Security news

Security

Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data

Japan on Wednesday linked more than 200 cyberattacks over the past five years targeting the country's national security and high technology data to a Chinese hacking group, MirrorFace, detailing their tactics and calling ...

Security

Weaponized disinformation can pose serious threat to urban transit systems

As every straphanger knows, public transit systems are fantastic—except when they aren't. A single station closure can ruin a commuter's morning, and even minor delays or disruptions can snowball into major problems as ...

Computer Sciences

Digital fingerprint: Cascading style sheets leaves users vulnerable to tracking

Processor type, IP address, browser in use, installed fonts—by collecting these and other characteristics of browser settings and the underlying operating system, it is possible to create a highly detailed and, in some ...

Business

Selling fear: Marketing for cybersecurity products often leaves consumers less secure

You have likely seen multiple ads for products and services designed to make you more secure online. When you turn on your television, see online ads, or even when you get in-app notifications, you are likely to encounter ...

Computer Sciences

Fake credentials offer novel solution to e-voting challenges

As we come to the end of a year in which half the world's population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter ...

Security

Can we convince AI to answer harmful requests?

New research from EPFL demonstrates that even the most recent large language models (LLMs), despite undergoing safety training, remain vulnerable to simple input manipulations that can cause them to behave in unintended or ...

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Security

Will congestion charging come with a privacy toll?

As New Zealand edges closer to adopting congestion charging in its busiest cities, University of Auckland researchers are highlighting a critical but often overlooked issue: privacy.

Security

Rural hospitals may be more vulnerable to ransomware attacks

Ransomware attacks in the health care sector have more than doubled in the past five years. Among providers, hospitals experience the highest rate of operational disturbances including restricted access to servers, disrupted ...

Consumer & Gadgets

How smart toys may be spying on kids: What parents need to know

Toniebox, Tiptoi, and Tamagotchi are smart toys, offering interactive play through software and internet access. However, many of these toys raise privacy concerns, and some even collect extensive behavioral data about children, ...