If you've spent time on Facebook over the past six months, you may have noticed photorealistic images that are too good to be true: children holding paintings that look like the work of professio...
https://techxplore.com/news/2024-04-shrimp-jesus-fake-portraits-ai.html
In February, OpenAI released videos created by its generative artificial intelligence program Sora. The strikingly realistic content, produced via simple text prompts, is the latest breakthrough ...
https://techxplore.com/news/2024-04-trail-deepfakes-fingerprints-ai-generated.html
Australia's top spy on Wednesday urged greater cooperation from the big tech companies, asking them to break a long-held industry taboo by providing access to encrypted messages.
https://techxplore.com/news/2024-04-australia-spy-urges-big-tech.html
UnitedHealth says files with personal information that could cover a "substantial portion of people in America" may have been taken in the cyberattack earlier this year on its Change Healthcare b...
https://techxplore.com/news/2024-04-unitedhealth-wide-swath-patient-cyberattack.html
Cyberattacks on businesses are rising, including small businesses. It's a troubling trend because a breach can be very costly and time consuming if owners don't have a plan to deal with one.
https://techxplore.com/news/2024-04-cyberattacks-small-businesses.html
Health-monitoring apps can help people manage chronic diseases or stay on track with fitness goals, using nothing more than a smartphone. However, these apps can be slow and energy-inefficient be...
https://techxplore.com/news/2024-04-tiny-chip-safeguard-user-enabling.html
In what has become a familiar refrain when discussing artificial intelligence (AI)-enabled technologies, voice cloning makes possible beneficial advances in accessibility and creativity while als...
https://techxplore.com/news/2024-04-defake-tool-voice-cybercriminals.html
Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user's identity in a privacy-preserving way. If enough privacy is provided, mali...
https://techxplore.com/news/2024-04-linkable-traceable-anonymous-authentication-fine.html
A website that allowed international cyber fraudsters to trick up to 70,000 British victims into revealing personal information such as bank account details and passwords has been infiltrated and...
https://techxplore.com/news/2024-04-uk-police-disrupted-cyber-fraud.html
A cyber group with links to Russian military intelligence is set to become a significant global threat after playing an increasing critical role in the ongoing conflict in Ukraine, a leading cybe...
https://techxplore.com/news/2024-04-russian-cyber-sabotage-global-threat.html
Colorado on Wednesday expanded its privacy law to include brain data gathered by the booming array of gadgets people use for feedback about sleep, fitness, sports, and lifestyle.
https://techxplore.com/news/2024-04-colorado-law-brain-captured-gadgets.html
Websites sometimes hide how widely they share our personal information, and can go to great lengths to pull the wool over our eyes. This deception is intended to prevent full disclosure to consum...
https://techxplore.com/news/2024-04-websites-users-deliberately-extent.html
From asking our smart speakers for the weather to receiving personalized advice from smartwatches, devices powered by artificial intelligence (AI) are increasingly streamlining our routines and d...
https://techxplore.com/news/2024-04-ai-smart-devices-easier-hack.html
A class-action lawsuit filed in North Carolina accuses Atrium Health of allowing Facebook and Google to access patient information online to use in targeted ads.
https://techxplore.com/news/2024-04-atrium-health-patient-facebook-class.html
The Paris Olympics are bracing themselves to fight off an unprecedented level of cyber attacks, for the first time augmented by artificial intelligence.
https://techxplore.com/news/2024-04-paris-cyber-games-real.html
Researchers at Pohang University of Science and Technology (POSTECH) have advanced online security by integrating an AI-based metasurface with oblique helicoidal cholesteric liquid crystals.
https://techxplore.com/news/2024-04-safeguarding-future-online-ai-metasurfaces.html
The world's largest seller of cybersecurity products has a problem with its own cybersecurity.
https://techxplore.com/news/2024-04-microsoft-hacks-grapples-problem-years.html
A report by Jerusalem-based investigative journalists published in +972 magazine finds that AI targeting systems have played a key role in identifying—and potentially misidentifying—tens of t...
https://techxplore.com/news/2024-04-israel-ai-human-innocents-caught.html
Modern websites place ever greater demands on the computing power of computers. For this reason, web browsers have also had access to the computing capacities of the graphics card (Graphics Proce...
https://techxplore.com/news/2024-04-vulnerability-browser-interface-access-graphics.html
The US House of Representatives voted Friday to reauthorize an electronic surveillance program targeting foreigners, a practice officials say is critical to national security but criticized by op...
https://techxplore.com/news/2024-04-house-okays-renewal-controversial-surveillance.html
The law and Artificial Intelligence (AI) applications need to be better aligned to ensure our personal data and privacy are protected. Ph.D. candidate Andreas Häuselmann can see opportunities wi...
https://techxplore.com/news/2024-04-ai-future-job-law-technology.html
Following three years of intensive research, an international team of researchers have compiled the first ever "World Cybercrime Index," which identifies the globe's key cybercrime hotspots by ra...
https://techxplore.com/news/2024-04-world-cybercrime-index-countries-threat.html
In 2012 a 15-year-old girl died in Berlin after being hit by a subway train. Her bereaved parents asked Facebook to turn over her private messages in hopes of understanding whether her death was ...
A user could ask ChatGPT to write a computer program or summarize an article, and the AI chatbot would likely be able to generate useful code or write a cogent synopsis. However, someone could al...
https://techxplore.com/news/2024-04-faster-ai-chatbot-toxic-responses.html
Over the past year, the prevalence and potential dangers of deepfakes have raised concerns related to personal privacy, business ethics and even election interference.
Security experts fear Q-Day, the day when quantum computers become so powerful that they can crack today's passwords. Some experts estimate that this day will come within the next ten years. Pass...
https://techxplore.com/news/2024-04-art-passwords-biochemistry.html
A recent analysis by Helene Pleil, research associate at the Digital Society Institute (DSI) at ESMT Berlin, alongside colleagues from Technical University Darmstadt, outlines that rapid technolo...
https://techxplore.com/news/2024-04-sanction-cyberweapons-weapons-expert.html
Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using sh...
https://techxplore.com/news/2024-04-scientists-gap-latest-mechanisms-chips.html
Outside the world of open-source software, it's likely few people would have heard about XZ Utils, a small but widely used tool for data compression in Linux systems. But late last week, security...
https://techxplore.com/news/2024-04-anonymous-coder-hacked-big-chunk.html
From robotic vacuum cleaners and smart fridges to baby monitors and delivery drones, the smart devices being increasingly welcomed into our homes and workplaces use vision to take in their surrou...
https://techxplore.com/news/2024-04-privacy-robotic-cameras-obscure-images.html