Security

Cyber-defense systems seek to outduel criminals in AI race

Not long after generative artificial intelligence models like ChatGPT were introduced with a promise to boost economic productivity, scammers launched the likes of FraudGPT, which lurks on the dark web promising to assist ...

Security

NIST retires SHA-1 cryptographic algorithm due to vulnerabilities

The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST). ...

Internet

With Twitter in chaos, some ways to protect your account

Twitter is in chaos. Elon Musk, its new owner, has decimated its staff and this week gave those remaining an ultimatum—work grueling hours and be "extremely hardcore " or leave. Hundreds chose the latter and headed for ...

Consumer & Gadgets

Operation indiscriminately infects iPhones with spyware

Researchers say suspected nation-state hackers infected Apple iPhones with spyware over two years in what security experts on Friday called an alarming security failure for a company whose calling card is privacy.

Security

Using blockchain contracts to build botnets

Blockchain is a decentralized ledger technology that secures the integrity of transactions through digital signatures and will be familiar to anyone who has investigated digital or "crypto" currencies. The technology has ...

page 5 from 6