'Good complexity' can make hospital networks more cybersecure
In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...
Sep 17, 2024
0
19
Global powers are grappling with 'responsible' use of military AI. What would that look like?
Last week, some 2,000 government officials and experts from around the world met for the REAIM (Responsible Artificial Intelligence in the Military Domain) summit in Seoul, South Korea. This was the second event of its kind, ...
Sep 17, 2024
0
22
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronics
A flexible screen inspired in part by squid can store and display encrypted images like a computer—using magnetic fields rather than electronics. The research is reported in Advanced Materials by University of Michigan ...
Sep 16, 2024
0
8
New tools use AI 'fingerprints' to detect altered photos, videos
As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...
Sep 12, 2024
0
33
Korean researchers develop AI CCTVs to detect, predict criminal activities
A Korean research team has succeeded in developing a technology that can detect and predict signs of criminal activities utilizing real-time CCTVs and AI technology. With this new technology, CCTV is now evolving beyond its ...
Sep 12, 2024
0
10
Hybrid optimization algorithm helps detect hidden messages in digital images
Research in the International Journal of Computational Science and Engineering describes a new approach to spotting messages hidden in digital images. The work contributes to the field of steganalysis, which plays a key role ...
Sep 12, 2024
0
0
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
As the world becomes increasingly connected, digital fraud has evolved from a local problem into a global one. West Africa, particularly Ghana and Nigeria, is witnessing the rise of "hustle kingdoms"—informal academies ...
Sep 12, 2024
0
0
Usable data hacked from air-gapped computer
A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...
Most Australian teens have a phone—but many are not keeping their identity and location secure
Most Australian teenagers have their own smartphone. According to a 2023 survey, 91% of young people between 14 and 17 owned a phone.
Sep 9, 2024
0
14
Researchers probe safety of AI in driverless cars, find vulnerabilities
Artificial intelligence is a key technology for self-driving vehicles. It is used for decision-making, sensing, predictive modeling and other tasks. But how vulnerable are these AI systems to an attack?
Sep 2, 2024
0
67
Five notorious cyberattacks that targeted governments
Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.
Sep 2, 2024
0
3
Professor highlights challenges in adopting blockchain for asset-backed securities
Mention "Asset-backed securities" (ABS) to certain finance professionals and investors, and the turmoil of the 2008 Financial Crisis immediately comes to mind. The causes of this generation's version of The Great Depression ...
Aug 30, 2024
0
15
What are 'click frauds'—and how can we stop them?
In the world of the internet, clicks are currency. The more people click on a website, social media post or an advertisement, the more that content generates revenue.
Aug 30, 2024
0
2
Large language models can help detect social media bots—but can also make the problem worse
An external study of Twitter in 2022 estimated that between a third and two thirds of accounts on the social media site were bots. And many of these automatons flooding social media are dispatched to sow political polarization, ...
Aug 28, 2024
0
16
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
As artificial intelligence (AI) becomes more powerful—even being used in warfare—there's an urgent need for governments, tech companies and international bodies to ensure it's safe. And a common thread in most agreements ...
Aug 28, 2024
0
1
Will congestion charging come with a privacy toll?
As New Zealand edges closer to adopting congestion charging in its busiest cities, University of Auckland researchers are highlighting a critical but often overlooked issue: privacy.
Aug 28, 2024
0
1
Rural hospitals may be more vulnerable to ransomware attacks
Ransomware attacks in the health care sector have more than doubled in the past five years. Among providers, hospitals experience the highest rate of operational disturbances including restricted access to servers, disrupted ...
Aug 28, 2024
0
1
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Cloud computing has emerged as a crucial element in today's technology, serving as the backbone for global connectivity. It empowers businesses, governments, and individuals to employ and construct cloud-based services and ...
Aug 26, 2024
0
2