-
Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech dataJapan on Wednesday linked more than 200 cyberattacks over the past five years targeting the country's national security and high technology data to a Chinese hacking group, MirrorFace, detailing their tactics and calling on government agencies and businesses to reinforce preventive measures.... Read more
-
From logs to security: How process analysis is transforming access controlResearchers at the University of Electro-Communications have developed a framework for improving system security by analyzing business process logs. The research is published in the International Journal of Software Engineering and Knowledge Engineering.... Read more
-
Weaponized disinformation can pose serious threat to urban transit systemsAs every straphanger knows, public transit systems are fantastic—except when they aren't. A single station closure can ruin a commuter's morning, and even minor delays or disruptions can snowball into major problems as thousands of passengers rush to find alternate routes, straining other parts of the transit network.... Read more
-
New labels will help people pick devices less at risk of hackingThe federal government is rolling out a consumer labeling system designed to help Americans pick smart devices that are less vulnerable to hacking.... Read more
-
Tesla data helped police after Las Vegas truck explosion, but experts have wider privacy concernsYour car is spying on you. That is one takeaway from the fast, detailed data that Tesla collected on the driver of one of its Cybertrucks that exploded in Las Vegas earlier this week. Privacy data experts say the deep dive by Elon Musk's company was impressive, but also shines... Read more
-
Digital fingerprint: Cascading style sheets leaves users vulnerable to trackingProcessor type, IP address, browser in use, installed fonts—by collecting these and other characteristics of browser settings and the underlying operating system, it is possible to create a highly detailed and, in some cases, even unique profile of users. This phenomenon is known as browser fingerprinting.... Read more
-
Selling fear: Marketing for cybersecurity products often leaves consumers less secureYou have likely seen multiple ads for products and services designed to make you more secure online. When you turn on your television, see online ads, or even when you get in-app notifications, you are likely to encounter cybersecurity technology marketed as the ultimate solution and the last line of... Read more
-
Japan Airlines was hit by a cyberattack, delaying flights during the year-end holiday seasonJapan Airlines said it was hit by a cyberattack Thursday, causing delays to more than 20 domestic flights but the carrier said it was able to stop the onslaught and restore its systems hours later. There was no impact on flight safety, it said.... Read more
-
Cryptographic protocol enables secure data sharing in floating wind energy sectorFloating wind power offers enormous potential for deepwater offshore energy development. However, the management and secure exchange of data between stakeholders represents a key challenge for its evolution.... Read more
-
3D-printed guns, like the one Luigi Mangione allegedly used, are a growing threatPolice investigating the shooting of UnitedHealthcare CEO Brian Thompson on Dec. 4, 2024, have announced that the suspected assailant had used a 3D-printed gun. Several high-profile crimes in recent years have involved this kind of homemade, or partially homemade, weapon.... Read more
-
Fake credentials offer novel solution to e-voting challengesAs we come to the end of a year in which half the world's population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter coercion and vote buying.... Read more
-
Five cybersecurity tips to protect yourself from scams and deepfakesIn an age when misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Falling for a scam can have devastating social, financial, and personal consequences. Over the past year, victims of cybercrime reported losing an average of $30,700 per incident.... Read more
-
The federal government wants you to adopt 'end-to-end encryption' methods. Here's why you should adopt themAfter revealing that it was the target of a sweeping hacking campaign, the federal government issued a public service announcement this week urging the public to use "end-to-end encryption" in order to better secure its digital communications.... Read more
-
UK study: Older adults less likely to experience cybercrime than younger adults—but it's more financially devastatingAdults aged 75 and older are more likely to repeatedly experience cybercrime and related financial loss, according to research published December 18, 2024, in the open-access journal PLOS ONE by Benjamin Havers from University College London, U.K., and colleagues.... Read more
-
How can you stay safe from cyber attacks? Here are two simple checklists from experts"Cyber security" may sound like a far-off worry for big corporations or telcos, but that's far from the case. Cyber security simply means the practice of safeguarding your sensitive data from unauthorized access, theft and damage.... Read more