Security news

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Security

How did they get my data? I uncovered the hidden web of networks behind telemarketers

Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Computer Sciences

New algorithm builds stronger and faster blockchains

A global team of researchers, including Monash University experts, has developed a new algorithm that will enable building more resilient, efficient, and faster blockchains.

Security

Detecting distributed denial of service attacks

The distributed denial-of-service (DDOS) attack may well be familiar to anyone who has spent time running online services, such as websites. It is a malicious attack on the servers running the system that simply bombards ...

Security

Germany closes Russian darknet marketplace Hydra

German police said Tuesday they have taken down Russian-language illegal darknet marketplace Hydra, the largest such network in the world, and seized bitcoins worth 23 million euros ($25 million).

Security

Satellite modems nexus of worst cyberattack of Ukraine war

A malicious software command that immediately crippled tens of thousands of modems across Europe anchored the cyberattack on a satellite network used by Ukraine's government and military just as Russia invaded, the satellite ...

Business

SolarWinds says its new security measures are reassuring clients

SolarWinds says it has beefed up security and tightened its software screening process 15 months after one of the most sophisticated cyberattacks exposed thousands of its customers to Russian spies and left U.S. government ...

Security

Security tool guarantees privacy in surveillance footage

Surveillance cameras have an identity problem, fueled by an inherent tension between utility and privacy. As these powerful little devices have cropped up seemingly everywhere, the use of machine learning tools has automated ...

Energy & Green Tech

Researchers protecting solar technologies from cyberattack

New research from the University of Georgia suggests a novel approach to safeguarding one possible target of a cyberattack—the nation's solar farms. In a study published in IEEE Transactions on Smart Grid, a team in UGA's ...

Business

Critics raise privacy fears over EU message app rule

The EU will require tech giants to drop barriers between their hugely popular messaging services to boost competition, but critics warned Friday that could come at the cost of millions of users' privacy.

Security

Is a security feature on the way that makes computing faster?

Multiple programs running concurrently on a device rely on data stored in the device's memory hardware, but sensitive information might not be shared among all the programs, exposing the device to a "memory timing side-channel ...

Security

Americans must prepare for cyber warfare

On March 21, President Biden issued an urgent warning to American business leaders to strengthen their companies' cyber defenses immediately. In recent weeks, experts have been surprised by the lack of full-scale cyberattacks ...