Security news

Security

DeFake tool protects voice recordings from cybercriminals

In what has become a familiar refrain when discussing artificial intelligence (AI)-enabled technologies, voice cloning makes possible beneficial advances in accessibility and creativity while also enabling increasingly sophisticated ...

Computer Sciences

Linkable and traceable anonymous authentication with fine-grained access control

Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user's identity in a privacy-preserving way. If enough privacy is provided, malicious users may misuse privacy. ...

Internet

AI is making smart devices easier to hack—here's how to stay safe

From asking our smart speakers for the weather to receiving personalized advice from smartwatches, devices powered by artificial intelligence (AI) are increasingly streamlining our routines and decision making. The technology ...

Internet

Websites deceive users by deliberately hiding the extent of data collection and sharing

Websites sometimes hide how widely they share our personal information, and can go to great lengths to pull the wool over our eyes. This deception is intended to prevent full disclosure to consumers, thus preventing informed ...

Internet

US House okays renewal of controversial surveillance program

The US House of Representatives voted Friday to reauthorize an electronic surveillance program targeting foreigners, a practice officials say is critical to national security but criticized by opponents over concerns for ...

Security

Research introduces new approach for detecting deepfakes

Research published in the International Journal of Ad Hoc and Ubiquitous Computingintroduces a new approach to tackling the challenges posed by deepfake technology, which generates manipulated media content that closely resembles ...

Security

NIST releases version 2.0 of cybersecurity framework

The National Institute of Standards and Technology (NIST) has updated the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. The new 2.0 edition is designed for all ...

Security

So you've been scammed by a deepfake. What can you do?

Earlier this month, a Hong Kong company lost HK$200 million (A$40 million) in a deepfake scam. An employee transferred funds following a video conference call with scammers who looked and sounded like senior company officials.

Security

'Fake love' crypto scammers ensnare US victims

The "wine trader" wooed her online for months with his flirtatious smile and emoji-sprinkled texts. Then he went for the kill, defrauding the Philadelphia-based tech professional out of $450,000 in a cryptocurrency romance ...

Computer Sciences

Quantum annealers and the future of prime factorization

Researchers at the University of Trento, Italy, have developed a novel approach for prime factorization via quantum annealing, leveraging a compact modular encoding paradigm and enabling the factorization of large numbers ...

Security

Global operation smashes 'most harmful cyber crime group'

An international operation led by UK and US law enforcement has severely disrupted "the world's most harmful cybercrime group", the Russian-linked ransomware specialist LockBit, officials announced Tuesday.

Business

Research reveals massive failures in US cybersecurity laws

In the world of advancing technology, cyberattacks have been on the rise, causing a potential risk of stolen personal data across 400 million users. In response, governments in all 50 states have introduced breach notification ...