Korean researchers develop AI CCTVs to detect, predict criminal activities
A Korean research team has succeeded in developing a technology that can detect and predict signs of criminal activities utilizing real-time CCTVs and AI technology. With this new technology, CCTV is now evolving beyond its ...
Sep 12, 2024
0
10
Hybrid optimization algorithm helps detect hidden messages in digital images
Research in the International Journal of Computational Science and Engineering describes a new approach to spotting messages hidden in digital images. The work contributes to the field of steganalysis, which plays a key role ...
Sep 12, 2024
0
0
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
As the world becomes increasingly connected, digital fraud has evolved from a local problem into a global one. West Africa, particularly Ghana and Nigeria, is witnessing the rise of "hustle kingdoms"—informal academies ...
Sep 12, 2024
0
0
Usable data hacked from air-gapped computer
A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...
Most Australian teens have a phone—but many are not keeping their identity and location secure
Most Australian teenagers have their own smartphone. According to a 2023 survey, 91% of young people between 14 and 17 owned a phone.
Sep 9, 2024
0
14
Researchers probe safety of AI in driverless cars, find vulnerabilities
Artificial intelligence is a key technology for self-driving vehicles. It is used for decision-making, sensing, predictive modeling and other tasks. But how vulnerable are these AI systems to an attack?
Sep 2, 2024
0
67
Five notorious cyberattacks that targeted governments
Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.
Sep 2, 2024
0
3
Professor highlights challenges in adopting blockchain for asset-backed securities
Mention "Asset-backed securities" (ABS) to certain finance professionals and investors, and the turmoil of the 2008 Financial Crisis immediately comes to mind. The causes of this generation's version of The Great Depression ...
Aug 30, 2024
0
15
What are 'click frauds'—and how can we stop them?
In the world of the internet, clicks are currency. The more people click on a website, social media post or an advertisement, the more that content generates revenue.
Aug 30, 2024
0
2
Large language models can help detect social media bots—but can also make the problem worse
An external study of Twitter in 2022 estimated that between a third and two thirds of accounts on the social media site were bots. And many of these automatons flooding social media are dispatched to sow political polarization, ...
Aug 28, 2024
0
16
Human oversight of AI systems may not be as effective as we think—especially when it comes to warfare
As artificial intelligence (AI) becomes more powerful—even being used in warfare—there's an urgent need for governments, tech companies and international bodies to ensure it's safe. And a common thread in most agreements ...
Aug 28, 2024
0
1
Will congestion charging come with a privacy toll?
As New Zealand edges closer to adopting congestion charging in its busiest cities, University of Auckland researchers are highlighting a critical but often overlooked issue: privacy.
Aug 28, 2024
0
1
Rural hospitals may be more vulnerable to ransomware attacks
Ransomware attacks in the health care sector have more than doubled in the past five years. Among providers, hospitals experience the highest rate of operational disturbances including restricted access to servers, disrupted ...
Aug 28, 2024
0
1
Using 'chaos engineering' to make cloud computing less vulnerable to cyber attacks
Cloud computing has emerged as a crucial element in today's technology, serving as the backbone for global connectivity. It empowers businesses, governments, and individuals to employ and construct cloud-based services and ...
Aug 26, 2024
0
2
How smart toys may be spying on kids: What parents need to know
Toniebox, Tiptoi, and Tamagotchi are smart toys, offering interactive play through software and internet access. However, many of these toys raise privacy concerns, and some even collect extensive behavioral data about children, ...
Aug 26, 2024
0
13
Boosting online safety through behavioral nudges: Delay, remind, and secure
In the face of rising cybersecurity threats, many internet users continue to neglect essential security actions, such as installing updates or changing compromised passwords. A new study led by Prof. Eyal Pe'er from the Federmann ...
Aug 26, 2024
0
1
Space militarization could pose a challenge to global security, argues researcher
In May 2024, Russia launched a satellite that some observers believe is a weapon system that could allow the targeted destruction of other satellites in orbit.
Aug 26, 2024
0
5
French police have arrested the founder of Telegram—what happens next could change the course of big tech
When Pavel Durov arrived in France on his private jet last Saturday, he was greeted by police who promptly arrested him. As the founder of the direct messaging platform Telegram, he was accused of facilitating the widespread ...
Aug 26, 2024
0
33