A South Korean research team has succeeded in developing a new technology that can detect and track illegal flying drones that cause crimes such as unauthorized flying, terrorism, and privacy inv...
https://techxplore.com/news/2024-11-technology-track-illegal-flying-drones.html
Automated social media profiles are a powerful tool for spreading propaganda. They often feature AI-generated profile pictures. Researchers are currently looking into ways of identifying such ima...
https://techxplore.com/news/2024-11-common-fake-profile-pictures-twitter.html
Alongside artificial intelligence, quantum computing is one of the fastest-growing subsets in the high-performance computing community. But what happens when this relatively new and powerful comp...
More of our personal data is now collected and stored online than ever before in history. The rise of data breaches should unsettle us all.
https://techxplore.com/news/2024-11-struggle-professionals-privacy-front-line.html
Most internet communications today rely on the TLS (Transport Layer Security) protocol, which protects against eavesdropping on the network, but not against access by service providers themselves...
Billions of people around the world are using internet-connected medical devices to monitor their health, but could be putting themselves at risk of hackers using their data for unhealthy reasons...
https://techxplore.com/news/2024-10-health-devices-hacked.html
Australia's new digital ID system promises to transform the way we live. All of our key documents, such as driver's licenses and Medicare cards, will be in a single digital wallet, making it easi...
https://techxplore.com/news/2024-10-australia-digital-id-scheme-falls.html
When you visit a doctor, information such as medication prescriptions, X-rays, and genetic tests is recorded to assist the physician. In these cases, a technology called federated learning, or co...
https://techxplore.com/news/2024-10-algorithms-privacy-sensitive.html
A global police operation shut down the servers of one of the world's largest malware platforms that targeted millions of victims, the EU's judicial arm said on Tuesday.
https://techxplore.com/news/2024-10-global-police-malware-group-millions.html
With technology evolving rapidly, the amount of fraud against seniors is increasing at an alarming rate. Fraud is now the leading crime committed against seniors in Canada.
https://techxplore.com/news/2024-10-scale-fraud-seniors-huge.html
As the amount of data that people and machines create, collect, process, and store continues to increase in size and complexity, so does the task of keeping cyber systems safe and secure from eve...
https://techxplore.com/news/2024-10-eye-topological-signatures-cyber-threats.html
In recent years, medical researchers have devised various new techniques that can help them to organize and analyze large amounts of research data, uncovering links between different variables (e...
https://techxplore.com/news/2024-10-llms-maliciously-poison-biomedical-knowledge.html
NYU researchers have identified a new material-level security risk in an emerging medical technology known as labs-on-chips, miniature devices that perform multiple laboratory tests on tiny fluid...
https://techxplore.com/news/2024-10-uncover-flaw-miniature-medical-labs.html
This presidential cycle has already seen several high-profile examples of people using deepfakes to try to influence voters. Deepfakes are images, audio recordings, or videos generated or modifie...
https://techxplore.com/news/2024-10-ai-video-generation-expert-discusses.html
The metaverse, a space where the lines between physical and digital realities blur, is rising among younger populations. As of March, 33% of teens own a virtual reality (VR) device and 13% use it...
https://techxplore.com/news/2024-10-dangers-metaverse-vr-youth-revealed.html
Cryptocurrency fraud in Nigeria is exclusively committed by young men, with 100% of convicted fraudsters being male and nearly two-thirds under the age of 30, according to a new study from the Un...
https://techxplore.com/news/2024-10-group-digital-criminals-exploiting-states.html
As cyberattacks evolve and become more complex, defenders require advanced tools for effective incident response. In the H2020 project CyberSEAS, the Fraunhofer Institute for Applied Information ...
https://techxplore.com/news/2024-10-source-cybersecurity-playbook-tool.html
Hackers commonly bypass Microsoft Windows kernel protections to enable cheating in competitive online games, new research shows. Academics at the University of Birmingham performed a technical an...
https://techxplore.com/news/2024-10-windows-kernel-defenses-lucrative-game.html
Despite huge advances in cyber security, one weakness continues to overshadow all others: human error.
https://techxplore.com/news/2024-10-human-error-weakest-link-cyber.html
A recent study in JMIR XR and Spatial Computing identifies potential cybersecurity and privacy risks associated with using extended reality (XR) in health care settings. The study, titled "Cybers...
https://techxplore.com/news/2024-10-reveals-potential-cyber-threats-health.html
Ensuring the security of network systems and infrastructure is a critical aspect of cybersecurity. Penetration testing (pentesting) is an effective method for evaluating the network security post...
https://techxplore.com/news/2024-10-safe-society-pentesting-agent-realistic.html
Today, our understanding and assessment of the physical characteristics of the world around us relies less and less on human intelligence and more and more on artificial intelligence.
https://techxplore.com/news/2024-10-ai-remote-vulnerable-physical-digital.html
A tribal casino in Oklahoma is using an app tied to its surveillance camera system that uses artificial intelligence to detect patrons carrying firearms.
https://techxplore.com/news/2024-10-nevada-casinos-wont-gun-states.html
Within its new Responsible Innovation initiative, researchers at Penn Engineering discovered that certain features of AI-governed robots carry security vulnerabilities and weaknesses that were pr...
https://techxplore.com/news/2024-10-critical-vulnerabilities-ai-enabled-robots.html
Millions of people around the world rely on humanitarian aid. One of the challenges when it comes to distributing aid is that resources are almost always scarce. Therefore, organizations want to ...
https://techxplore.com/news/2024-10-biometrics-multiple-registrations-humanitarian-aid.html
What if a security camera could not only capture video but understand what's happening—distinguishing between routine activities and potentially dangerous behavior in real time? That's the futu...
https://techxplore.com/news/2024-10-ai-driven-video-standards-human.html
The Australian government has introduced its first-ever standalone cyber security act. Along with two other cyber security bills, it's currently being reviewed by a parliamentary committee.
https://techxplore.com/news/2024-10-speakers-vacuums-doorbells-fridges-smart.html
For years a potential disaster lurked in the internet's encryption system, threatening the security of organizations and individuals worldwide. Princeton engineers have now squelched that threat,...
https://techxplore.com/news/2024-10-internet-academia-major-loophole.html
Research published in the International Journal of Information and Communication Technology describes a new approach to the encryption of digital images. The method could be used to protect sensi...
https://techxplore.com/news/2024-10-chaotic-image-encryption-based-differential.html
Screen readers, voice-to-text, and other accessibility features have enabled people with disabilities to use smartphones. Yet these same features make the phones more accessible to hackers, too.
https://techxplore.com/news/2024-10-tool-malware-android.html