Security news

Software

New tool pinpoints security fixes in open-source software updates

Researchers have demonstrated a new tool that analyzes open-source software updates to specify which sections of code are being modified to address recently identified security vulnerabilities. The tool, called VFCFinder, ...

Security

Scientists uncover quantum-inspired vulnerabilities in neural networks

In a recent study merging the fields of quantum physics and computer science, Dr. Jun-Jie Zhang and Prof. Deyu Meng have explored the vulnerabilities of neural networks through the lens of the uncertainty principle in physics.

Software

Smartphone app can unmask forged documents

Researchers at ETH Zurich have developed a smartphone app that can be used to check the authenticity of documents and other items. Extracts from the debt enforcement register of the City of Zurich are being made forgery-proof ...

Security

Researchers say cybersecurity education varies widely in US

Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well-trained to meet industry needs ...

Security

Israel builds 'cyber dome' against Iran's hackers

Israel's Iron Dome defense system has long shielded it from incoming rockets. Now it is building a "cyber dome" to defend against online attacks, especially from arch foe Iran.

Security

13 years in US prison for Ukrainian REvil hacker

A Ukrainian man was sentenced to more than 13 years in prison in Texas on Wednesday for his role in ransomware attacks by the notorious Russia-based REvil hacking group, the US Justice Department said.

Computer Sciences

Computer scientists unveil novel attacks on cybersecurity

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use.

Security

DeFake tool protects voice recordings from cybercriminals

In what has become a familiar refrain when discussing artificial intelligence (AI)-enabled technologies, voice cloning makes possible beneficial advances in accessibility and creativity while also enabling increasingly sophisticated ...

Security

Colorado law protects brain data captured by gadgets

Colorado on Wednesday expanded its privacy law to include brain data gathered by the booming array of gadgets people use for feedback about sleep, fitness, sports, and lifestyle.

Security

Russian 'cyber sabotage' a global threat: Security firm

A cyber group with links to Russian military intelligence is set to become a significant global threat after playing an increasing critical role in the ongoing conflict in Ukraine, a leading cybersecurity firm warned Wednesday.