Consumer & Gadgets

This is what happens when your phone is spying on you

Smartphone spyware apps that allow people to spy on each other are not only hard to notice and detect, they also will easily leak the sensitive personal information they collect, says a team of computer scientists from New ...

Computer Sciences

A new AI-based tool to detect DDoS attacks

Cybercriminals are coming up with increasingly savvy ways to disrupt online services, access sensitive data or crash internet user's devices. A cyber-attack that has become very common over the past decades is the so-called ...

Security

'Indirect prompt injection' attacks could upend chatbots

ChatGPT's explosive growth has been breathtaking. Barely two months after its introduction last fall, 100 million users had tapped into the AI chatbot's ability to engage in playful banter, argue politics, generate compelling ...

Robotics

Security vulnerabilities detected in drones made by DJI

Researchers from Bochum and Saarbr├╝cken have detected security vulnerabilities, some of them serious, in several drones made by the manufacturer DJI. These enable users, for example, to change a drone's serial number or ...

Security

EPA mandates states report on cyber threats to water systems

The Biden administration on Friday said it would require states to report on cybersecurity threats in their audits of public water systems, a day after it released a broader plan to protect critical infrastructure against ...

Computer Sciences

Breakthrough enables perfectly secure digital communications

A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.

page 1 from 5