US House okays renewal of controversial surveillance program

A part of the US surveillance program known as Section 702 allows intelligence agencies to conduct warrantless electronic monitoring of foreigners outside the United States. The US House of Representatives…

Computer scientists discover gap in the latest security mechanisms used by some chips

Credit: CC0 Public Domain Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely…

Cybersecurity attacks have the potential to infiltrate medical devices and cripple health care, expert warns

Credit: Pixabay/CC0 Public Domain The cyberattack on Change Healthcare last month should serve as a wake-up call for the health care industry, which needs to focus on securing its infrastructure,…

What you need to know about audio deepfakes

Credit: Unsplash/CC0 Public Domain Audio deepfakes have had a recent bout of bad press after an AI-generated robocall purporting to be the voice of Joe Biden hit up New Hampshire…

Study exposes failings of measures to prevent illegal content generation by text-to-image AI models

Concept Inversion (CI) on Erased Stable Diffusion (ESD), Negative Prompt (NP) and Forget-Me-Not (FMN) for art concept. The first three columns demonstrate the effectiveness of concept erasure methods when using the prompt:…

Research exposes security, privacy and safety issues in female technology apps used to track fertility, monthly cycles

Credit: Pixabay/CC0 Public Domain Experts at Royal Holloway, University of London, Newcastle University, University of London, and ETH Zurich have identified significant security, privacy, and safety issues surrounding FemTech, which…

‘Fake love’ crypto scammers ensnare US victims

The use of romance as a hook to commit financial fraud is provoking new alarm. The “wine trader” wooed her online for months with his flirtatious smile and emoji-sprinkled texts.…

Is the future of open source software at risk due to protestware?

Credit: Pixabay/CC0 Public Domain SMU Associate Professor Christoph Treude examines the foundations for studies on open-source software and protestware. “Software developers don’t develop everything from scratch,” he says. “Just like…

An integrated shuffler optimizes the privacy of personal genomic data used for machine learning

KAUST researchers developed a machine-learning approach aimed at preserving privacy while analyzing omics data for medical research. Credit: 2024 KAUST; Heno Hwang By integrating an ensemble of privacy-preserving algorithms, a…

Research describes new protocol for stopping network interlopers

Credit: Texas A&M Engineering Dr. Santosh Ganji, a recent computer engineering doctoral graduate, and Dr. P.R. Kumar, a professor in the Department of Electrical and Computer Engineering at Texas A&M…