A decentralized, blockchain-based messaging network for safer communications

Credit: Shuhan et al Data and security breaches are becoming increasingly common, highlighting the vulnerabilities of existing messaging and communications platforms. Devising computational tools and systems that better protect sensitive…

Cyberattack keeps hospitals’ computers offline for weeks

A man leaves the Los Angeles Community Hospital in Los Angeles on Friday, Aug. 4, 2023. Hospitals, including this one, and clinics in several states on Friday began the time-consuming…

Don’t expect quick fixes in ‘red-teaming’ of AI models. Security was an afterthought

The OpenAI logo is seen on a mobile phone in front of a computer screen which displays output from ChatGPT, Tuesday, March 21, 2023, in Boston. White House officials concerned…

Computer security experts offer advice to freeze out risk of thermal attacks

Thermal camera. Credit: University of Glasgow A team of computer security experts have developed a set of recommendations to help defend against “thermal attacks” which can steal personal information. Thermal…

Field campaign assesses vulnerabilities of 5G networks

The team deployed two trucks containing sensor systems to perform 5G signal geolocation based on angle-of-arrival estimates. Credit: Massachusetts Institute of Technology Fifth-generation, or 5G, mobile network technology is all…

Putting a premium on peace of mind

Credit: Pixabay/CC0 Public Domain Two out of five homes worldwide have at least one smart device that is vulnerable to cyber-attacks. Soon, that new smart TV or robot vacuum you’ve…

A cyberattack has disrupted hospitals and health care in several states

Manchester Memorial Hospital is seen Friday, Aug. 4, 2023 in Manchester, Conn. A cyberattack has disrupted hospital computer systems in several states, forcing some emergency rooms to close and ambulances…

Making smart city infrastructure watertight in Vietnam

Hạ Long Bay, Thành phố Hạ Long, Quảng Ninh, Vietnam. Credit: Unsplash/CC0 Public Domain Research in the International Journal of Critical Infrastructures offers guidance on securing water critical infrastructures and…

New smartphone vulnerability could allow hackers to track user location

Hackers may use machine learning to exploit a text-messaging vulnerability, according to new research led by Northeastern Ph.D. student Evangelos Bitsikas. Credit: Alyssa Stone/Northeastern University A newly discovered vulnerability in…

OpenAI backs idea of requiring licenses for advanced AI systems

Credit: Unsplash/CC0 Public Domain An internal policy memo drafted by OpenAI shows the company supports the idea of requiring government licenses from anyone who wants to develop advanced artificial intelligence…