Hi Tech & Innovation

A three-stage authentication system for the metaverse

In recent years, many computer scientists have been exploring the notion of metaverse, an online space in which users can access different virtual environments and immersive experiences, using VR and AR headsets. While navigating ...

Security

Study: Customized GPT has security vulnerability

One month after OpenAI unveiled a program that allows users to easily create their own customized ChatGPT programs, a research team at Northwestern University is warning of a "significant security vulnerability" that could ...

Security

'Indirect prompt injection' attacks could upend chatbots

ChatGPT's explosive growth has been breathtaking. Barely two months after its introduction last fall, 100 million users had tapped into the AI chatbot's ability to engage in playful banter, argue politics, generate compelling ...

Computer Sciences

Cloud data storage security approach taps quantum physics

Distributed cloud storage is a hot topic for security researchers around the globe pursuing secure data storage, and a team in China is now merging quantum physics with mature cryptography and storage techniques to achieve ...

Security

Researcher explores effect of hospital mergers on data breaches

The period during and after hospital mergers and acquisitions is an especially vulnerable time for patient data when the chance of a cybersecurity breach more than doubles, according to research by a University of Texas at ...

Internet

Twitter leak exposes 235 million email addresses from hack

Personal emails linked to 235 million Twitter accounts hacked some time ago have been exposed according to Israeli security researcher Alon Gal—making millions vulnerable to having their accounts compromised or identities ...

page 1 from 16