Security news

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Security

How did they get my data? I uncovered the hidden web of networks behind telemarketers

Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Security

Protection against cyberattacks requires smarter approach

If companies want to more efficiently limit the risks of cyberattacks, they should invest smarter rather than more. Many organizations currently still mainly select their investments based on past information, but choosing ...

Security

Using blockchain contracts to build botnets

Blockchain is a decentralized ledger technology that secures the integrity of transactions through digital signatures and will be familiar to anyone who has investigated digital or "crypto" currencies. The technology has ...

Security

Canadian extradited to US to face ransomware charges

A Canadian man has been extradited to the United States to face charges in connection with ransomware attacks that netted tens of millions of dollars in cryptocurrency, the Justice Department said Thursday.

Security

World's largest online hacking competition begins next week

picoCTF, the annual free online cybersecurity competition run by hacking experts in Carnegie Mellon's CyLab, launches next week. The competition aims to introduce young minds across the nation to the world of cybersecurity ...

Security

Opinion: What war in Ukraine means for cyber security in Europe

As bombs and missiles tragically rain on Ukrainian cities, so do another kind of armament: cyber weapons. This new generation of weaponry replaces explosives with destructive software (malware) and missile launchers with ...

Consumer & Gadgets

Low-Power encrypted computing solutions

Smartphones, smartwatches, smart health devices, and pervasive smart sensors are becoming enmeshed in our daily lives, generating a flood of data that help keep us safe, healthy, and informed. As we see more sources of data, ...

Security

'Cyberattack' knocks thousands offline in Europe

Thousands of internet users across Europe have been thrown offline after what sources said Friday was a likely cyberattack at the beginning of Russia's offensive in Ukraine.

Security

Taking a systems approach to cyber security

As critical infrastructure components such as electric power grids become more sophisticated, they are also becoming increasingly more reliant on digital networks and smart sensors to optimize their operations, and thus more ...