Health-monitoring apps can help people manage chronic diseases or stay on track with fitness goals, using nothing more than a smartphone. However, these apps can be slow and energy-inefficient be...
https://techxplore.com/news/2024-04-tiny-chip-safeguard-user-enabling.html
Following three years of intensive research, an international team of researchers have compiled the first ever "World Cybercrime Index," which identifies the globe's key cybercrime hotspots by ra...
https://techxplore.com/news/2024-04-world-cybercrime-index-countries-threat.html
A user could ask ChatGPT to write a computer program or summarize an article, and the AI chatbot would likely be able to generate useful code or write a cogent synopsis. However, someone could al...
https://techxplore.com/news/2024-04-faster-ai-chatbot-toxic-responses.html
Security experts fear Q-Day, the day when quantum computers become so powerful that they can crack today's passwords. Some experts estimate that this day will come within the next ten years. Pass...
https://techxplore.com/news/2024-04-art-passwords-biochemistry.html
From robotic vacuum cleaners and smart fridges to baby monitors and delivery drones, the smart devices being increasingly welcomed into our homes and workplaces use vision to take in their surrou...
https://techxplore.com/news/2024-04-privacy-robotic-cameras-obscure-images.html
"Privacy. That's iPhone," the slogan proclaims. New research from Aalto University begs to differ.
A team of computer scientists at the University of Chicago has uncovered a potential vulnerability in virtual reality systems—one that could allow a hacker to insert what the team describes as ...
https://techxplore.com/news/2024-03-vulnerability-virtual-reality.html
Quantum computers, which can solve several complex problems exponentially faster than classical computers, are expected to improve artificial intelligence (AI) applications deployed in devices li...
A team of security experts at the University of Florida working with security audit company CertiK has found that a certain class of cyberattacks could cause a smartphone to catch fire via its wi...
https://techxplore.com/news/2024-02-cyberattack-smartphone-wireless-charger.html
Researchers at the University of Trento, Italy, have developed a novel approach for prime factorization via quantum annealing, leveraging a compact modular encoding paradigm and enabling the fact...
https://techxplore.com/news/2024-02-quantum-annealers-future-prime-factorization.html
A few years ago, MIT researchers invented a cryptographic ID tag that is several times smaller and significantly cheaper than the traditional radio frequency tags (RFIDs) that are often affixed t...
https://techxplore.com/news/2024-02-tiny-tamper-proof-id-tag.html
A research team at Los Alamos National Laboratory is using artificial intelligence to address several critical shortcomings in large-scale malware analysis, making significant advancements in the...
By integrating an ensemble of privacy-preserving algorithms, a KAUST research team has developed a machine-learning approach that addresses a significant challenge in medical research: How to use...
https://techxplore.com/news/2024-02-shuffler-optimizes-privacy-personal-genomic.html
Facial recognition systems, computational tools that can recognize individuals in images or video footage, are now widely employed worldwide. Some users and developers, however, have raised priva...
https://techxplore.com/news/2024-01-camera-based-anti-facial-recognition.html
Pet owners are increasingly turning to technology for various pet care purposes such as feeding, health monitoring and activity and movement tracking. Much of this technology operates via devices...
https://techxplore.com/news/2024-01-pet-technology-meant-pets-owners.html
Large language models (LLMs), deep learning-based models trained to generate, summarize, translate and process written texts, have gained significant attention after the release of Open AI's conv...
https://techxplore.com/news/2024-01-simple-technique-defend-chatgpt-jailbreak.html
In George Orwell's novel "1984," Big Brother watches citizens through two-way, TV-like telescreens to surveil citizens without any cameras. In a similar fashion, our current smart devices contain...
https://techxplore.com/news/2024-01-smart-devices-ambient-sensors-pose.html
An emergency room doctor using augmented reality could save precious seconds by quickly checking a patient's vitals or records. But the doctor could also unintentionally pull information for some...
https://techxplore.com/news/2024-01-tech-augmented-reality-privacy-problem.html
A team of AI experts at Anthropic, the group behind the chatbot Claude, has found that LLMs can be exploited to engage in deceptive behavior with general users. They have published a paper descri...
https://techxplore.com/news/2024-01-team-anthropic-llms-engage-deceptive.html
UC Riverside computer scientists have identified a security flaw in vision language artificial intelligence (AI) models that can allow bad actors to use AI for nefarious purposes, such as obtaini...
https://techxplore.com/news/2024-01-scientists-flaw-ai-query.html
From "Law and Order" to "CSI," not to mention real life, investigators have used fingerprints as the gold standard for linking criminals to a crime. But if a perpetrator leaves prints from differ...
https://techxplore.com/news/2024-01-ai-fingerprint-unique.html
Computer scientists from Nanyang Technological University, Singapore (NTU Singapore) have managed to compromise multiple artificial intelligence (AI) chatbots, including ChatGPT, Google Bard and ...
https://techxplore.com/news/2023-12-ai-chatbots-jailbreak.html
One month after OpenAI unveiled a program that allows users to easily create their own customized ChatGPT programs, a research team at Northwestern University is warning of a "significant securit...
https://techxplore.com/news/2023-12-customized-gpt-vulnerability.html
Open source software—software that is freely distributed, along with its source code, so that copies, additions, or modifications can be readily made —is "everywhere," to quote the 2023 Open ...
https://techxplore.com/news/2023-12-boosting-faith-authenticity-source-software.html
While OpenAI's first words on its company website refer to a "safe and beneficial AI," it turns out your personal data is not as safe as you believed. Google researchers announced this week that ...
https://techxplore.com/news/2023-12-prompts-chatgpt-leak-private.html
Recent advances in generative artificial intelligence have spurred developments in realistic speech synthesis. While this technology has the potential to improve lives through personalized voice ...
https://techxplore.com/news/2023-11-defending-voice-deepfakes.html
Receiving a bogus designer handbag or imitation Wagyu beef might infuriate a Cyber Monday consumer, but a knock-off respirator or a fake pacemaker could imperil them.
https://techxplore.com/news/2023-11-cyber-monday-legit-app.html
A Georgia Tech researcher has successfully evaded security measures on Apple's latest MacBook Pro with the M3 processor chip to capture his fictional target's Facebook password and second-factor ...
https://techxplore.com/news/2023-11-apple-macbook-pro-weeks.html
Distributed cloud storage is a hot topic for security researchers around the globe pursuing secure data storage, and a team in China is now merging quantum physics with mature cryptography and st...
https://techxplore.com/news/2023-11-cloud-storage-approach-quantum-physics.html
Blockchain, a disruptive technology of our time, holds the potential to change our lives for the better. The insurance sector is a prime illustration.
https://techxplore.com/news/2023-11-blockchain-game-changer-industry-people.html