-
How blind and low-vision users manage their passwordsPasswords remain the go-to authentication tool in everyday life, says CISPA researcher Alexander Ponticello. At the same time, passwords are often a security weak spot: too short, too simple, and reused far too often. Blind and low-vision people face an additional hurdle: Systems need to work together sensibly for authentication... Read more -
What's the difference between passwords and passkeys? It's not just the protection they providePasswords are the keys to our digital lives—think how many times you log in to websites and other systems. But just like physical keys, they can be lost, duplicated and stolen.... Read more -
Anonymity's ARX nemesisA team of faculty and students from George Mason University recently discovered a vulnerability in a widely used anonymization tool. They presented their findings last week in Taiwan at the Association for Computing Machinery Conference on Computer and Communications Security (ACM CCS 2025). The paper is available on the arXiv... Read more -
New study uncovers data protection gaps in popular mHealth appsResearchers at the University of Bremen have uncovered significant discrepancies between the data protection claims and the actual behavior of mobile health applications (mHealth apps). Many apps transmit personal data before users have even given their consent.... Read more -
Scientists create a novel hydrogel for unclonable security tagsEncryption technologies are vital in today's digital landscape to protect sensitive information from hackers and prevent fraud. While cutting-edge encryption has been developed for data, sophisticated protection for physical objects such as high-value products, access cards and documents has lagged behind until now.... Read more -
Robotaxis keep riders safe, but what about their data?A robotaxi pulls up to the curb in Los Angeles. The front seat is empty, no driver in sight. The customer slides into the back seat, and off the ride goes to a destination typed into the app, its cameras and sensors silently collecting where she goes and maybe even... Read more -
Breakthrough quantum-secure link protects data using the laws of physicsAustralian technology has delivered a live quantum-secure link, a breakthrough that promises to future-proof critical data against tomorrow's cyber threats.... Read more -
Walkthrough screening system enhances security at airports nationwideA new security screener that people can simply walk past may soon be coming to an airport near you. In 2024, U.S. airports nationwide began adopting HEXWAVE—a commercialized walkthrough security screening system based on microwave imaging technology developed at MIT Lincoln Laboratory—to satisfy a new Transportation Security Administration (TSA) mandate... Read more -
Estates of Jimmy Stewart, Judy Garland, Albert Einstein, to be protected against AI manipulationThe likenesses of Jimmy Stewart, Judy Garland, Rosa Parks, Albert Einstein, and many other late celebrities will be shielded against artificial intelligence recreations thanks to a new deal by their estate handler.... Read more -
A RADIANT future for cybersecurityStealth cyber-attacks against power grids, water systems and other critical infrastructure often go undetected until it is too late. Led by Dr. Irfan Khan, researchers from the Clean and Resilient Energy Systems (CARES) Laboratory at Texas A&M University have developed a novel cybersecurity system to detect and defend against these... Read more -
Federated learning AI developed for hospitals and banks without personal information sharingFederated learning was devised to solve the problem of difficulty in aggregating personal data, such as patient medical records or financial data, in one place. However, during the process where each institution optimizes the collaboratively trained AI to suit its own environment, a limitation arose: The AI became overly adapted... Read more -
Training the grid to spot cyberattacks without seeing your dataSUTD researchers test a privacy-preserving approach that blends federated learning with cloud coordination for smart grids in future 6G environments.... Read more -
Myanmar scam cities booming despite crackdown—using Musk's StarlinkThey said they had smashed them. But fraud factories in Myanmar blamed for scamming Chinese and American victims out of billions of dollars are still in business and bigger than ever, an AFP investigation can reveal.... Read more -
AI-powered method helps protect global chip supply chains from cyber threatsUniversity of Missouri researchers have used artificial intelligence to detect hidden hardware trojans through a method that's 97% accurate.... Read more -
Cybercriminals are not the lone wolves of 20 years ago, says expertCity University London spoke to Professor Rajarajan about his mission to protect us all from the threat of international cyber criminality. Professor Raj Rajarajan is an academic at City St George's, University of London whose research focuses on cybersecurity and security engineering.... Read more
