Security news

Business

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

Business

California enacts law to protect brain data

A new California law extends consumer privacy protection to brainwave data gathered by implants or wearable devices.

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Consumer & Gadgets

Meta's AI-powered smart glasses raise concerns about privacy and user data

Ray-Ban Meta smart glasses are just one of many wearable tech devices on the market. The glasses, which first launched in 2021, are a collaboration between Meta and Italian-French eyewear company EssilorLuxottica, which owns ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Consumer & Gadgets

Research shows trust needed in digital tech

New Zealanders are worried about bias in automated decision-making, according to research conducted by Massey University research group Toi Āria: Design for Public Good.

Security

Cyberattack on US pipeline is linked to criminal gang

The cyberextortion attempt that has forced the shutdown of a vital U.S. pipeline was carried out by a criminal gang known as DarkSide that cultivates a Robin Hood image of stealing from corporations and giving a cut to charity, ...

Security

Major US pipeline halts operations after ransomware attack

The operator of a major pipeline system that transports fuel across the East Coast said Saturday it had been victimized by a ransomware attack and had halted all pipeline operations to deal with the threat. The attack is ...

Internet

Complex passwords aren't always best

Research from James Cook University shows increasingly complex website password restrictions often leave users frustrated and lead to poor password security.

Security

Blurred lines in face recognition

Face recognition has come on apace from a cliched trope of science fiction to a reality of the modern world with widespread use in photography databases, social media, and the security world. However, as with any tool, there ...

Computer Sciences

Making Bitcoin more secure

A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: don't. Or at least, be careful. Researchers from MSU ...

Computer Sciences

Algorithms improve how we protect our data

Daegu Gyeongbuk Institute of Science and Technology (DGIST) scientists in Korea have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. ...

Security

Belgian government, parliament, colleges hit by cyberattack

The company providing internet services for Belgium's parliament, government agencies, universities and scientific institutions said Tuesday that its network was under cyberattack, with connections to several customers disrupted.

Telecom

What can hackers do with your mobile number?

Boris Johnson's personal phone number has been publicly available on the internet for 15 years, it has been revealed. Listed at the bottom of a 2006 press release, the number has reportedly been accessible online from the ...

Consumer & Gadgets

Smart finger ring with integrated RFID chip

House key, wallet, health insurance card, hotel key card—a smart finger ring could replace all these in the future. Produced by a 3D printing process, the ring has an integrated RFID chip, tamper-proof, sealed and invisible. ...