Security news

Business

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

Business

California enacts law to protect brain data

A new California law extends consumer privacy protection to brainwave data gathered by implants or wearable devices.

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Consumer & Gadgets

Meta's AI-powered smart glasses raise concerns about privacy and user data

Ray-Ban Meta smart glasses are just one of many wearable tech devices on the market. The glasses, which first launched in 2021, are a collaboration between Meta and Italian-French eyewear company EssilorLuxottica, which owns ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Professors study ideal responses to ransomware attacks

A pair of College of Business professors and their doctoral student at The University of Texas at Arlington are exploring how ransomware attacks sometimes pit organizations against the law enforcement agencies trying to protect ...

Internet

Team uncovers the danger caused by subdomains

The internet is full of dangers: Sensitive data can be leaked, malicious websites can allow hackers to access private computers. The Security & Privacy Research Unit at TU Wien in collaboration with Ca' Foscari University ...

Software

Mouse movements reveal your behavior

In two recently published research papers, computer scientists from the University of Luxembourg and international partners show how mouse movements can be used to gain additional knowledge about the user behavior. While ...

Computer Sciences

Researchers design new techniques to bolster memory safety

Because corporations and governments rely on computers and the internet to run everything from the electric grid, healthcare, and water systems, computer security is extremely important to all of us. It is increasingly being ...

Consumer & Gadgets

What users think about logging in without a password

Many users consider passwords extremely burdening. An authentication protocol for websites, called WebAuthn, could render them obsolete. Users can use it to log on to a service such as a social network or an online shopping ...

Business

Advertising and Android apps: A detailed study of data privacy

The concept of privacy in the age of the web and social media remains high on the agenda for many people—those on the business and marketing side who would like to advertise with greater precision and those on the consumer ...

Business

Hit by a ransomware attack? Your payment may be deductible

As ransomware attacks surge, the FBI is doubling down on its guidance to affected businesses: Don't pay the cybercriminals. But the U.S. government also offers a little-noticed incentive for those who do pay: The ransoms ...