Security news

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Security

How did they get my data? I uncovered the hidden web of networks behind telemarketers

Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Security

To steal today's computerized cars, thieves go high-tech

These days, cars are computer centers on wheels. Today's vehicles can contain over 100 computers and millions of lines of software code. These computers are all networked together and can operate all aspects of your vehicle.

Security

Q&A: Team approach to cybersecurity keeps scammers from winning

The next time you're on an office scavenger hunt or trying to find your way out of an escape room with your co-workers, just remember that every second of shared experience helps tighten cybersecurity within your organization.

Security

A new message encryption scheme inspired by the Sudoku puzzle

A novel advance in data security is discussed in the International Journal of Information and Computer Security in which the Japanese puzzle known as Sudoku promises a cryptographic system for text information that works ...

Consumer & Gadgets

Government report on smart devices enabling domestic violence

The U.K. government's report this week into how smart technology and connected devices are increasingly facilitating domestic abuse was underpinned by evidence submitted by academics in the REPHRAIN research center, including ...

Security

White House offers prize money for hacker-thwarting AI

The White House on Wednesday launched a competition offering millions of dollars in prize money for creating new artificial intelligence systems that can defend critical software from hackers.

Security

How randomized data can improve our security

Huge streams of data pass through our computers and smartphones every day. In simple terms, technical devices contain two essential units to process this data: A processor, which is a kind of control center, and a RAM, comparable ...

Telecom

A new weapon in the war on robocalls

The latest weapon in the war on robocalls is an automated system capable of analyzing the content of these unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being perpetuated by robocalls. ...

Telecom

Field campaign assesses vulnerabilities of 5G networks

Fifth-generation, or 5G, mobile network technology is all the hype these days. Compared to 4G, this newest way of connecting wireless devices to cellular networks is designed to provide higher data rates, ultralow latency, ...

Security

China drafts rules for using facial recognition data

Firms using facial recognition in China will be required to obtain consent or legal permission before collecting personal information, draft regulations released Tuesday said, while stipulating the rules would not apply to ...