AI-generated images, texts and audio files are so convincing that people are no longer able to distinguish them from human-generated content. This is the result of an online survey of about 3,000...
https://techxplore.com/news/2024-05-results-ai-humans-generated-media.html
Over the past few decades, cyber-attackers have devised increasingly sophisticated malware that can disrupt the functioning of computer systems or grant them access to sensitive data. The develop...
https://techxplore.com/news/2024-05-tackling-range-malware-tasks-holographic.html
The latest large-scale ransomware attack on a health technology provider, electronic prescription company MediSecure, was revealed last week.
https://techxplore.com/news/2024-05-medisecure-breach-health-lucrative-hackers.html
On a cold winter night in 2016, Ukrainians experienced the first-ever known blackout caused by malicious code (malware) designed to autonomously attack the power grid. One-fifth of Kyiv's citizen...
https://techxplore.com/news/2024-05-ukraine-blackouts-malware-evolving-cybersecurity.html
Virtual reality lets kids play 3D games with their friends as avatars, go back in time, even journey to outer space, all without leaving their living rooms.
https://techxplore.com/news/2024-05-parents-underestimate-privacy-kids-virtual.html
A team of AI researchers at AWS AI Labs, Amazon, has found that most, if not all, publicly available Large Language Models (LLMs) can be easily tricked into revealing dangerous or unethical infor...
A team of experts, including Monash University researchers, has developed a new technique to implement quantum-safe digital signatures twenty times faster, resulting in speedier and safer online ...
https://techxplore.com/news/2024-05-digital-transactions-quantum-safe-faster.html
Nearly two weeks after a cyberattack on Kansas City's website, contractors still can't get building permits. Zoning matters are going unheard.
https://techxplore.com/news/2024-05-bills-kansas-city-hampered-hack.html
They appear like ghosts in the night, standing outside your house, one holding up an antenna while the other crouches next to the car parked on the driveway. Within seconds, your car is gone, yet...
https://techxplore.com/news/2024-05-tech-car-keyless-vehicle-thefts.html
The UK's national security agency, MI5, warned in April that British universities participating in military research are targets for cyber-attacks by foreign states. More recently, news broke of ...
https://techxplore.com/news/2024-05-chinese-nationalist-groups-cyber.html
Metal coins may be just about the oldest medium of exchange still in use today, but ensuring their worth requires some of the most state-of-the-art technology available. Counterfeit coins remain ...
https://techxplore.com/news/2024-05-counterfeit-coins-easily-approach.html
Apps designed for female health monitoring are exposing users to unnecessary privacy and safety risks through their poor data handling practices, according to new research from King's College Lon...
https://techxplore.com/news/2024-05-female-health-apps-misuse-highly.html
Ascension, a major U.S. health care system with 140 hospitals in 19 states, announced late Thursday that a cyberattack has caused disruptions at some of its hospitals.
https://techxplore.com/news/2024-05-cyberattack-cripples-major-health-network.html
Recent trends show Australians are increasingly buying wearables such as smartwatches and fitness trackers. These electronics track our body movements or vital signs to provide data throughout th...
https://techxplore.com/news/2024-05-wearable-devices-harvest-neural-urgent.html
In a recent study merging the fields of quantum physics and computer science, Dr. Jun-Jie Zhang and Prof. Deyu Meng have explored the vulnerabilities of neural networks through the lens of the un...
https://techxplore.com/news/2024-05-scientists-uncover-quantum-vulnerabilities-neural.html
Researchers have demonstrated a new tool that analyzes open-source software updates to specify which sections of code are being modified to address recently identified security vulnerabilities. T...
https://techxplore.com/news/2024-05-tool-source-software.html
In 2022, when the U.S. Supreme Court overturned Roe v. Wade—ending the constitutional right to an abortion—privacy advocates warned women against using smartphone apps to track their periods.
Professor Dirk Helbing of ETH Zurich and Austria's Complexity Science Hub expects future digital technologies to penetrate the human body even more in the future. However, he believes that societ...
https://techxplore.com/news/2024-05-converging-technologies.html
Researchers at ETH Zurich have developed a smartphone app that can be used to check the authenticity of documents and other items. Extracts from the debt enforcement register of the City of Zuric...
https://techxplore.com/news/2024-05-smartphone-app-unmask-forged-documents.html
Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects...
https://techxplore.com/news/2024-05-scientists-vulnerability-cloud-server-hardware.html
Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well-tra...
https://techxplore.com/news/2024-05-cybersecurity-varies-widely.html
New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR ...
https://techxplore.com/news/2024-05-vr-poses-privacy-kids-parents.html
The news about the Israel-Hamas war is filled with reports of Israeli families huddling in fear from relentless rocket attacks, Israeli tanks and artillery flattening buildings in the Gaza Strip,...
https://techxplore.com/news/2024-05-cyberwar-israel-hamas-reveals-civilian.html
Unfortunately, hackers didn't need sophisticated skills to pull off one of the nation's most alarming and consequential health care ransomware attacks.
https://techxplore.com/news/2024-05-bolster-safeguards-health-cyberattack.html
Sleep-deprived and anxious about feeding their babies, tens of thousands of moms in Illinois and elsewhere recently turned to a variety of Facebook groups offering support for breastfeeding, pump...
https://techxplore.com/news/2024-05-breastfeeding-moms-photos-videos-purported.html
Taiwan stands out as a beacon of democracy, innovation and resilience in an increasingly autocratic region. But this is under growing threat.
https://techxplore.com/news/2024-05-taiwan-experiencing-millions-cyberattacks-day.html
Just like the Olympic athletes, the cyberwarriors that will be crucial for the success of the Paris Games are deep into training for the big event.
https://techxplore.com/news/2024-05-french-cyberwarriors-ready-defense-hackers.html
A group of French parliamentarians has sounded the alarm over what they say is an inadequate government response to cyberattacks targeting their computers and attributed to China.
https://techxplore.com/news/2024-05-french-lawmakers-alarm-alleged-chinese.html
Israel's Iron Dome defense system has long shielded it from incoming rockets. Now it is building a "cyber dome" to defend against online attacks, especially from arch foe Iran.
https://techxplore.com/news/2024-05-israel-cyber-dome-iran-hackers.html
A Ukrainian man was sentenced to more than 13 years in prison in Texas on Wednesday for his role in ransomware attacks by the notorious Russia-based REvil hacking group, the US Justice Department...
https://techxplore.com/news/2024-05-years-prison-ukrainian-revil-hacker.html