Security news

Security

Standardized security playbooks can improve protection against cyberattacks

One attack, many responses—organizations use various solutions to ward off online attacks. The playbooks that outline countermeasures also vary in their specifics. In the CyberGuard project, Fraunhofer researchers are working ...

Business

What users need to know about privacy and data after 23andMe's bankruptcy filing

23andMe, one of the first companies to provide direct-to-consumer genetic testing kits, has filed for bankruptcy. Since its founding in 2006, it has sold over 12 million DNA kits, with high-profile users including Oprah Winfrey ...

Internet

One Tech Tip: Don't give your email to strangers, use a decoy address instead

You've heard of burner phones. What about burner email?

Security

Signal is not the place for top secret communications, but it might be the right choice for you

When top White House defense and national security leaders discussed plans for an attack on targets in Yemen over the messaging app Signal, it raised many questions about operational security and recordkeeping and national ...

Business

Signal app prized by activists central to Houthi chat uproar

The messaging app Signal that Trump administration officials used to discuss an attack on Yemen's Houthi rebels was created by a one-time anarchist to help activists, journalists and others communicate beyond the prying eyes ...

Consumer & Gadgets

Q&A: What happens to your data if 23andMe collapses?

A paper published in the New England Journal of Medicine calls for regulations to protect customers' personal and genetic data in light of biotech company 23andMe's uncertain future.

Security

Balancing various uncertainties in cyber threat intelligence

In 2020, cybersecurity company Mandiant's computer system was compromised by an intruder exploiting an innocuous crack: routine software updates pushed out by another company, SolarWinds. Mandiant was one of nearly 18,000 ...

Security

AI 'reshaping' organized crime, warns Europol

Artificial intelligence is turbocharging organized crime, from creating child sexual abuse images to money laundering via cryptocurrency, Europol warned Tuesday, with advances like quantum computing only poised to make things ...

Consumer & Gadgets

Security is just a side quest: Insights from the video game industry

The video game industry is a constantly changing market worth billions. In a qualitative interview study with industry experts, CISPA researcher Philip Klostermeyer from the team of CISPA Faculty Prof. Dr. Sascha Fahl investigated ...

Hardware

'Hot pixels' attack steals data through CPU readings

A team of security researchers at Georgia Tech, the University of Michigan and Ruhr University Bochum in Germany has reported a new form of side-channel attack that capitalizes on power and speed management methods used by ...

Security

Data dampens drug trade on the dark web

Taking down the drug trade with data. New research in the INFORMS journal Information Systems Research showcases the power of data and analytics in understanding how drug transactions on the dark web may be disrupted. The ...

Security

Can quantum computing protect AI from cyber attacks?

AI algorithms are everywhere. They underpin nearly all autonomous and robotic systems deployed in security applications. This includes facial recognition, biometrics, drones and autonomous vehicles used in combat surveillance ...

Security

Safe aid: Protecting privacy in humanitarian operations

EPFL researchers have worked with the International Committee of the Red Cross (ICRC) to develop a first of its kind, digital system to support humanitarian aid distribution. The design uses tokens to decentralize the storage ...

Security

Armenians hacked with Pegasus spyware during war: NGO

At least a dozen Armenian journalists, NGO workers and officials had their phones hacked with the notorious Pegasus spyware while the country fought with Azerbaijan, a rights group said Thursday.

Internet

DarkBERT learns language of the Dark Web

Two types of people thrive in the distant hidden recesses of the Dark Web. One type consists of the good guys: whistleblowers, freedom fighters, journalists, the intelligence community and law enforcement agencies, all generally ...

Security

New AI model aims to plug key gap in cybersecurity readiness

Imagine you're the new manager of a large apartment building and someone has stolen one of your keys—but you're not sure which one. Was it to a first-floor apartment? The mail room? Maybe it's a master key to all the units.