Security news

Security

Standardized security playbooks can improve protection against cyberattacks

One attack, many responses—organizations use various solutions to ward off online attacks. The playbooks that outline countermeasures also vary in their specifics. In the CyberGuard project, Fraunhofer researchers are working ...

Business

What users need to know about privacy and data after 23andMe's bankruptcy filing

23andMe, one of the first companies to provide direct-to-consumer genetic testing kits, has filed for bankruptcy. Since its founding in 2006, it has sold over 12 million DNA kits, with high-profile users including Oprah Winfrey ...

Internet

One Tech Tip: Don't give your email to strangers, use a decoy address instead

You've heard of burner phones. What about burner email?

Security

Signal is not the place for top secret communications, but it might be the right choice for you

When top White House defense and national security leaders discussed plans for an attack on targets in Yemen over the messaging app Signal, it raised many questions about operational security and recordkeeping and national ...

Business

Signal app prized by activists central to Houthi chat uproar

The messaging app Signal that Trump administration officials used to discuss an attack on Yemen's Houthi rebels was created by a one-time anarchist to help activists, journalists and others communicate beyond the prying eyes ...

Consumer & Gadgets

Q&A: What happens to your data if 23andMe collapses?

A paper published in the New England Journal of Medicine calls for regulations to protect customers' personal and genetic data in light of biotech company 23andMe's uncertain future.

Security

Balancing various uncertainties in cyber threat intelligence

In 2020, cybersecurity company Mandiant's computer system was compromised by an intruder exploiting an innocuous crack: routine software updates pushed out by another company, SolarWinds. Mandiant was one of nearly 18,000 ...

Security

AI 'reshaping' organized crime, warns Europol

Artificial intelligence is turbocharging organized crime, from creating child sexual abuse images to money laundering via cryptocurrency, Europol warned Tuesday, with advances like quantum computing only poised to make things ...

Consumer & Gadgets

Security is just a side quest: Insights from the video game industry

The video game industry is a constantly changing market worth billions. In a qualitative interview study with industry experts, CISPA researcher Philip Klostermeyer from the team of CISPA Faculty Prof. Dr. Sascha Fahl investigated ...

Security

China drafts rules for using facial recognition data

Firms using facial recognition in China will be required to obtain consent or legal permission before collecting personal information, draft regulations released Tuesday said, while stipulating the rules would not apply to ...

Electronics & Semiconductors

Smart devices: Putting a premium on peace of mind

Two out of five homes worldwide have at least one smart device that is vulnerable to cyber-attacks. Soon, that new smart TV or robot vacuum you've been considering for your home will come with a label that helps you gauge ...

Security

Researcher explores effect of hospital mergers on data breaches

The period during and after hospital mergers and acquisitions is an especially vulnerable time for patient data when the chance of a cybersecurity breach more than doubles, according to research by a University of Texas at ...

Computer Sciences

Community-based app for managing mobile privacy and security

Mamtaj Akter, a Vanderbilt computer science graduate student in the lab of Pamela Wisniewski, Flowers Family Fellow in Engineering and associate professor of computer science, has co-authored a study evaluating how technology ...

Security

Using AI to protect against AI image manipulation

As we enter a new era where technologies powered by artificial intelligence can craft and manipulate images with a precision that blurs the line between reality and fabrication, the specter of misuse looms large.

Security

Researchers discover new vulnerability in large language models

Large language models (LLMs) use deep-learning techniques to process and generate human-like text. The models train on vast amounts of data from books, articles, websites and other sources to generate responses, translate ...

Engineering

Making smart city infrastructure watertight in Vietnam

Research in the International Journal of Critical Infrastructures offers guidance on securing water critical infrastructures and reaffirms the urgency of protecting environment monitoring technologies as cities evolve into ...

Consumer & Gadgets

Why computer security advice is more confusing than it should be

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would ...