-
This tiny, tamper-proof ID tag can authenticate almost anythingA few years ago, MIT researchers invented a cryptographic ID tag that is several times smaller and significantly cheaper than the traditional radio frequency tags (RFIDs) that are often affixed to products to verify their authenticity.... Read more
-
Pennsylvania courts say no ransom was paid in cyberattack, and attackers never sent a demandPennsylvania's state courts agency said Thursday that it never received a ransom demand as part of a cyberattack that briefly shut down some of its online services earlier this month and prompted a federal investigation.... Read more
-
Cyberattacks on hospitals are likely to increase, putting lives at risk, experts warnCybersecurity experts are warning that hospitals around the country are at risk for attacks like the one that is crippling operations at a premier Midwestern children's hospital, and that the U.S. government is doing too little prevent such breaches.... Read more
-
New phone? How to get your old one ready to pass onDoes the act of removing the sim card from an old phone prevent anyone from accessing any of the personal information that might still be recoverable?... Read more
-
Research describes new protocol for stopping network interlopersDr. Santosh Ganji, a recent computer engineering doctoral graduate, and Dr. P.R. Kumar, a professor in the Department of Electrical and Computer Engineering at Texas A&M University College of Engineering, work on the security of wireless networks.... Read more
-
Cyberattack shuts down Colorado public defender's officeA cyberattack on the Office of Colorado State Public Defender has forced the office to shut down its computer network, locking public defenders across the state out of critical work systems.... Read more
-
How automation is assisting forensic scientists in shoe print identificationOn the morning of Dec. 21, 1999, William Fyfe went to a clothing drop-off at Trinity Church in Toronto and left three pairs of running shoes. An undercover Ontario Provincial Police officer was tailing him, and retrieved the shoes for forensic analysis.... Read more
-
How secure is your security camera? Hackers can spy on cameras through walls, new research findsWhen it comes to protecting a bank or even your home, security cameras are on one of the first lines of defense. But what if those cameras aren't as secure as we all think?... Read more
-
Keeping it real: How to spot a deepfakeIn a world where you can create a virtual clone of a person in a matter of minutes, how do we know what's real? It may sound like dystopian science fiction, but deepfakes are a reality causing serious social, financial and personal harm.... Read more
-
Cybercriminals are creating their own AI chatbots to support hacking and scam usersArtificial intelligence (AI) tools aimed at the general public, such as ChatGPT, Bard, CoPilot and Dall-E have incredible potential to be used for good.... Read more
-
A criminal actor is to blame for a dayslong cyberattack on a Chicago hospital, officials sayA large children's hospital in Chicago remains hobbled by a cyberattack that began more than a week ago, cutting doctors and nurses off from digital patient records and limiting parents' ability to communicate with their kids' caregivers.... Read more
-
Your personal data is political: Computer scientists find gaps in the privacy practices of campaign websitesWould you trust a random political canvasser to do whatever they wanted with your resume, your friends' email addresses—and perhaps your profile pictures?... Read more
-
Researchers map decision-making processes of victims of ransomwareUniversity of Twente has investigated the decision-making processes of victims forced to pay ransom following ransomware attacks. UT researcher Tom Meurs and his colleagues analyzed data provided by the Dutch National Police and a Dutch incident response organization on 481 ransomware attacks.... Read more
-
A camera-based anti-facial recognition techniqueFacial recognition systems, computational tools that can recognize individuals in images or video footage, are now widely employed worldwide. Some users and developers, however, have raised privacy-related concerns, as by definition facial recognition techniques rely on images that capture people's faces. It is possible to use facial recognition techniques to... Read more
-
Computer scientists run a password update campaign efficiently and with minimal IT costsUpdating passwords for all users of a company or institution's internal computer systems is stressful and disruptive to both users and IT professionals. Many studies have looked at user struggles and password best practices. But very little research has been done to determine how a password update campaign can be... Read more