Security news
Consumer & Gadgets
Websites are tracking you via browser fingerprinting, researchers show
Clearing your cookies is not enough to protect your privacy online. New research led by Texas A&M University has found that websites are covertly using browser fingerprinting—a method to uniquely identify a web browser—to ...
1 hour ago
0
2
Security
Computer tracking, an 'electronic collar': Gilles Deleuze's 1990 postscript on the societies of control
Gilles Deleuze was one of the most original and imaginative thinkers of postwar France. A lifelong teacher, he spent most of his career at the University of Paris VIII, influencing generations of students but largely shunning ...
7 hours ago
0
0
Can a foreign government hack WhatsApp? A cybersecurity expert explains how that might work
Earlier today, Iranian officials urged the country's citizens to remove the messaging platform WhatsApp from their smartphones. Without providing any supporting evidence, they alleged the app gathers user information to send ...
9 hours ago
0
0
Hackers could use smartwatches to eavesdrop on air-gapped computers via ultrasonic signals
A security specialist at Ben-Gurion University of the Negev has found evidence that it might be possible to infiltrate an air-gap computing system using a smartwatch. Mordechai Guri has published a paper outlining his ideas ...
Brain-like chips are boosting computers and battling cybercrime
The human brain is more powerful and energy-efficient than any computer. Scientists are imitating the way it works to produce better computer chips and help deal with the growing amounts of data generated every day.
Jun 12, 2025
0
3
Security
With retail cyberattacks on the rise, customers find orders blocked and shelves empty
A string of recent cyberattacks and data breaches involving the systems of major retailers have started affecting shoppers.
Jun 12, 2025
0
0
Consumer & Gadgets
AI tools collect and store data about you from all your devices. Here's how to be aware of what you're revealing
Like it or not, artificial intelligence has become part of daily life. Many devices—including electric razors and toothbrushes—have become "AI-powered," using machine learning algorithms to track how a person uses the ...
Jun 12, 2025
0
1
Hardware
New security flaw allows eavesdropping via laptop and smart speaker microphones
The ghostly woman's voice pipes through the speakers, covered in radio static but her message intact from beyond—"The birch canoe slid on the smooth planks."
Jun 11, 2025
0
20
Energy & Green Tech
Researchers fight cyber threats at aging US hydropower system
Washington generates more hydroelectricity than any other state, so it is fitting that research to protect the critical infrastructure responsible for generating this power is happening right here in the Tri-Cities, at the ...
Jun 10, 2025
0
0
Security
Using AI to improve flagging of internal threats within the US Army
Research published in the International Journal of Applied Decision Sciences describes how artificial intelligence could be used to root out internal threats in the U.S. Army. The research centers on the Army's Insider Threat ...
Jun 9, 2025
0
0
Security
If you're in this California town for two hours, the city is tracking you. Should you be worried?
Any time you spend two hours in Walnut Creek, California, local business leaders may be tracking you. The city's Chamber of Commerce has paired with a tech company to clock visitors as they move in and out of the city.
Jun 5, 2025
2
0
Security
How illicit markets fueled by data breaches sell your personal information to criminals
Every year, massive data breaches harm the public. The targets are email service providers, retailers and government agencies that store information about people. Each breach includes sensitive personal information such as ...
Jun 5, 2025
0
0
Consumer & Gadgets
Research reveals how fake social media accounts could be the cause of serious security breaches
New research led by the University of Portsmouth has found that fake social media profiles, particularly LinkedIn accounts, are a leading cause of security breaches among professionals.
Jun 5, 2025
0
0
Computer Sciences
Prepping for Q-Day: Physics-based encryption aims to secure data in the quantum computing era
In our hyper-connected world, we rely on encrypted communications every day—to shop online, digitally sign documents, make bank transactions, check our steps on fitness trackers.
Jun 4, 2025
0
15
Internet
'Not available in your region': What is a VPN and how can I use one safely?
"This video is not available in your location." It's a message familiar to many people trying to watch global content online. But beneath this frustration lies a deeper question—how do we navigate digital borders safely ...
Jun 4, 2025
0
0
Security
Senior public servants think GenAI will boost productivity—but are worried about the risks
Many bold claims have been made about generative artificial intelligence (GenAI) and its capacity to improve productivity and generate workplace efficiencies.
Jun 4, 2025
0
0
Business
Privacy abuse involving Meta and Yandex discovered
An international research collaboration has recently uncovered a potential privacy abuse involving Meta and the Russian tech giant Yandex. They found that native Android apps—including Facebook, Instagram, and several Yandex ...
Jun 3, 2025
0
50
Security
Is a quantum-cryptography apocalypse imminent?
Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times ...
Jun 3, 2025
0
19
Business
Google's SynthID is the latest tool for catching AI-made content. What is AI 'watermarking,' and does it work?
Last month, Google announced SynthID Detector, a new tool to detect AI-generated content. Google claims it can identify AI-generated content in text, image, video or audio.
Jun 3, 2025
0
2
Internet
Circumventing internet censorship in countries like China or Iran
Free access to information online is a vital component of democratic societies. However, something that is taken for granted in this country is by no means possible everywhere.
Jun 2, 2025
1
18
Security
AI strategies promise smarter systems without sacrificing personal privacy
Every time you open an app, visit the doctor, or make an online purchase, you're generating data. That data feeds the artificial intelligence (AI) systems that help businesses improve services, doctors detect diseases faster, ...
Jun 2, 2025
0
0
Engineering
Q&A: How electro-optical sensors can offer improved protection against missile attacks
Satellite-based electro-optical sensors are intended to detect missile launches early on, gaining valuable time for initiating countermeasures in case of an attack. The Fraunhofer Institute of Optronics, System Technologies ...
Jun 2, 2025
0
0
Hi Tech & Innovation
Secure encryption and decryption with luminescent perovskites
To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal ...
May 27, 2025
0
11
Security
'Kisses from Prague': The fall of a Russian ransomware giant
The sudden fall of a ransomware supplier once described as the world's most harmful cybercrime group has raised questions about Moscow's role in its development and the fate of its founder.
May 27, 2025
0
18
Engineering
Nets and high-tech hijackings: Anti-drone systems offer new ways to counter rising threats
Drones have harassed airports and bedeviled local police. They have trespassed over nuclear plants and prisons. On the battlefield, they can kill.
May 27, 2025
0
0