-
Robotaxis keep riders safe, but what about their data?A robotaxi pulls up to the curb in Los Angeles. The front seat is empty, no driver in sight. The customer slides into the back seat, and off the ride goes to a destination typed into the app, its cameras and sensors silently collecting where she goes and maybe even... Read more
-
Breakthrough quantum-secure link protects data using the laws of physicsAustralian technology has delivered a live quantum-secure link, a breakthrough that promises to future-proof critical data against tomorrow's cyber threats.... Read more
-
Walkthrough screening system enhances security at airports nationwideA new security screener that people can simply walk past may soon be coming to an airport near you. In 2024, U.S. airports nationwide began adopting HEXWAVE—a commercialized walkthrough security screening system based on microwave imaging technology developed at MIT Lincoln Laboratory—to satisfy a new Transportation Security Administration (TSA) mandate... Read more
-
Estates of Jimmy Stewart, Judy Garland, Albert Einstein, to be protected against AI manipulationThe likenesses of Jimmy Stewart, Judy Garland, Rosa Parks, Albert Einstein, and many other late celebrities will be shielded against artificial intelligence recreations thanks to a new deal by their estate handler.... Read more
-
A RADIANT future for cybersecurityStealth cyber-attacks against power grids, water systems and other critical infrastructure often go undetected until it is too late. Led by Dr. Irfan Khan, researchers from the Clean and Resilient Energy Systems (CARES) Laboratory at Texas A&M University have developed a novel cybersecurity system to detect and defend against these... Read more
-
Federated learning AI developed for hospitals and banks without personal information sharingFederated learning was devised to solve the problem of difficulty in aggregating personal data, such as patient medical records or financial data, in one place. However, during the process where each institution optimizes the collaboratively trained AI to suit its own environment, a limitation arose: The AI became overly adapted... Read more
-
Training the grid to spot cyberattacks without seeing your dataSUTD researchers test a privacy-preserving approach that blends federated learning with cloud coordination for smart grids in future 6G environments.... Read more
-
Myanmar scam cities booming despite crackdown—using Musk's StarlinkThey said they had smashed them. But fraud factories in Myanmar blamed for scamming Chinese and American victims out of billions of dollars are still in business and bigger than ever, an AFP investigation can reveal.... Read more
-
AI-powered method helps protect global chip supply chains from cyber threatsUniversity of Missouri researchers have used artificial intelligence to detect hidden hardware trojans through a method that's 97% accurate.... Read more
-
Cybercriminals are not the lone wolves of 20 years ago, says expertCity University London spoke to Professor Rajarajan about his mission to protect us all from the threat of international cyber criminality. Professor Raj Rajarajan is an academic at City St George's, University of London whose research focuses on cybersecurity and security engineering.... Read more
-
Vulnerability in confidential cloud environments uncoveredSome data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now found a vulnerability that could allow hackers to breach these confidential environments.... Read more
-
Australian airline Qantas says millions of customers' data leaked onlineAustralian airline Qantas said Sunday that data from 5.7 million customers stolen in a major cyberattack this year had been shared online, part of a leak affecting dozens of firms.... Read more
-
Austria finds Microsoft 'illegally' tracked students: Privacy campaign groupAustria's data protection authority has determined that Microsoft "illegally" tracked students using its education software and must grant them access to their data, a privacy campaign group said Friday.... Read more
-
The spy who came in from the Wi-Fi: Beware of radio network surveillanceIf you pass by a café that operates a Wi-Fi network, you can be identified—even if you do not carry a smartphone with you. Researchers at Karlsruhe Institute of Technology (KIT) have found out that it is possible to identify people solely through Wi-Fi signals. They point out that this... Read more
-
AI tools can help hackers plant hidden flaws in computer chips, study findsWidely available artificial intelligence systems can be used to deliberately insert hard-to-detect security vulnerabilities into the code that defines computer chips, according to new research from the NYU Tandon School of Engineering, a warning about the potential weaponization of AI in hardware design.... Read more