Credit: CC0 Public Domain A leading Egyptian opposition politician was targeted with spyware multiple times after announcing a presidential bid—including with malware that automatically infects smartphones, security researchers have found.…
Tag: Security
Investigating shadow profiles: The data of others
Analysis of information linkage in a social network. Credit: David Garcia Shadow profiles in social networks contain information about people who are not members. At the moment, shadow profiles are…
Two Vegas casinos fell victim to cyberattacks, shattering the image of impenetrable casino security
An error message is displayed on a machine at MGM Grand in Las Vegas, Tuesday, Sept. 12, 2023. MGM Resorts said a cybersecurity attack began Sunday, affecting reservations and casino…
Using the brain as a model inspires a more robust AI
Bird or monkey? To our eyes the input images x1 and x2 look the same, but hidden features nudge a typical neural network to classify this bird image as a…
A decentralized, blockchain-based messaging network for safer communications
Credit: Shuhan et al Data and security breaches are becoming increasingly common, highlighting the vulnerabilities of existing messaging and communications platforms. Devising computational tools and systems that better protect sensitive…
Cyberattack keeps hospitals’ computers offline for weeks
A man leaves the Los Angeles Community Hospital in Los Angeles on Friday, Aug. 4, 2023. Hospitals, including this one, and clinics in several states on Friday began the time-consuming…
Don’t expect quick fixes in ‘red-teaming’ of AI models. Security was an afterthought
The OpenAI logo is seen on a mobile phone in front of a computer screen which displays output from ChatGPT, Tuesday, March 21, 2023, in Boston. White House officials concerned…
Computer security experts offer advice to freeze out risk of thermal attacks
Thermal camera. Credit: University of Glasgow A team of computer security experts have developed a set of recommendations to help defend against “thermal attacks” which can steal personal information. Thermal…
Field campaign assesses vulnerabilities of 5G networks
The team deployed two trucks containing sensor systems to perform 5G signal geolocation based on angle-of-arrival estimates. Credit: Massachusetts Institute of Technology Fifth-generation, or 5G, mobile network technology is all…
Putting a premium on peace of mind
Credit: Pixabay/CC0 Public Domain Two out of five homes worldwide have at least one smart device that is vulnerable to cyber-attacks. Soon, that new smart TV or robot vacuum you’ve…