-
Hackers breach Morocco's social security database in an unprecedented cyberattackMorocco's social security agency said troves of data were stolen from its systems in a cyberattack this week that resulted in personal information being leaked on the messaging app Telegram.... Read more
-
Wavelet-based adversarial training: Cybersecurity system protects medical digital twins from attacksA digital twin is an exact virtual copy of a real-world system. Built using real-time data, they provide a platform to test, simulate, and optimize the performance of their physical counterpart. In health care, medical digital twins can create virtual models of biological systems to predict diseases or test medical... Read more
-
One Tech Tip: Locking down your device when crossing bordersPlanning an international trip? Travelers should prepare for the possibility of extra scrutiny of their phones when crossing borders, especially when entering the United States.... Read more
-
Selling your old laptop or phone? You might be handing over your data tooYou're about to recycle your laptop or your phone, so you delete all your photos and personal files. Maybe you even reset the device to factory settings.... Read more
-
Development of a chaotic light receiver for secure communication in hostile environmentsResearchers have developed a new type of optical receiver, able to restore chaotic signals in free-space optical communication links distorted by atmospheric turbulence. Using a system of optical antennas integrated into a programmable photonic chip, the receiver can adapt in real time, maintaining the integrity of the signal even in... Read more
-
Encryption method for key exchange enables tap-proof communication to fend off future quantum tech threatsQuantum computers are a specter for future data security because they might break many of today's encryption methods. Among other things, this will affect encrypted emails, messenger services, or online banking. Together with partners, researchers from Karlsruhe Institute of Technology (KIT) have developed a method that can reliably protect today's... Read more
-
Hackers have hit major super funds—a cyber expert explains how to stop it from happening againSeveral of Australia's biggest superannuation funds have suffered a suspected coordinated cyberattack, with scammers stealing hundreds of thousands of dollars of members' retirement savings.... Read more
-
What users need to know about privacy and data after 23andMe's bankruptcy filing23andMe, one of the first companies to provide direct-to-consumer genetic testing kits, has filed for bankruptcy. Since its founding in 2006, it has sold over 12 million DNA kits, with high-profile users including Oprah Winfrey and Warren Buffett.... Read more
-
Oracle warns health customers of patient data breachHackers broke into Oracle Corp.'s computer systems and stole patient data in an attempt to extort multiple medical providers in the U.S., according to a person familiar with the matter and a notification the software company sent to clients.... Read more
-
Everything you say to an Alexa speaker will be sent to Amazon—starting todayAmazon has disabled two key privacy features in its Alexa smart speakers, in a push to introduce artificial intelligence-powered "agentic capabilities" and turn a profit from the popular devices.... Read more
-
Signal is not the place for top secret communications, but it might be the right choice for youWhen top White House defense and national security leaders discussed plans for an attack on targets in Yemen over the messaging app Signal, it raised many questions about operational security and recordkeeping and national security laws. It also puts Signal in the spotlight.... Read more
-
23andMe filed for bankruptcy. Here's why you should be worried about your privacyOver the past decade, 23andMe has collected genetic data from millions of people—and now that the company has filed for bankruptcy, that information could be sold to the highest bidder, a Northeastern University data scientist warns.... Read more
-
Encryption breakthrough lays groundwork for privacy-preserving AI modelsIn an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed.... Read more
-
Giving verification more logic and more scale: New method enhances processor security against side-channel attacksMore than seven years ago, cybersecurity researchers were thoroughly rattled by the discovery of Meltdown and Spectre, two major security vulnerabilities uncovered in the microprocessors found in virtually every computer on the planet.... Read more
-
Leak of US military plans on Signal shows why security systems need to be easy to useYesterday, The Atlantic magazine revealed an extraordinary national security blunder in the United States. Top US government officials had discussed plans for a bombing campaign in Yemen against Houthi rebels in a Signal group chat which inadvertently included The Atlantic's editor in chief, Jeffrey Goldberg.... Read more