Security news

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack

Hackers are demanding $6 million in bitcoin from the operator of the Seattle-Tacoma International Airport for documents they stole during a cyberattack last month and posted on the dark web this week, an airport official ...

Internet

Study finds that thousands of browser extensions compromise user data

Browser extensions, the software add-ons that help users customize and enhance their web browsers, are wildly popular. Some of the most-used extensions find shopping deals, fix grammar and typos, manage passwords, or translate ...

Business

Seeking help for crypto wallet problems on social media can attract scammers

The increasing popularity of cryptocurrencies has turned social media into a central place where users look for help when they have problems with their crypto wallet or private key. Scammers take advantage of this situation ...

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Security

Will congestion charging come with a privacy toll?

As New Zealand edges closer to adopting congestion charging in its busiest cities, University of Auckland researchers are highlighting a critical but often overlooked issue: privacy.

Security

Rural hospitals may be more vulnerable to ransomware attacks

Ransomware attacks in the health care sector have more than doubled in the past five years. Among providers, hospitals experience the highest rate of operational disturbances including restricted access to servers, disrupted ...

Consumer & Gadgets

How smart toys may be spying on kids: What parents need to know

Toniebox, Tiptoi, and Tamagotchi are smart toys, offering interactive play through software and internet access. However, many of these toys raise privacy concerns, and some even collect extensive behavioral data about children, ...

Security

Protecting connected, self-driving vehicles from hackers

Emerging self-driving vehicle networks that collaborate and communicate with each other or infrastructure to make decisions are vulnerable to data fabrication attacks, according to a University of Michigan-led study that ...

Consumer & Gadgets

Complicated app settings are a threat to user privacy

Default privacy settings in popular mobile apps seem like a convenience, allowing you to use a single setting to control the level of privacy—who can see which actions you take—across all of the app's functions. But default ...

Security

Finding security flaws in Android ahead of malicious hackers

EPFL researchers in computer and communication sciences are hacking and fixing Android phones before malicious hackers do. They uncovered 31 security critical bugs in the Android system, explored their risks and developed ...