Credit: Pixabay/CC0 Public Domain AI can help humanitarians gain crucial insights to better monitor and anticipate risks, such as a conflict outbreak or escalation. But deploying systems in this context…
Tag: Security
Cybercrime groups restructuring after major takedowns: Experts
Law enforcement was able to disrupt the LockBit gang earlier in 2024 and take over much of its network. Cybercrime gangs are looking to rebuild with new tactics after global…
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
Credit: Pixabay/CC0 Public Domain Our latest research has found that clickable links on websites can often be redirected to malicious destinations. We call these “hijackable hyperlinks” and have found them…
US House okays renewal of controversial surveillance program
A part of the US surveillance program known as Section 702 allows intelligence agencies to conduct warrantless electronic monitoring of foreigners outside the United States. The US House of Representatives…
Computer scientists discover gap in the latest security mechanisms used by some chips
Credit: CC0 Public Domain Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely…
Cybersecurity attacks have the potential to infiltrate medical devices and cripple health care, expert warns
Credit: Pixabay/CC0 Public Domain The cyberattack on Change Healthcare last month should serve as a wake-up call for the health care industry, which needs to focus on securing its infrastructure,…
What you need to know about audio deepfakes
Credit: Unsplash/CC0 Public Domain Audio deepfakes have had a recent bout of bad press after an AI-generated robocall purporting to be the voice of Joe Biden hit up New Hampshire…
Study exposes failings of measures to prevent illegal content generation by text-to-image AI models
Concept Inversion (CI) on Erased Stable Diffusion (ESD), Negative Prompt (NP) and Forget-Me-Not (FMN) for art concept. The first three columns demonstrate the effectiveness of concept erasure methods when using the prompt:…
Research exposes security, privacy and safety issues in female technology apps used to track fertility, monthly cycles
Credit: Pixabay/CC0 Public Domain Experts at Royal Holloway, University of London, Newcastle University, University of London, and ETH Zurich have identified significant security, privacy, and safety issues surrounding FemTech, which…
‘Fake love’ crypto scammers ensnare US victims
The use of romance as a hook to commit financial fraud is provoking new alarm. The “wine trader” wooed her online for months with his flirtatious smile and emoji-sprinkled texts.…