Security news

Internet

Web search formulas offer a first step for protecting critical infrastructure

The technology behind web search engines is useful for more than tracking down your long-lost buddy or discovering a delicious new recipe. Technology based on search engine algorithms might also help keep the lights on, the ...

Security

AI 'reshaping' organized crime, warns Europol

Artificial intelligence is turbocharging organized crime, from creating child sexual abuse images to money laundering via cryptocurrency, Europol warned Tuesday, with advances like quantum computing only poised to make things ...

Consumer & Gadgets

Security is just a side quest: Insights from the video game industry

The video game industry is a constantly changing market worth billions. In a qualitative interview study with industry experts, CISPA researcher Philip Klostermeyer from the team of CISPA Faculty Prof. Dr. Sascha Fahl investigated ...

Engineering

Developing an ontology for smart city infrastructure threats, cybercrime and digital investigation

With technological advancements and a growing awareness about the United Nations (UN) Sustainable Development Goals (SDGs), interconnected systems within cities that capture real-time data indicators reflecting chosen SDGs ...

Security

Report warns of 'cyberwashing' in digital security claims

A new Monash University report highlights the growing problem of organizations resorting to "cyberwashing" to mislead the public about their data privacy practices and recommends measures to build a genuine culture of cybersecurity.

Internet

Russian disinformation 'infects' AI chatbots, researchers warn

A sprawling Russian disinformation network is manipulating Western AI chatbots to spew pro-Kremlin propaganda, researchers say, at a time when the United States is reported to have paused its cyber operations against Moscow.

Security

New AI defense method shields models from adversarial attacks

Neural networks, a type of artificial intelligence modeled on the connectivity of the human brain, are driving critical breakthroughs across a wide range of scientific domains. But these models face significant threat from ...

Business

Employee well-being as a strategy for responsible cybersecurity

New research led by Lancaster University into "responsible" cybersecurity suggests the well-being of those in cybersecurity roles should be a key consideration for firms' security strategies due to the level of burn out among ...

Consumer & Gadgets

Balancing security and usability in mobile applications

Mobile applications have become a ubiquitous part of daily life for millions of people. They have transformed the way in which we communicate, share information, do business, entertain ourselves, and manage many aspects of ...

Security

Study: Customized GPT has security vulnerability

One month after OpenAI unveiled a program that allows users to easily create their own customized ChatGPT programs, a research team at Northwestern University is warning of a "significant security vulnerability" that could ...

Security

Study shows challenges to protecting privacy of library users

Librarians have historically taken a strong stand on protecting the privacy of their patrons. But how well they accomplish this varies widely with the size of a library, and technology has made it more difficult, according ...

Business

Saddling up cryptosystems for a quantum showdown

A lone ranger riding off into the sunset might say something sage and vague, such as "a man is only as good as his word." But these gritty prophets never said anything about verifying a man's—or anyone else's—word in ...

Security

Trick prompts ChatGPT to leak private data

While OpenAI's first words on its company website refer to a "safe and beneficial AI," it turns out your personal data is not as safe as you believed. Google researchers announced this week that they could trick ChatGPT into ...

Software

Boosting faith in the authenticity of open source software

Open source software—software that is freely distributed, along with its source code, so that copies, additions, or modifications can be readily made —is "everywhere," to quote the 2023 Open Source Security and Risk Analysis ...