Security news

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Security

How did they get my data? I uncovered the hidden web of networks behind telemarketers

Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Hardware

Radio waves for the detection of hardware tampering

As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data from a card reader. Researchers ...

Security

Securing systems from cyber-physical system hackers

When it comes to computer security, there are three main objectives: confidentiality—ensuring no one can steal your data; integrity—ensuring that your data has not been changed in any unauthorized way; and availability—making ...

Internet

An approach for detecting LDoS attacks based on cloud model

Cybersecurity has always been a focus of Internet research. An LDoS attack is an intelligent type of DoS attack, which reduces the quality of network service by periodically sending high-speed but short-pulse attack traffic. ...

Security

Costa Rica public health system targeted by ransomware

Another attempted hacking of a Costa Rican government agency's computer system led the country's public health agency to shut down its systems Tuesday to protect itself, complicating the medical care of thousands of people.

Internet

Peekaboo! Here's a system to guarantee smart home privacy

Many internet-connected devices—let's use smart speakers as an example—share data to the cloud when you interact with them. How do you know your speaker isn't always listening? How do you know it's not sharing more information ...

Computer Sciences

How randomly moving electrons can improve cyber security

In October 2017, tech giant Yahoo! disclosed a data breach that had leaked sensitive information of over 3 billion user accounts, exposing them to identity theft. The company had to force all affected users to change passwords ...

Robotics

Efforts to deliver the first drone-based, mobile quantum network

Hacked bank and Twitter accounts, malicious power outages and attempts to tamper with medical records threaten the security of the nation's health, money, energy, society and infrastructure. Harnessing the laws of nature—namely ...

Business

A return to the office could be bad for computer security

When employees feel they deserve superior technology compared to other employees—and they don't receive unrestricted access to it—they pose a security risk to their companies, according to a new University at Buffalo ...

Telecom

New countermeasure against unwanted wireless surveillance

Smart devices are supposed to make our everyday lives easier. At the same time, however, they are a gateway for passive eavesdropping. To prevent possible surveillance of the movement profile within one's home, researchers ...