Security news

Telecom

New 'negative light' technology hides data transfers in plain sight

Engineers at UNSW Sydney and Monash have developed an innovative way of sending hidden information that's hard to intercept. Using a phenomenon known as "negative luminescence," the system works by making signals blend perfectly ...

Security

AI fake-news detectors may look accurate but fail in real use, study finds

A dubious link from a friend. A headline too sensational to be true. A video that seems fake but you can't be sure. As online misinformation grows harder to detect, new artificial-intelligence tools promise to help us separate ...

Security

Deepfake songs are exploding, but a new tool shuts them down

Artificial intelligence models can now clone a voice with just a few seconds of audio, fueling a surge of deepfake songs online and creating a growing crisis for musicians who don't want their voices hijacked. Beyond the ...

Security

From Anthropic to Iran: Who sets the limits on AI's use in war and surveillance?

Anthropic, a leading AI company, recently refused to sign a Pentagon contract that would allow the United States military "unrestricted access" to its technology for "all lawful purposes." To sign, Anthropic CEO Dario Amodei ...

Security

AI often escalates to nuclear action in war games

There are some things perhaps we might not want artificial intelligence to handle, at least for the time being. When leading chatbots were put through war-game simulations, they opted for nuclear signaling or escalation in ...

Security

AI education could be crucial in tackling rising voice scams

A new study from Abertay University reveals that the most effective way to protect people from AI voice scams is not through traditional warning messages, but by educating them about how advanced and authentic AI voices have ...

Security

Your car's tire sensors could be used to track you

Researchers at IMDEA Networks Institute, together with European partners, have found that tire pressure sensors in modern cars can unintentionally expose drivers to tracking. Over a ten-week study, they collected signals ...

Consumer & Gadgets

Ensuring smartphones have not been tampered with

With increasing cyberattacks and government data breaches, one of the most important devices to keep secure is the one in everyone's pocket: smartphones. The problem is that it is difficult to check that a smartphone has ...

Consumer & Gadgets

People are overconfident about spotting AI faces, study finds

Most people believe they can spot AI-generated faces, but that confidence is out of date, research from UNSW Sydney and the Australian National University (ANU) has demonstrated. With AI-generated faces now almost impossible ...

Internet

Cyberattacks can trigger societal crises, scientists warn

Cyberattacks can wreak havoc on the systems they target, yet their impact often spreads far beyond technical failures, potentially triggering crises that engulf entire communities, a new study argues.

Security

Ransomware: What it is and why it's your problem

Ransomware is a type of malicious software that makes a victim's data, system or device inaccessible. It locks the target or encrypts it (converting text into an unreadable form) until the victim pays a ransom to the attacker.

Security

Forensic system cuts IoT attack analysis time by three-quarters

A new forensic framework designed specifically for the Internet of Things (IoT) is discussed in the International Journal of Electronic Security and Digital Forensics. This deep learning-driven system offers benefits over ...

Computer Sciences

'Rosetta stone' for database inputs reveals serious security issue

The data inputs that enable modern search and recommendation systems were thought to be secure, but an algorithm developed by Cornell Tech researchers successfully teased out names, medical diagnoses and financial information ...

Security

What can technology do to stop AI-generated sexualized images?

The global outcry over the sexualization and nudification of photographs—including of children—by Grok, the chatbot developed by Elon Musk's artificial intelligence company xAI, has led to urgent discussions about how ...

Security

What does cybersecurity look like in the quantum age?

Quantum computers promise unprecedented computing speed and power that will advance both business and science. These same qualities also make them a prime target for malicious hackers, according to Swaroop Ghosh, professor ...

Security

N. Zealand health hackers seek cash and 'good reputation'

Hackers claiming to have accessed more than 100,000 people's health records in New Zealand have reportedly extended a ransom deadline until Friday, after saying they want to build a "good reputation."

Security

Deepfakes leveled up in 2025—here's what's coming next

Over the course of 2025, deepfakes improved dramatically. AI-generated faces, voices and full-body performances that mimic real people increased in quality far beyond what even many experts expected would be the case just ...