What you need to know about audio deepfakes

Credit: Unsplash/CC0 Public Domain Audio deepfakes have had a recent bout of bad press after an AI-generated robocall purporting to be the voice of Joe Biden hit up New Hampshire…

Study exposes failings of measures to prevent illegal content generation by text-to-image AI models

Concept Inversion (CI) on Erased Stable Diffusion (ESD), Negative Prompt (NP) and Forget-Me-Not (FMN) for art concept. The first three columns demonstrate the effectiveness of concept erasure methods when using the prompt:…

Research exposes security, privacy and safety issues in female technology apps used to track fertility, monthly cycles

Credit: Pixabay/CC0 Public Domain Experts at Royal Holloway, University of London, Newcastle University, University of London, and ETH Zurich have identified significant security, privacy, and safety issues surrounding FemTech, which…

‘Fake love’ crypto scammers ensnare US victims

The use of romance as a hook to commit financial fraud is provoking new alarm. The “wine trader” wooed her online for months with his flirtatious smile and emoji-sprinkled texts.…

Is the future of open source software at risk due to protestware?

Credit: Pixabay/CC0 Public Domain SMU Associate Professor Christoph Treude examines the foundations for studies on open-source software and protestware. “Software developers don’t develop everything from scratch,” he says. “Just like…

An integrated shuffler optimizes the privacy of personal genomic data used for machine learning

KAUST researchers developed a machine-learning approach aimed at preserving privacy while analyzing omics data for medical research. Credit: 2024 KAUST; Heno Hwang By integrating an ensemble of privacy-preserving algorithms, a…

Research describes new protocol for stopping network interlopers

Credit: Texas A&M Engineering Dr. Santosh Ganji, a recent computer engineering doctoral graduate, and Dr. P.R. Kumar, a professor in the Department of Electrical and Computer Engineering at Texas A&M…

How automation is assisting forensic scientists in shoe print identification

Credit: Pixabay/CC0 Public Domain On the morning of Dec. 21, 1999, William Fyfe went to a clothing drop-off at Trinity Church in Toronto and left three pairs of running shoes.…

How secure is your security camera? Hackers can spy on cameras through walls, new research finds

Credit: Matthew Modoono/Northeastern University When it comes to protecting a bank or even your home, security cameras are on one of the first lines of defense. But what if those…

How to spot a deepfake

Created by our researchers using Midjourney, these diffusion model deepfakes illustrate the increasing realism and sophistication of the technology. Credit: CSIRO In a world where you can create a virtual…