-
Germany launches spying probe into Signal attacks targeting MPsGerman prosecutors Friday launched a spying investigation into phishing attacks targeting lawmakers on the Signal messaging app, with an MP saying the latest Russia-directed plot against Germany was a "wake-up call."... Read more -
Needle-tip chip can secure pacemakers and insulin pumps against quantum attacksAs quantum computers advance, they are expected to be able to break tried-and-true security schemes that currently keep most sensitive data secure from attackers. Scientists and policymakers are working to design and implement post-quantum cryptography to defend against these future attacks.... Read more -
One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workersFor digital nomads, logging on to work from a cafe, co-working space, hotel lobby or airport lounge is a way of life.... Read more -
North Korean hackers suspected of $300 mn crypto heistA notorious North Korean hacking group is likely behind the theft of nearly $300 million in cryptocurrency over the weekend, an affected party has said, in the biggest known crypto heist this year.... Read more -
Industrial electrification is now a security imperative, finds analysisIndustrial electrification is becoming a matter of economic security as well as decarbonization, according to new Oxford analysis. Continued reliance on fossil fuels leaves 75% of global industry exposed to recurring price shocks, while electrification offers a pathway to stable and resilient energy costs.... Read more -
From floppy disks to Claude Mythos, how ransomware grew into a multibillion‑dollar industryWhen evolutionary biologist Joseph Popp coded the first documented piece of ransomware in 1989, he had little idea it would become a major criminal business model capable of bringing economies to their knees.... Read more -
AI system detects manipulated video frames with 95% accuracyWith the rapid spread of digital content, doctored videos pose growing risks across media, security, and legal domains. A new study published in The Journal of Engineering Research introduces an automated approach to detect interpolated frames—artificially inserted images used to smooth manipulated video sequences and make them appear authentic.... Read more -
Reactions to data breaches fade faster than expectedData breaches, such as the recent incidents at Odido and Basic-Fit, trigger feelings of anxiety and loss of trust among both victims and those who may have been affected. New international research shows that although data breaches provoke strong emotional responses, users tend to adapt surprisingly quickly, even when their... Read more -
Does 'federated unlearning' in AI improve data privacy, or create a new cybersecurity risk?As the capacity of artificial intelligence (AI) increases at an exponential rate, so do concerns about the privacy of user data.... Read more -
Quantum computers are coming to break our codes faster than anyone expectedOnline data is generally pretty secure. Assuming everyone is careful with passwords and other protections, you can think of it as being locked in a vault so strong that even all the world's supercomputers, working together for 10,000 years, could not crack it.... Read more -
Fake QR codes make for easy scams—be careful what you scan out thereIt's a simple thing we encounter many times every single week—often while in a hurry. You pull up at a parking spot, scan a QR code and pay within seconds. Or you sit down at a cafe, scan a code to view the menu and order your meal.... Read more -
Memristor chip combines security and compute-in-memory for edge devicesA cross-institutional research team has developed Co-Located Authentication and Processing (CLAP), a privacy-preserving system that overcomes the trade-off between security and performance in edge computing devices. The study, titled "Privacy-preserving data analysis using a memristor chip with co-located authentication and processing," is published in Science Advances. The team was led... Read more -
AI blueprints can be stolen with a single small antennaFrom smartphone facial recognition to autonomous vehicles, artificial intelligence (AI) has long been protected as a black box. However, a joint research team from KAIST and international institutions has uncovered a new security threat capable of peeking at AI blueprints from behind walls. The team also presented corresponding defense technologies.... Read more -
AI systems lack a fundamental property of human cognition: Understanding this gap may matter for safetyWhen a person reaches across a table to pass the salt, their brain is doing something far more complex than recognizing a request and executing a movement. It is drawing on a lifetime of bodily experience—where their hand is in space, what a saltshaker feels like, the social awareness of... Read more -
North Korea hackers suspected of attack on widely used software toolHackers linked to North Korea are suspected of an ambitious attack on an inconspicuous but widely used software package, Google analysts and other cybersecurity experts said Wednesday.... Read more
