-
Cyberattack forces Iran steel company to halt productionOne of Iran's major steel companies said Monday it was forced to halt production after being hit by a cyberattack that also targeted two other plants, apparently marking one of the biggest such assaults on the country's strategic industrial sector in recent memory.... Read more
-
Apple, Android phones targeted by Italian spyware: GoogleAn Italy-based firm's hacking tools were used to spy on Apple and Android smartphones in Italy and Kazakhstan, Google said Thursday, casting a light on a "flourishing" spyware industry.... Read more
-
Sniffing out your identity with breath biometricsBiometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as fingerprint verification and facial recognition are now common features on many of... Read more
-
A simple tool to make websites more secure and curb hackingAn international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyberattacks.... Read more
-
Sensor imperfections are perfect for forensic camera analysisIn a project aimed at developing intelligent tools to fight child exploitation, University of Groningen computer scientists have developed a system to analyze the noise produced by individual cameras. This information can be used to link a video or an image to a particular camera. The results were published in... Read more
-
How math and language can combine to map the globe and create strong passwords, using the power of 3 random wordsIt's hard to imagine that three random words have the power to both map the globe and keep your private data secure. The secret behind this power is just a little bit of math.... Read more
-
Protecting computer vision from adversarial attacksAdvances in computer vision and machine learning have made it possible for a wide range of technologies to perform sophisticated tasks with little or no human supervision. From autonomous drones and self-driving cars to medical imaging and product manufacturing, many computer applications and robots use visual information to make critical... Read more
-
Costa Rica chaos a warning that ransomware threat remainsTeachers unable to get paychecks. Tax and customs systems paralyzed. Health officials unable to access medical records or track the spread of COVID-19. A country's president declaring war against foreign hackers saying they want to overthrow the government.... Read more
-
Why we need philosophy and ethics of cyber warfareCyber-attacks are rarely out of the headlines. We know state actors, terrorists, and criminals can leverage cyber-means to target the digital infrastructures of our societies. We have also learned that, insofar as our societies grow dependent on digital technologies, they become more vulnerable to cyber-attacks.... Read more
-
Researchers give privacy boost to sensitive proprietary patterns discovered in data miningResearchers have given a boost to privacy and protection of proprietary or other sensitive information during data mining, while not compromising on the ability to discover useful patterns in huge datasets.... Read more
-
Does TikTok pose data espionage concerns for the US? The answer is complicatedWhile Chinese-owned social media platform TikTok has had a meteoric rise in popularity since it was released in 2016, the app's growth has posed privacy concerns when it comes to the collection of users' information, highlighting what a recent New York Times op-ed labeled a "data espionage problem."... Read more
-
Retailers say they use facial recognition for 'loss prevention.' An expert explains what it might mean for youOnce the purview of law enforcement and intelligence agencies, facial recognition is now being used to identify consumers in Australian stores.... Read more
-
Researchers demonstrate two security methods that efficiently protect analog-to-digital converters from powerful attacksResearchers are pushing to outpace hackers and develop stronger protections that keep data safe from malicious agents who would steal information by eavesdropping on smart devices.... Read more
-
If abortion is made a crime, will Microsoft, Amazon and other big data players cooperate with police?In a moment when dozens of states are poised to curtail abortion access, Washington has been put forward as a safe harbor for reproductive rights.... Read more
-
Researchers discover a new hardware vulnerability in the Apple M1 chipWilliam Shakespeare might have been talking about Apple's recently released M1 chip via his prose in A Midnight Summer's Dream: "And though she be but little, she is fierce."... Read more