Security news

Internet

Researchers develop innovative approaches to tackle false information on multiple fronts

As internet usage becomes an integral part of our daily lives, many people rely on various online sources for information. While the internet offers greater convenience and a wider range of news sources, the spread of false ...

Security

Police arrest Australian 'distributor' of Ghost crime app

An Australian man has been charged with distributing the encrypted messaging app known as "Ghost", allegedly used by criminals across the globe to arrange drug deals and violence, police said Wednesday.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Consumer & Gadgets

Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked

The recent attacks on walkie-talkies and pagers in Lebanon have highlighted the hidden vulnerabilities in everyday technology. These incidents underscore the need for individuals to understand the potential risks associated ...

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Hardware

Vulnerability found in Apple's T2 security chip

Security firm IronPeak has found a vulnerability in Apple's T2 security chip. They claim in a blog post that the vulnerability allows would-be hackers to gain root access to a wide variety of Apple computers.

Software

New method enables automated protections for sensitive data

Just as people need to protect their sensitive data, such as social security numbers, manufacturing companies need to protect their sensitive corporate data. There are currently fewer protections for proprietary manufacturing ...

Security

Hospitals hit hardest by ransomware attacks, study says

Ransomware attempts jumped 50% in the last three months, over the first half of 2020, and hospitals and health care organizations were the hardest hit, according to a new study by Check Point research.

Security

Are brain-computer interface spellers secure?

Brain-computer interfaces (BCIs) record and decode brain signals to construct a communication pathway, which allows people to interact with a computer by thought directly. BCIs have been used in a broad range of applications, ...

Security

Hacked hospital chain says all 250 US facilities affected

The hospital chain Universal Health Services said Thursday that computer services at all 250 of its U.S. facilities were hobbled in last weekend's malware attack and efforts to restore hospital networks were continuing.

Security

Crowdsourcing challenge to de-identify public safety data sets

The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect ...

Security

Cyberattack hobbles major hospital chain's US facilities

A computer outage at a major hospital chain thrust healthcare facilities across the U.S. into chaos Monday, with treatment impeded as doctors and nurses already burdened by the coronavirus pandemic were forced to rely on ...