Security

AI clones made from user data pose uncanny risks

Imagine, if you will, a digital doppelgänger. A clone that looks, talks and behaves just like you, created from the depths of artificial intelligence, reflecting your every mannerism with eerie precision. As thrilling as ...

Hi Tech & Innovation

A three-stage authentication system for the metaverse

In recent years, many computer scientists have been exploring the notion of metaverse, an online space in which users can access different virtual environments and immersive experiences, using VR and AR headsets. While navigating ...

Security

Repeat hacks highlight Australia's cyber flaws

Inadequate privacy safeguards and the stockpiling of sensitive customer information have made Australia a lucrative target in the eyes of foreign hackers, cybersecurity experts told AFP following a series of major data breaches.

Security

Health system discloses breach tied to online data tracker

Personal health information of up to 3 million patients in Illinois and Wisconsin may have been exposed to outside companies through tracking technology used on a large hospital system's electronic health records website.

Security

Australian police make first arrest in Optus hack probe

A police investigation of a cyberattack on an Australian telecommunications company in which the personal data of more than one third of Australia's population was stolen has resulted in its first arrest, investigators said ...

Internet

Australia updates law to protect data after Optus hack

The Australian government announced changes Thursday to its telecommunications law to protect vulnerable customers after personal details were stolen in a major cyberattack on the nation's second-largest wireless carrier.

page 1 from 2