Study reveals vulnerability of metaverse platforms to cyber attacks

Visualization to the paper “The Big Brother’s New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User’s Perspective” Credit: CISPA Having access to virtual worlds from…

Security flaw in computer memory leads to worldwide fixes

BadRAM logo. Credit: University of Birmingham Cyber security experts studying memory modules in computers have uncovered a key weakness that has led to worldwide security fixes in AMD computer processors.…

Scammers exploit tiny typos to trick people into sending money to their crypto wallets

Are you tracking your health with a device? Here’s what could happen with the data

Credit: Pixabay/CC0 Public Domain Every day, millions of people share more intimate information with their accessories than they do with their spouse. Wearable technology—smartwatches, smart rings, fitness trackers and the…

Common way to test for leaks in large language models may be flawed

This slide shows how a membership inference attack might start. Assessing the product of an app asked to generate an image of a professor teaching students in “the style of”…

50 countries warn UN of ransomware attacks on hospitals

Credit: Pixabay/CC0 Public Domain The World Health Organization and some 50 countries issued a warning Friday at the United Nations about the rise of ransomware attacks against hospitals, with the…

Secure messaging through distributed messages

Credit: Pixabay/CC0 Public Domain Most internet communications today rely on the TLS (Transport Layer Security) protocol, which protects against eavesdropping on the network, but not against access by service providers…

Study shows that LLMs could maliciously be used to poison biomedical knowledge graphs

Scorpius generates a malicious paper and mixes it with real papers. This poisoned knowledge graph will contain a malicious link. As a result, the relevance between a promoted drug and…

AI video generation expert discusses the technology’s rapid advances—and its current limitations

Credit: AI-generated image This presidential cycle has already seen several high-profile examples of people using deepfakes to try to influence voters. Deepfakes are images, audio recordings, or videos generated or…

Dangers of the metaverse and VR for US youth revealed in new research

32.6% of U.S. youth own a virtual reality (VR) headset (41% of boys vs. 25.1% of girls). Credit: Florida Atlantic University The metaverse, a space where the lines between physical…