-
Stress and a toxic workplace culture can cause insider cybersecurity threatsWhile most organizations address cybersecurity issues with technology and surveillance, Emmanuel Anti's research argues that empathy may be a more effective defense. His doctoral dissertation at the University of Vaasa explores insider deviance, and how understanding the human elements related to it can lead to stronger, more sustainable cybersecurity practices.... Read more -
Integrated approach to cybersecurity key to reducing critical infrastructure vulnerabilityAs our society becomes more digital and interconnected, the systems that keep it running face growing vulnerability to cyber threats. Bahaa Eltahawy's doctoral dissertation at the University of Vaasa, Finland, shows that safeguarding these networks requires a holistic approach.... Read more -
WhatsApp security vulnerability discovered by researchersIT-Security Researchers from the University of Vienna and SBA Research identified and responsibly disclosed a large-scale privacy weakness in WhatsApp's contact discovery mechanism that allowed the enumeration of 3.5 billion accounts. In collaboration with the researchers, Meta has since addressed and mitigated the issue.... Read more -
Security vulnerability identified in EV charging protocolSouthwest Research Institute identified a security vulnerability in a standard protocol governing communications between electric vehicles (EV) and EV charging equipment. The research prompted the Cybersecurity & Infrastructure Security Agency (CISA) to issue a security advisory related to the ISO 15118 vehicle-to-grid communications standard.... Read more -
Smartphone sharing demands a new approach to cybersecurity, report findsDoes your partner know the password to your phone? Probably.... Read more -
Study to better understand West African based cyber-crime could be key to combating online fraudA University of Portsmouth-led study could help to inform the development of policy and interventions to reduce the risk of people falling prey to online and telephone scams.... Read more -
Five minutes of training boosts ability to spot AI-generated fake facesFive minutes of training can significantly improve people's ability to identify fake faces created by artificial intelligence, new research shows.... Read more -
Online age checking is creating a treasure trove of data for hackersA variety of websites now have processes designed to verify the ages of their users. These checks are carried out in several ways. For instance, AI can be used to analyze whether a photo of the person looks old enough for the age threshold on a website.... Read more -
AI agents open door to new hacking threatsCybersecurity experts are warning that artificial intelligence agents, widely considered the next frontier in the generative AI revolution, could wind up getting hijacked and doing the dirty work for hackers.... Read more -
Poisoned pixels: New AI tool to fight malicious deepfake imagesMonash University and the Australian Federal Police (AFP) are teaming up to turn the tech tables on cybercriminals through a dose of digital poison.... Read more -
Microsoft finds security flaw in AI chatbots that could expose conversation topicsYour conversations with AI assistants such as ChatGPT and Google Gemini may not be as private as you think they are. Microsoft has revealed a serious flaw in the large language models (LLMs) that power these AI services, potentially exposing the topic of your conversations with them. Researchers dubbed the... Read more -
How hidden surveillance shapes the city of LondonConcealed surveillance technology can promote inequality, hide political aims, and threaten individual freedoms, says Dr. George Legg, Senior Lecturer in Liberal Arts and London in the Department of Interdisciplinary Humanities.... Read more -
Scam centers in southeast Asia are on the rise despite crackdowns to root out the illegal industryIt often starts with a text message asking if you are available on weekends, looking for a part-time job or you get a simple "hello" from an unknown number. Halfway across the world, a laborer is usually pulling in 12-16 hour days, sending non-stop messages, hoping someone will take the... Read more -
Nature's resilience inspires an improved power gridNatural ecosystems made up of plants, animals and microorganisms face constant challenges from natural hazards, like extreme weather or invasive species.... Read more -
Why people don't demand data privacy, even as governments and corporations collect more personal informationWhen the Trump administration gave Immigration and Customs Enforcement access to a massive database of information about Medicaid recipients in June 2025, privacy and medical justice advocates sounded the alarm. They warned that the move could trigger all kinds of public health and human rights harms.... Read more
