AI can support humanitarian organizations in armed conflict or crisis, but they should understand potential risks

Credit: Pixabay/CC0 Public Domain AI can help humanitarians gain crucial insights to better monitor and anticipate risks, such as a conflict outbreak or escalation. But deploying systems in this context…

Cybercrime groups restructuring after major takedowns: Experts

Law enforcement was able to disrupt the LockBit gang earlier in 2024 and take over much of its network. Cybercrime gangs are looking to rebuild with new tactics after global…

We analyzed the entire web and found a cybersecurity threat lurking in plain sight

Credit: Pixabay/CC0 Public Domain Our latest research has found that clickable links on websites can often be redirected to malicious destinations. We call these “hijackable hyperlinks” and have found them…

US House okays renewal of controversial surveillance program

A part of the US surveillance program known as Section 702 allows intelligence agencies to conduct warrantless electronic monitoring of foreigners outside the United States. The US House of Representatives…

Computer scientists discover gap in the latest security mechanisms used by some chips

Credit: CC0 Public Domain Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely…

Cybersecurity attacks have the potential to infiltrate medical devices and cripple health care, expert warns

Credit: Pixabay/CC0 Public Domain The cyberattack on Change Healthcare last month should serve as a wake-up call for the health care industry, which needs to focus on securing its infrastructure,…

What you need to know about audio deepfakes

Credit: Unsplash/CC0 Public Domain Audio deepfakes have had a recent bout of bad press after an AI-generated robocall purporting to be the voice of Joe Biden hit up New Hampshire…

Study exposes failings of measures to prevent illegal content generation by text-to-image AI models

Concept Inversion (CI) on Erased Stable Diffusion (ESD), Negative Prompt (NP) and Forget-Me-Not (FMN) for art concept. The first three columns demonstrate the effectiveness of concept erasure methods when using the prompt:…

Research exposes security, privacy and safety issues in female technology apps used to track fertility, monthly cycles

Credit: Pixabay/CC0 Public Domain Experts at Royal Holloway, University of London, Newcastle University, University of London, and ETH Zurich have identified significant security, privacy, and safety issues surrounding FemTech, which…

‘Fake love’ crypto scammers ensnare US victims

The use of romance as a hook to commit financial fraud is provoking new alarm. The “wine trader” wooed her online for months with his flirtatious smile and emoji-sprinkled texts.…