-
Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stationsU.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.... Read more
-
Exploding pagers and walkie-talkies are a reminder of how easily devices can be hackedThe recent attacks on walkie-talkies and pagers in Lebanon have highlighted the hidden vulnerabilities in everyday technology. These incidents underscore the need for individuals to understand the potential risks associated with their devices and to take proactive steps to protect themselves in an increasingly digital world where safety can be... Read more
-
Meta's AI-powered smart glasses raise concerns about privacy and user dataRay-Ban Meta smart glasses are just one of many wearable tech devices on the market. The glasses, which first launched in 2021, are a collaboration between Meta and Italian-French eyewear company EssilorLuxottica, which owns Ray-Ban among many other brands.... Read more
-
How did they get my data? I uncovered the hidden web of networks behind telemarketersLast year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out into the world. So I set out to discover what... Read more
-
Ukraine bans Telegram messenger app on state-issued devices because of Russian security threatUkraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary for national security during the war with Russia.... Read more
-
How a national lab retires—and shreds—large computing resourcesEver wonder what happens to massive supercomputing systems when they're retired? Surprisingly, when it comes to the data, it's not too different from disposing of old documents—they go straight into a shredder and sent to recycling.... Read more
-
Hackers demand $6 million for files stolen from Seattle airport operator in cyberattackHackers are demanding $6 million in bitcoin from the operator of the Seattle-Tacoma International Airport for documents they stole during a cyberattack last month and posted on the dark web this week, an airport official said Wednesday.... Read more
-
Encrypted 'Ghost' app: What we knowPolice revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.... Read more
-
Australian police infiltrate encrypted messaging app Ghost and arrest dozensAustralian police said Wednesday they have infiltrated Ghost, an encrypted global communications app developed for criminals, leading to dozens of arrests.... Read more
-
'Good complexity' can make hospital networks more cybersecureIn May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had infected an employee's computer.... Read more
-
Seeking help for crypto wallet problems on social media can attract scammersThe increasing popularity of cryptocurrencies has turned social media into a central place where users look for help when they have problems with their crypto wallet or private key. Scammers take advantage of this situation to make money with fake support offerings or to gain access to wallets or keys.... Read more
-
Global powers are grappling with 'responsible' use of military AI. What would that look like?Last week, some 2,000 government officials and experts from around the world met for the REAIM (Responsible Artificial Intelligence in the Military Domain) summit in Seoul, South Korea. This was the second event of its kind, with the first one held in the Netherlands in February 2023.... Read more
-
Inspired by squids and octopi, a new screen stores and displays encrypted images without electronicsA flexible screen inspired in part by squid can store and display encrypted images like a computer—using magnetic fields rather than electronics. The research is reported in Advanced Materials by University of Michigan engineers.... Read more
-
Hybrid optimization algorithm helps detect hidden messages in digital imagesResearch in the International Journal of Computational Science and Engineering describes a new approach to spotting messages hidden in digital images. The work contributes to the field of steganalysis, which plays a key role in cybersecurity and digital forensics.... Read more
-
Korean researchers develop AI CCTVs to detect, predict criminal activitiesA Korean research team has succeeded in developing a technology that can detect and predict signs of criminal activities utilizing real-time CCTVs and AI technology. With this new technology, CCTV is now evolving beyond its initial role of surveillance, opening up its potential as an effective way of 'preventing' crimes.... Read more