Security news

Security

Police arrest Australian 'distributor' of Ghost crime app

An Australian man has been charged with distributing the encrypted messaging app known as "Ghost", allegedly used by criminals across the globe to arrange drug deals and violence, police said Wednesday.

Business

Tech industry urges G7 to unify cloud security standards

A leading tech industry group on Tuesday called on G7 nations to harmonize cloud security certification across the world's richest nations, in an effort to stoke cooperation and counter calls that data should stay within ...

Consumer & Gadgets

Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked

The recent attacks on walkie-talkies and pagers in Lebanon have highlighted the hidden vulnerabilities in everyday technology. These incidents underscore the need for individuals to understand the potential risks associated ...

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Why untraceable cryptocurrencies are here to stay

According to a new study from Copenhagen Business School, on the role of privacy and decentralization in the cryptocurrency community, developers are creating cryptocurrencies in such a way that regulatory oversight will ...

Security

Digital privacy and COVID-19: between a paradox and a hard place

The situation in which the world is currently living is extraordinary in every sense of the word: since the outbreak of the COVID-19 pandemic, there have been over 53 million confirmed cases and more than 1.3 million people ...

Security

Is your smart watch sharing your data?

You may not realize it, but your internet-connected household devices such as the Ring doorbell, Peloton exercise bike and Nest thermostat are all exchanging data with other devices and systems over the network. These physical ...

Security

Finland fast-tracks ID code law change after hacking case

The government of Finland said Thursday it was preparing legislation that would allow citizens to change their personal identity codes in cases of gross data breaches that carry a high risk of identity theft.

Security

DNS cache poisoning ready for a comeback

Agroup led by UC Riverside computer security researchers unveiled discovery of a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks this week at the 2020 ACM SIGSAC Conference on ...

Computer Sciences

Double patterns could advance Android device security

Researchers have found that using multiple patterns to unlock an Android phone provides significantly more security than the current single-pattern method, and, in some cases, may be more secure than the four- and six-digit ...

Software

New tool detects unsafe security practices in Android apps

Computer scientists at Columbia Engineering have shown for the first time that it is possible to analyze how thousands of Android apps use cryptography without needing to have the apps' actual codes. The team's new tool, ...

Security

World's fastest open-source intrusion detection is here

Intrusion detection systems are the invisible intelligence agencies in computer networks. They scan every packet of data that is passed through the network, looking for signs of any one of the tens of thousands of different ...