-
WhatsApp security vulnerability discovered by researchersIT-Security Researchers from the University of Vienna and SBA Research identified and responsibly disclosed a large-scale privacy weakness in WhatsApp's contact discovery mechanism that allowed the enumeration of 3.5 billion accounts. In collaboration with the researchers, Meta has since addressed and mitigated the issue.... Read more -
Security vulnerability identified in EV charging protocolSouthwest Research Institute identified a security vulnerability in a standard protocol governing communications between electric vehicles (EV) and EV charging equipment. The research prompted the Cybersecurity & Infrastructure Security Agency (CISA) to issue a security advisory related to the ISO 15118 vehicle-to-grid communications standard.... Read more -
Smartphone sharing demands a new approach to cybersecurity, report findsDoes your partner know the password to your phone? Probably.... Read more -
Study to better understand West African based cyber-crime could be key to combating online fraudA University of Portsmouth-led study could help to inform the development of policy and interventions to reduce the risk of people falling prey to online and telephone scams.... Read more -
Online age checking is creating a treasure trove of data for hackersA variety of websites now have processes designed to verify the ages of their users. These checks are carried out in several ways. For instance, AI can be used to analyze whether a photo of the person looks old enough for the age threshold on a website.... Read more -
How hidden surveillance shapes the city of LondonConcealed surveillance technology can promote inequality, hide political aims, and threaten individual freedoms, says Dr. George Legg, Senior Lecturer in Liberal Arts and London in the Department of Interdisciplinary Humanities.... Read more -
Scam centers in southeast Asia are on the rise despite crackdowns to root out the illegal industryIt often starts with a text message asking if you are available on weekends, looking for a part-time job or you get a simple "hello" from an unknown number. Halfway across the world, a laborer is usually pulling in 12-16 hour days, sending non-stop messages, hoping someone will take the... Read more -
Nature's resilience inspires an improved power gridNatural ecosystems made up of plants, animals and microorganisms face constant challenges from natural hazards, like extreme weather or invasive species.... Read more -
Why people don't demand data privacy, even as governments and corporations collect more personal informationWhen the Trump administration gave Immigration and Customs Enforcement access to a massive database of information about Medicaid recipients in June 2025, privacy and medical justice advocates sounded the alarm. They warned that the move could trigger all kinds of public health and human rights harms.... Read more -
Norway transport firm steps up controls after tests show Chinese-made buses can be halted remotelyA leading Norwegian public transport operator has said it will introduce stricter security requirements and step up anti-hacking measures after a test on new Chinese-made electric buses showed the manufacturer could remotely turn them off.... Read more -
What factors determine the severity and outcomes of cyberwarfare between countries?Cyberwarfare between nation states has become increasingly common in recent years. To address several important questions that this phenomenon raises, scientists developed a game theoretical model of cyberwarfare between nations.... Read more -
Lay intuition as effective at jailbreaking AI chatbots as technical methods, research suggestsIt doesn't take technical expertise to work around the built-in guardrails of artificial intelligence (AI) chatbots like ChatGPT and Gemini, which are intended to ensure that the chatbots operate within a set of legal and ethical boundaries and do not discriminate against people of a certain age, race or gender.... Read more -
Researchers uncover critical security flaws in global mobile networksIn an era when recent cyberattacks on major telecommunications providers have highlighted the fragility of mobile security, researchers at the Korea Advanced Institute of Science and Technology have identified a class of previously unknown vulnerabilities that could allow remote attackers to compromise cellular networks serving billions of users worldwide.... Read more -
Study finds smarter way to train employees to thwart phishing scamsCompanies often send out simulated—or fake—phishing emails to employees to see who takes the bait and click. Those who fall for such scams typically receive an on-the-spot lesson meant to help them recognize suspicious messages the next time.... Read more -
Researchers advance cross-modality smart security with transformer modelA research team led by Professor Wang Hongqiang from the Hefei Institutes of Physical Science of the Chinese Academy of Sciences proposed a Global-Local Alignment Attention (GLAA) model based on an Asymmetric Siamese Transformer (AST), which markedly enhances the performance of Visible-X-ray cross-modality package re-identification tasks.... Read more
