Security news

Computer Sciences

Digital fingerprint: Cascading style sheets leaves users vulnerable to tracking

Processor type, IP address, browser in use, installed fonts—by collecting these and other characteristics of browser settings and the underlying operating system, it is possible to create a highly detailed and, in some ...

Business

Selling fear: Marketing for cybersecurity products often leaves consumers less secure

You have likely seen multiple ads for products and services designed to make you more secure online. When you turn on your television, see online ads, or even when you get in-app notifications, you are likely to encounter ...

Security

AI-driven gait analysis bridges health care and security fields

The analysis of a person's individual walking pattern, or gait, can reveal details about their identity and reflect differences between individuals, groups and even populations.

Computer Sciences

Fake credentials offer novel solution to e-voting challenges

As we come to the end of a year in which half the world's population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter ...

Security

Can we convince AI to answer harmful requests?

New research from EPFL demonstrates that even the most recent large language models (LLMs), despite undergoing safety training, remain vulnerable to simple input manipulations that can cause them to behave in unintended or ...

Consumer & Gadgets

Everyday routines as the key to logging in to smart homes

Smart homes are intended to make life easier, but logging into individual devices is often still an onerous task. Researchers from ETH Zurich have investigated how everyday routines could be used for secure and user-friendly ...

Security

50 countries warn UN of ransomware attacks on hospitals

The World Health Organization and some 50 countries issued a warning Friday at the United Nations about the rise of ransomware attacks against hospitals, with the United States specifically blaming Russia.

Internet

How common are fake profile pictures on Twitter?

Automated social media profiles are a powerful tool for spreading propaganda. They often feature AI-generated profile pictures. Researchers are currently looking into ways of identifying such images.

Computer Sciences

Researchers address quantum computing security challenges

Alongside artificial intelligence, quantum computing is one of the fastest-growing subsets in the high-performance computing community. But what happens when this relatively new and powerful computing method reaches the limit ...

Consumer & Gadgets

Health monitoring devices at risk of being hacked, study shows

Billions of people around the world are using internet-connected medical devices to monitor their health, but could be putting themselves at risk of hackers using their data for unhealthy reasons, according to a new cybersecurity ...

Security

Secure messaging through distributed messages

Most internet communications today rely on the TLS (Transport Layer Security) protocol, which protects against eavesdropping on the network, but not against access by service providers themselves. While end-to-end encryption ...

Computer Sciences

New algorithms increase the privacy of sensitive data

When you visit a doctor, information such as medication prescriptions, X-rays, and genetic tests is recorded to assist the physician. In these cases, a technology called federated learning, or collaborative learning, is used ...