Security news

Internet

Researchers develop innovative approaches to tackle false information on multiple fronts

As internet usage becomes an integral part of our daily lives, many people rely on various online sources for information. While the internet offers greater convenience and a wider range of news sources, the spread of false ...

Security

Police arrest Australian 'distributor' of Ghost crime app

An Australian man has been charged with distributing the encrypted messaging app known as "Ghost", allegedly used by criminals across the globe to arrange drug deals and violence, police said Wednesday.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Consumer & Gadgets

Exploding pagers and walkie-talkies are a reminder of how easily devices can be hacked

The recent attacks on walkie-talkies and pagers in Lebanon have highlighted the hidden vulnerabilities in everyday technology. These incidents underscore the need for individuals to understand the potential risks associated ...

Security

AI model beats CAPTCHA every time

A trio of AI researchers at ETH Zurich, Switzerland, has modified an AI-based, picture-processing model to solve Google's reCAPTCHAv2 human-testing system.

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Software

NOVID is the most accurate app for contact tracing

NOVID, a contact tracing app that anonymously traces users' exposure to COVID-19, is the first such app in the world to demonstrate the distance accuracy required to perform contact tracing without significant false positives. ...

Security

Australia ramps up cyber spending after state-backed attacks

Australia unveiled the "largest-ever" boost in cybersecurity spending Tuesday, days after Prime Minister Scott Morrison spoke out about a wave of state-sponsored attacks suspected to have been carried out by China.

Internet

Credit card skimmers hide in web page image files

A particularly nasty form of consumer credit card theft centers on the use of skimming devices embedded in credit card machines at locations such as gas stations and convenience stores. As a customer swipes a card, the hidden ...

Security

Expanding access to cyber research tools

Faculty and students at Purdue University now have access to cybersecurity research software developed at Sandia National Laboratories. This marks the first time Sandia has collaborated with an academic community to make ...

Internet

Study: Online trackers follow health site visitors

Internet trackers are more likely to follow people who visit popular health sites, such as WebMD.com and mayoclinic.org, to other types of sites, a Cornell Tech study has found—suggesting that advertisers might be more ...

Computer Sciences

Plaintext ciphertext

Writing in the International Journal of Ad Hoc and Ubiquitous Computing, Yu-Chi Chen of the Department Computer Science and Engineering, at Yuan Ze University, in Tauyuan, Taiwan , has revisited the concept of plaintext checkable ...

Security

Australia under cyberattacks from state actor

Australia's prime minister revealed Friday his country was under a broad cyberattack from a "state-based actor" targeting government, public services and businesses, with suspicions falling on China.

Business

Amazon can't make facial recognition go away

Amazon, IBM, and Microsoft have generated a lot of excitement by announcing that they will, at least for a while, stop selling facial recognition software to police departments. Municipalities have imposed moratoriums. Some ...