-
Study reveals potential top cyber threats facing health care extended reality technologyA recent study in JMIR XR and Spatial Computing identifies potential cybersecurity and privacy risks associated with using extended reality (XR) in health care settings. The study, titled "Cybersecurity and Privacy Issues in Extended Reality Health Care Applications: Scoping Review," reviews the identified potential threats posed by XR technology and... Read more
-
Engineering research discovers critical vulnerabilities in AI-enabled robotsWithin its new Responsible Innovation initiative, researchers at Penn Engineering discovered that certain features of AI-governed robots carry security vulnerabilities and weaknesses that were previously unidentified and unknown. The research aims to address the emerging vulnerability for ensuring the safe deployment of large language models (LLMs) in robotics.... Read more
-
Using biometrics securely to avoid multiple registrations in humanitarian aidMillions of people around the world rely on humanitarian aid. One of the challenges when it comes to distributing aid is that resources are almost always scarce. Therefore, organizations want to ensure that people can only register once. CISPA-Faculty Dr. Wouter Lueks and his colleagues at EPFL in Lausanne recently... Read more
-
Speakers, vacuums, doorbells and fridges—the government plans to make your 'smart things' more secureThe Australian government has introduced its first-ever standalone cyber security act. Along with two other cyber security bills, it's currently being reviewed by a parliamentary committee.... Read more
-
Internet researchers reach beyond academia to close major security loopholeFor years a potential disaster lurked in the internet's encryption system, threatening the security of organizations and individuals worldwide. Princeton engineers have now squelched that threat, working with industry leaders to transform their research into a universal security standard that was adopted by global organizations in August and made effective... Read more
-
Chaotic color image encryption based on differential evolutionary deep learningResearch published in the International Journal of Information and Communication Technology describes a new approach to the encryption of digital images. The method could be used to protect sensitive information, such as medical and scientific images, online.... Read more
-
New tool can detect malware on Android phonesScreen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.... Read more
-
Attack simulator reveals oversight in AI image recognition tools and mitigation for cyber threatArtificial intelligence can help people process and comprehend large amounts of data with precision, but the modern image recognition platforms and computer vision models that are built into AI frequently overlook an important back-end feature called the alpha channel, which controls the transparency of images, according to a new study.... Read more
-
For AI, secrecy often does not improve securityConcern about misuse of artificial intelligence has led political leaders to consider regulating the emerging technology in ways that could limit access to AI models' inner workings. But researchers at a group of leading universities, including Princeton, caution that such restrictions are likely to do more harm than good.... Read more
-
Can ChatGPT flag potential terrorists? Study uses automated tools and AI to profile violent extremistsTechnology such as ChatGPT could play a complementary role and help profile terrorists and identify the likelihood of them engaging in extremist activity, according to a study which could make anti-terrorism efforts more efficient.... Read more
-
Is childproofing the internet constitutional? A tech law expert draws out the issuesMounting pressure to regulate children's use of technology in the United States raises the question: Is childproofing the internet constitutional?... Read more
-
Internet Archive reels from 'catastrophic' cyberattack, data breachThe Internet Archive, an online repository of web pages, was offline Thursday after its founder confirmed a major cyberattack that exposed the data of millions of users and left the site defaced.... Read more
-
American Water cyberattack renews focus on protecting critical infrastructureA cyberattack continues to affect the largest regulated water and wastewater utility company in the United States, renewing a focus on the importance of protecting critical infrastructure sites.... Read more
-
Viewpoint: As an ethical hacker, I can't believe the risks people routinely take when they access the internet in publicIn the modern world we are all constantly connected, but this comes with risks. As most cybersecurity specialists will tell you, the biggest vulnerability in any system is the user—whether at home or work.... Read more
-
American Water, the largest water utility in US, is targeted by a cyberattackThe largest regulated water and wastewater utility company in the United States announced Monday that it was the victim of a cyberattack, prompting the firm to pause billing to customers.... Read more