-
Wisconsin man charged with hacking sports betting accountsA Wisconsin man has been charged in a plot to hack and steal from thousands of sports betting accounts, court documents show.... Read more
-
Is China out to spy on us through drones and other tech? Perhaps that's not the question we should be askingAustralian government agencies' use of Chinese-made technology has been making headlines again. This time, the potential threat comes from DJI drones produced by China-headquartered company Da Jiang Innovations.... Read more
-
Tech mandated by UK Online Safety Bill 'could turn phones into surveillance tools'Tech mandated by the UK Government's Online Safety Bill could be used to turn millions of phones into facial recognition tools.... Read more
-
Free fertility app shared info with third parties, FTC saysOwners of the free fertility app Premom have settled with users after sharing health data without consent to other companies, including Google and marketing firms in China.... Read more
-
New cybersecurity tool checks for weaknesses in software components for internet trafficWhen accessing a website or sending an email, we trust that our information will arrive intact without being changed or read by any third party. In reality, keeping the information flowing on our vast global networks requires many intermediary processes, which may present security risks.... Read more
-
Extent of cyberattack on Philadelphia Inquirer remains unclear as journalists prepare to cover major electionThe Philadelphia Inquirer and outside cybersecurity experts have yet to determine the full extent of a cyberattack on the news organization last week, but the disruption won't affect coverage of the hotly contested mayoral primary election Tuesday.... Read more
-
Physiological-physical feature fusion for automatic voice spoofing detectionBiometric speech recognition systems are often subject to various spoofing attacks, the most common of which are speech synthesis and speech conversion attacks. These spoofing attacks can cause the biometric speech recognition system to incorrectly accept these spoofing attacks, which can compromise the security of this system. Researchers have made... Read more
-
Are you who you say you are? TSA tests facial recognition technology to boost airport securityA passenger walks up to an airport security checkpoint, slips an ID card into a slot and looks into a camera atop a small screen. The screen flashes "Photo Complete" and the person walks through—all without having to hand over their identification to the TSA officer sitting behind the screen.... Read more
-
Philadelphia Inquirer hit by cyberattack causing newspaper's largest disruption in decadesThe Philadelphia Inquirer says a weekend cyberattack caused the biggest disruption to its operations in 27 years and prevented it from publishing its Sunday print edition.... Read more
-
Lessons from 'Star Trek: Picard'—A cybersecurity expert explains how a sci-fi series illuminates today's threats(Editor's note: This article contains plot spoilers.) Society's understanding of technology and cybersecurity often is based on simple stereotypes and sensational portrayals in the entertainment media. I've written about how certain scenarios are entertaining but misleading. Think of black-clad teenage hackers prowling megacities challenging corporate villains. Or think of counterintelligence... Read more
-
Toyota: Data on more than 2 million vehicles in Japan were at risk in decade-long breachA decade-long data breach in Toyota's much-touted online service put some information on more than 2 million vehicles at risk, the Japanese automaker said Friday.... Read more
-
Research shows mobile phone users do not understand what data they might be sharingPrivacy and security features that aim to give consumers more control over the sharing of their data by smartphone apps are widely misunderstood, shows new research from the University of Bath's School of Management.... Read more
-
US busts Russian cyber operation in dozens of countriesThe Justice Department said Tuesday that it had disrupted a long-running Russian cyberespionage campaign that stole sensitive information from computer networks in dozens of countries, including the U.S. and other NATO members.... Read more
-
Patching up security gaps in cryptocurrencies often takes a long time, find researchersA defining characteristic of cryptocurrencies is that they are organized in a decentralized system and are not managed by a central bank like conventional currencies. This creates problems when researchers detect security vulnerabilities in the systems of virtual currencies. Sometimes it's unclear who runs a system, whether a system is... Read more
-
Hate passwords? You're in luck—Google is sidelining themGood news for all the password-haters out there: Google has taken a big step toward making them an afterthought by adding "passkeys" as a more straightforward and secure way to log into its services.... Read more