Security news

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Security

How did they get my data? I uncovered the hidden web of networks behind telemarketers

Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Internet

New research puts your online privacy preferences to the test

When it comes to privacy, you've probably heard some say they "don't care about privacy if there's nothing to hide." Typically, someone who says this is not taking into account that you may have strong beliefs on the very ...

Security

Navigating data privacy in a post-Roe world

The end of Roe v. Wade—a woman's constitutional right to an abortion—has led some digital privacy experts, including Stanford's Riana Pfefferkorn, to ask what could happen to women seeking reproductive healthcare in a ...

Computer Sciences

New computing architecture protects sensitive private data

As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for computing architectures. Applications that process ...

Computer Sciences

Beating hackers at bug hunting

An innovative new collaboration between EPFL's HexHive Laboratory and Oracle has developed automated, far-reaching technology in the ongoing battle between IT security managers and attackers, hoping to find bugs before the ...

Security

Log4j software flaw 'endemic,' new cyber safety panel says

A computer vulnerability discovered last year in a ubiquitous piece of software is an "endemic" problem that will pose security risks for potentially a decade or more, according to a new cybersecurity panel created by President ...

Consumer & Gadgets

Rolling privacy into collaborative tools for online working

The rise in online working and collaboration wrought by the ongoing COVID-19 pandemic that started in 2020 continues apace. In parallel we see a rise in security issues surrounding the enabling technologies. A team from India ...

Internet

Safer web surfing with a new method for detecting malicious modes

With the ever-increasing importance of the Internet in our lives, there are growing attempts to exploit software vulnerabilities in our PCs for personal benefit. One way to do so is by infecting the victim's PC with a malicious ...

Consumer & Gadgets

How daycare apps can spy on parents and children

Daycare apps are designed to make everyday life in daycare centers easier. Parents can use them, for example, to access reports on their children's development and to communicate with teachers. However, some of these applications ...

Computer Sciences

The future of encryption

Whenever you visit a website, send an email, or do your online banking in the future, in many cases algorithms developed with the participation of researchers at the Max Planck Institute for Security and Privacy in Bochum ...