-
Improving data security for a hybrid society: Insights from new studySociety 5.0 envisions a connected society driven by data shared between people and artificial intelligence devices connected via the Internet of Things (IoT). While this can be beneficial, it is also essential to protect the privacy of data for secure processing, transmission, and storage. Currently, homomorphic encryption and secret sharing... Read more
-
A three-stage authentication system for the metaverseIn recent years, many computer scientists have been exploring the notion of metaverse, an online space in which users can access different virtual environments and immersive experiences, using VR and AR headsets. While navigating the metaverse, users might also share personal data, whether to purchase goods, connect with other users,... Read more
-
Ransomware shuts hundreds of Yum Brands restaurants in UKA ransomware attack forced the parent company of KFC and Taco Bell to close several hundred restaurants in the United Kingdom this week.... Read more
-
International arrests over 'criminal' crypto exchangeThe owner of China-based cryptocurrency exchange Bitzlato was arrested in Miami on Wednesday, along with five associates in Europe, during an international operation against "darknet" markets.... Read more
-
Taliban bought blue check marks on Twitter, report saysThe Taliban and supporters of the Afghanistan rulers have been buying up blue-check verifications on Twitter, according to a report.... Read more
-
New report outlines recommendations for defending against deepfakesAlthough most public attention surrounding deepfakes has focused on large propaganda campaigns, the problematic new technology is much more insidious, according to a new report by artificial intelligence (AI) and foreign policy experts at Northwestern University and the Brookings Institution.... Read more
-
A new method to evaluate the threat of air attacks in warship defense operationsIn a recent research study, scientists have proposed a new method to evaluate the threat of air attacks on multiple targets in the field of warship defense operations. The proposed method, which is based on an improved version of the Technique for Order of Preference by Similarity to Ideal Solution... Read more
-
How encryption holds our digital society togetherEncryption is like the steel skeleton of a building: invisible, but holding everything together. In our digital age, encryption is an absolutely essential element and even if you think that you do not have any skeletons in the closet, there is good reason to keep your data secret.... Read more
-
Using cosmic rays to generate and distribute random numbers and boost security for local devices and networksState-of-the-art methods of information security are likely to be compromised by emerging technologies such as quantum computers. One of the reasons they are vulnerable is that both encrypted messages and the keys to decrypt them must be sent from sender to receiver.... Read more
-
EXPLAINER: How NOTAM caused widespread flight disruptionsUntil Wednesday, few travelers had ever heard of a Notice to Air Missions, or NOTAM, nor did they know that the system used to generate those notices could cause widespread travel misery.... Read more
-
Cyber incident hits UK postal service, halts overseas mailBritain's postal service said it was hit Wednesday by a "cyber incident" that is temporarily preventing it from sending letters or parcels to other countries.... Read more
-
Modification to Shor's algorithm may mean less powerful quantum computers could crack cryptosystemsA team of researchers affiliated with a host of institutions across China has modified Shor's algorithm in a way that could allow less powerful quantum computers to crack current cryptosystems. The team describes their modifications and outlines the results of testing it using real-world quantum computers in a paper published... Read more
-
Air travel across US thrown into chaos after computer outageThe world's largest aircraft fleet was grounded for hours by a cascading outage in a government system that delayed or canceled thousands of flights across the U.S. on Wednesday.... Read more
-
Fear can inspire remote workers to protect IT resourcesFear of what could go wrong is the greatest motivator when it comes to getting remote workers to protect their employer's information technology security, according to a recent study in Computers & Security. But it tends to work best when employees also have a solid understanding of the severity of... Read more
-
Cyberattack keeps Iowa's largest school district closedAn apparent cyberattack on Iowa's largest school district has led officials to cancel classes for 30,000 students for a second day as technicians scramble to protect data and restore the computer system, the district's leader said Tuesday afternoon.... Read more