Meta's AI-powered smart glasses raise concerns about privacy and user data
Ray-Ban Meta smart glasses are just one of many wearable tech devices on the market. The glasses, which first launched in 2021, are a collaboration between Meta and Italian-French eyewear company EssilorLuxottica, which owns ...
Sep 24, 2024
0
29
How did they get my data? I uncovered the hidden web of networks behind telemarketers
Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...
Sep 23, 2024
0
1
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat
Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...
Sep 20, 2024
0
1
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattack
Hackers are demanding $6 million in bitcoin from the operator of the Seattle-Tacoma International Airport for documents they stole during a cyberattack last month and posted on the dark web this week, an airport official ...
Sep 19, 2024
0
1
How a national lab retires—and shreds—large computing resources
Ever wonder what happens to massive supercomputing systems when they're retired? Surprisingly, when it comes to the data, it's not too different from disposing of old documents—they go straight into a shredder and sent ...
Sep 19, 2024
1
1
Encrypted 'Ghost' app: What we know
Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.
Sep 18, 2024
0
12
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Australian police said Wednesday they have infiltrated Ghost, an encrypted global communications app developed for criminals, leading to dozens of arrests.
Sep 18, 2024
0
20
Study finds that thousands of browser extensions compromise user data
Browser extensions, the software add-ons that help users customize and enhance their web browsers, are wildly popular. Some of the most-used extensions find shopping deals, fix grammar and typos, manage passwords, or translate ...
Sep 17, 2024
0
12
Seeking help for crypto wallet problems on social media can attract scammers
The increasing popularity of cryptocurrencies has turned social media into a central place where users look for help when they have problems with their crypto wallet or private key. Scammers take advantage of this situation ...
Sep 17, 2024
0
13
'Good complexity' can make hospital networks more cybersecure
In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...
Sep 17, 2024
0
19
Global powers are grappling with 'responsible' use of military AI. What would that look like?
Last week, some 2,000 government officials and experts from around the world met for the REAIM (Responsible Artificial Intelligence in the Military Domain) summit in Seoul, South Korea. This was the second event of its kind, ...
Sep 17, 2024
0
22
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronics
A flexible screen inspired in part by squid can store and display encrypted images like a computer—using magnetic fields rather than electronics. The research is reported in Advanced Materials by University of Michigan ...
Sep 16, 2024
0
8
New tools use AI 'fingerprints' to detect altered photos, videos
As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...
Sep 12, 2024
0
33
Korean researchers develop AI CCTVs to detect, predict criminal activities
A Korean research team has succeeded in developing a technology that can detect and predict signs of criminal activities utilizing real-time CCTVs and AI technology. With this new technology, CCTV is now evolving beyond its ...
Sep 12, 2024
0
10
Hybrid optimization algorithm helps detect hidden messages in digital images
Research in the International Journal of Computational Science and Engineering describes a new approach to spotting messages hidden in digital images. The work contributes to the field of steganalysis, which plays a key role ...
Sep 12, 2024
0
0
Hustle academies: West Africa's online scammers are training others in fraud and sextortion
As the world becomes increasingly connected, digital fraud has evolved from a local problem into a global one. West Africa, particularly Ghana and Nigeria, is witnessing the rise of "hustle kingdoms"—informal academies ...
Sep 12, 2024
0
0
Usable data hacked from air-gapped computer
A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...
Most Australian teens have a phone—but many are not keeping their identity and location secure
Most Australian teenagers have their own smartphone. According to a 2023 survey, 91% of young people between 14 and 17 owned a phone.
Sep 9, 2024
0
14