servers. This ...
Dec 10, 2024
0
22
From bean counters to cyber sleuths: How accountants are a front-line defense against online crime
Once considered to be simply "bean counters," accountants now play an important role in the defense, investigation and protection against cybercrime.
Dec 10, 2024
0
0
Police 'need to play a larger role' in recovering cybercrime money
The study also recommends that, as a priority, Police Scotland should make clear to communities that it can be relied upon in cases of economic cybercrime.
Dec 10, 2024
0
0
US offers $10 mn reward for wanted Chinese hacker
The United States offered a $10 million reward on Tuesday for information leading to the arrest of a Chinese man and co-conspirators wanted for hacking computer firewalls.
Dec 10, 2024
0
0