-
Cryptocurrencies are making investors very rich—and making it harder to catch financial scammersFraudulent payments—where people are tricked into sending money to criminals—cost consumers £460 million in England and Wales last year. To give consumers more protection, the UK government now plans to give banks 72 hours to delay completion of potentially fraudulent transfers.... Read more
-
Everyday routines as the key to logging in to smart homesSmart homes are intended to make life easier, but logging into individual devices is often still an onerous task. Researchers from ETH Zurich have investigated how everyday routines could be used for secure and user-friendly authentication—with no need for cumbersome passwords.... Read more
-
Chinese hackers target Tibetan websites in malware attack, cybersecurity group saysA hacking group that is believed to be Chinese state-sponsored has compromised two websites with ties to the Tibetan community in an attack meant to install malware on users' computers, according to findings released Wednesday by a private cybersecurity firm.... Read more
-
Reporting into the void: Research validates victims' doubts about response to phishing reportsThe cybersecurity refrain when encountering phishing emails invariably advises: "don't click on that link" and "report that email"—but new research from Drexel University and Arizona State University has revealed a problematic reality: Most major companies do little to support reporting and few take action to shut down phishing sites disguised... Read more
-
Growth of extended reality tech means new 'enhanced' regulation needed to protect people's privacyThe growth of extended reality technology means new enhanced measures are needed to protect people's privacy, a new study says.... Read more
-
Researchers uncover vulnerabilities leading to predatory trading in popular Ethereum cryptocurrency rollupsEthereum, a decentralized online platform that allows users to conduct financial transactions in Ether cryptocurrency, prides itself on the system's high security.... Read more
-
Data breach laws drive up private debt costs but being cyber smart can helpA new study by researchers, including at The University of Western Australia, has revealed how U.S. data breach notification (DBN) laws are influencing the cost of private debt for companies.... Read more
-
Fitness apps can reveal your location—updated laws would help plug this hole in our personal securityFitness apps have revolutionized the way we approach health and exercise. They provide users with the ability to track their workouts, monitor their progress towards fitness goals and share achievements with a like-minded community. However, these benefits come with significant privacy and security risks, particularly regarding the disclosure of users'... Read more
-
AI-based authentication scheme can safeguard vehicles from cyber threatsScientists claim to have developed an artificial intelligence tool to consolidate the privacy of vehicles and their drivers.... Read more
-
50 countries warn UN of ransomware attacks on hospitalsThe World Health Organization and some 50 countries issued a warning Friday at the United Nations about the rise of ransomware attacks against hospitals, with the United States specifically blaming Russia.... Read more
-
Researchers develop new technology to detect and track illegal flying dronesA South Korean research team has succeeded in developing a new technology that can detect and track illegal flying drones that cause crimes such as unauthorized flying, terrorism, and privacy invasion. This technology is expected to strengthen national security and enhance public safety against the threat of illegal drones.... Read more
-
Researchers address quantum computing security challengesAlongside artificial intelligence, quantum computing is one of the fastest-growing subsets in the high-performance computing community. But what happens when this relatively new and powerful computing method reaches the limit of the cyberinfrastructure and network security capabilities of today?... Read more
-
Why do organizations still struggle to protect our data? We asked 50 professionals on the privacy front lineMore of our personal data is now collected and stored online than ever before in history. The rise of data breaches should unsettle us all.... Read more
-
Secure messaging through distributed messagesMost internet communications today rely on the TLS (Transport Layer Security) protocol, which protects against eavesdropping on the network, but not against access by service providers themselves. While end-to-end encryption (E2EE) ensures only the sender and recipient can read the messages, existing solutions are often not user-friendly or widely adopted.... Read more
-
Health monitoring devices at risk of being hacked, study showsBillions of people around the world are using internet-connected medical devices to monitor their health, but could be putting themselves at risk of hackers using their data for unhealthy reasons, according to a new cybersecurity study.... Read more