-
M&S cyberattacks used a little-known but dangerous technique—and anyone could be vulnerableThe cyberattack that has targeted Marks & Spencer's (M&S) is the latest in a growing wave of cases involving something called sim-swap fraud. While the full technical details remain under investigation, a report in the Times suggests that cyber attackers used this method to access M&S internal systems, possibly by... Read more
-
Computer scientists discover new security vulnerability in Intel processorsAnyone who speculates on likely events ahead of time and prepares accordingly can react quicker to new developments. What practically every person does every day, consciously or unconsciously, is also used by modern computer processors to speed up the execution of programs. They have so-called speculative technologies which allow them... Read more
-
How we think about protecting data: Game-based study reveals how context shapes decisionsHow should personal data be protected? What are the best uses of it? In our networked world, questions about data privacy are ubiquitous and matter for companies, policymakers, and the public.... Read more
-
Customer data stolen in Marks & Spencer cyberattackBritish retailer Marks & Spencer said on Tuesday that some personal data of its customers was stolen in a cyberattack that has crippled its online services for weeks.... Read more
-
Quantum computers could crack the security codes used by satellitesSatellites are the invisible backbone of modern life. They guide airplanes, help us find our way with GPS, deliver TV and the internet, and even help emergency services respond to disasters. But a new kind of computer—quantum computers—could put all of this at risk.... Read more
-
What lessons in cyber resilience can be learned from the UK high street attacks?Dr. Patricia Esteve-Gonzalez from Oxford University's Global Cyber Security Capacity Center (GCSCC), Department of Computer Science, and Luna Rohland from the World Economic Forum Center for Cybersecurity, outline how organizations can take a strategic approach to minimizing the impacts of cyber-attacks.... Read more
-
Decentralized finance is booming, and so are the security risksWhen the first cryptocurrency, Bitcoin, was proposed in 2008, the goal was simple: to create a digital currency free from banks and governments. Over time, that idea evolved into something much bigger: "decentralized finance," or "DeFi."... Read more
-
Smart home devices used to monitor domestic workers raise safety concernsThe growing use of smart home devices is undermining the privacy and safety of domestic workers. New research from King's College London reveals how surveillance technologies reinforce a sense of constant monitoring and control by domestic workers' employers, increasing their vulnerability and impacting their mental well-being.... Read more
-
Computer scientists create algorithm to protect videos from quantum hackingResearchers at FIU's College of Engineering and Computing have developed an encryption algorithm to defend videos from attackers with access to the world's most powerful computers.... Read more
-
Spy vs. spy: Researchers work to secure messagingWhen you send a message through WhatsApp or iMessage, you might think only you and the recipient can read it. Thanks to end-to-end encryption (E2EE), that's usually true, but it's not the whole story, says Dr. Nitesh Saxena, a cybersecurity expert at Texas A&M University.... Read more
-
UK research identifies attitudes toward personal data processing for national securityAlmost 80% of U.K. adults support national security agencies collecting and processing personal data to investigate terrorism and serious crime, according to new research by the Center for Emerging Technology and Security (CETaS) at The Alan Turing Institute, in collaboration with Savanta and Hopkins Van Mil, published on Tuesday.... Read more
-
Deepfakes now come with a realistic heartbeat, making them harder to unmaskImagine a world where deepfakes have become so good that no detection mechanism can unmask them as impostors. This would be a bonanza for criminals and malignant state actors: for example, these might use deepfakes to slander rival political candidates or frame inconvenient defenders of human rights.... Read more
-
Cyberattacks: How companies can communicate effectively after being hitIn its latest annual publication, insurance group Hiscox surveyed more than 2,000 cybersecurity managers in eight countries, including France. Two-thirds of the companies in the survey reported having been the victim of a cyberattack between mid-August 2023 and September 2024, a 15% increase over the previous period. In terms of... Read more
-
Information of more than 9,000 people potentially exposed in Blue Cross and Blue Shield of Illinois data breachThe personal information of more than 9,300 people may have been exposed in a recent data breach at health insurer Blue Cross and Blue Shield of Illinois, according to the company.... Read more
-
Oregon agency won't say if hackers stole data in cyberattackOregon's environmental agency won't say if a group of hackers stole data in a cyberattack that was first announced earlier this month.... Read more