Integrated circuit logic lock based on a magnetic tunnel junction for chip security

A team of KAUST scientists has designed an integrated circuit logic lock that could represent a leap forward in protecting our electronic devices from cyberattacks. Credit: KAUST; Heno Hwang Next-generation electronic devices could feature enhanced security systems built directly ...

Vulnerabilities of electric vehicle charging infrastructure

Kaedi Sanchez plugs in her car at a City of Albuquerque electric vehicle charger before heading to work. Sandia National Laboratories researchers have been studying the vulnerabilities of electric vehicle charging infrastructure, including public chargers, to better inform policymakers. ...

Cybercrime insurance is making the ransomware problem worse

Many businesses simply choose to pay a ransom than suffer the consequences of a cyber attack. Credit: Zephyr_p/Shutterstock Cybercrime insurance is making the ransomware problem worse During the COVID-19 pandemic, there was another outbreak in cyberspace: a digital epidemic ...

Avast Slowing Down Your Computer? How to Fix it

Avast antivirus software protects your computer from malware attacks and viruses by running multiple scans simultaneously. However, these processes can also degrade your system’s performance as they can use up a good chunk of the available resources such as ...

New research gives users another reason to hate unwanted ads

Credit: Pixabay/CC0 Public Domain New research released this week reveals the process used by third party advertisers to target online users can be viewed or manipulated by online adversaries using only their target’s email address. A four-person team of ...

Australia blames Russian hackers for medical data theft

Hackers are demanding US$10 million to stop leaking sensitive records they stole from Medibank, Australia’s largest private health insurer. Russian hackers carried out a cyberattack on a major Australian healthcare company that breached the data of 9.7 million people, ...

Repeat hacks highlight Australia's cyber flaws

Credit: Unsplash/CC0 Public Domain Inadequate privacy safeguards and the stockpiling of sensitive customer information have made Australia a lucrative target in the eyes of foreign hackers, cybersecurity experts told AFP following a series of major data breaches. Medibank, Australia’s ...

US charges suspect linked to notorious ransomware gang

Deputy Attorney General Lisa Monaco speaks during the Chiefs of Police Executive Forum, at the United States Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) headquarters in Washington, May 6, 2022. A man who authorities say participated in a ...

An automated system to detect compressed air leaks on trains

SwRI developed an automated compressed air leak detection system that can acoustically and visually detect and report air leaks on moving trains, indicated by spectral signatures in the photos. The team tested the proof-of-concept system on rail cars and ...

Websites in Mississippi hit by denial-of-service attack as country votes during midterm elections

Credit: Pixabay/CC0 Public Domain Some Mississippi state websites were briefly knocked offline Tuesday after so-called distributed denial-of-service (DDoS) attacks as voters turned out at polling sites across the state and the country. U.S. Department of Homeland Security officials stressed ...

Hackers demand $10 mn for stolen Australian health records

Hackers are demanding US$10 million to stop leaking sensitive records they stole from Medibank, Australia’s largest private health insurer. Hackers on Thursday demanded US$10 million to stop leaking highly sensitive records stolen from a major Australian healthcare company, as ...

Hacking the metaverse: Cybersecurity researchers help protect people in immersive virtual reality

Credit: Pixabay/CC0 Public Domain About 2 million people connected to virtual reality headsets every month in 2020. Virtual reality, or VR, industry revenues are projected to grow from $12 billion to $100 billion in the next five years. In ...

Ill will: Hackers hold healthcare data to ransom

Credit: Pixabay/CC0 Public Domain Australia’s biggest private health insurer Medibank is at the centre of the latest major attack by hackers holding health systems, hospitals and, increasingly, patients’ health records, to ransom in one of the trends in cybercrime. ...

Hackers leak Australian health records on dark web

Hackers have begun leaking sensitive medical records stolen from Australian health insurer Medibank, whose customers include the prime minister. Hackers have followed through on a threat to leak sensitive medical records stolen from a major Australian health company that ...

New AI model can help prevent damaging and costly data breaches

Credit: Pixabay/CC0 Public Domain Imperial privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks. This is the first time AI has been used to automatically discover vulnerabilities in this type of system, ...

Researchers improve security for smart systems

Credit: Pixabay/CC0 Public Domain In an increasingly connected and smart world, sensors collect and share large amounts of data to help people make decisions. Whether it’s the smart grid that is continuously monitoring energy usage, or people trying to ...

A 5G-enabled AI-based malware classification system for the next generation of cybersecurity

Credit: Pixabay/CC0 Public Domain The Industrial Internet of Things, or IIoT, has recently gained popularity due to its ability to create communication networks between different components of an industry and bring about the new revolution—Industry 4.0. Powered by wireless ...

Just 25% of Australian businesses are insured against cyber attacks. Here's why

Credit: Shutterstock In the past financial year, the Australian Cyber Security Centre received 76,000 cyber-crime reports—on average, one every seven minutes. The year before, it was a report every eight minutes. The year before that, every ten minutes. The ...

Australian insurer warns of 'distressing' hack threat

Medibank Private, one of Australia’s largest insurers, has told customers to be “vigilant” after a purported hacker threatened to release data within 24 hours from a hack affecting 10 million people. A major Australian health insurer warned Tuesday of ...

Study: How piracy can unravel company profits in product bundling

Credit: Pixabay/CC0 Public Domain Determining whether the practice of product bundling—such as combining cable TV channels into packages or computer software programs into software suites—is profitable in the presence of piracy is important to businesses as they formulate pricing ...

Facial recognition: Why we shouldn't ban the police from using it altogether

Any UK police force can use facial recognition under the current legal framework. Trismegist San, Shutterstock The UK police are being accused of breaking ethical standards by using live facial recognition technology to help fight crime. A recent report ...

What Makes a Good and Strong Password

You might be surprised how quickly even a strong password can be cracked. Nothing is foolproof regarding password security; even the most cautious people sometimes have their passwords broken. However, some habits can strengthen your password, so you have ...

Here's why security officials are concerned about claims of a hacked (or stolen) election

Credit: Pixabay/CC0 Public Domain Despite an unprecedented U.S. focus on preventing hackers from targeting the midterm elections Tuesday, there are still concerns that malicious cyber operatives could disrupt or influence the vote by penetrating polling stations, voter registration rolls, ...

Detecting nuclear threats with artificial reasoning

PNNL research combines machine learning, data analytics and artificial reasoning with nonproliferation and safeguards expertise to keep our nation safe against nuclear threats. Credit: Shannon Colson | Pacific Northwest National Laboratory As malicious actors become more adept in their ...

In the wake of recent data breaches, here's why you need to check your credit score

IP addresses can be traced to real-world locations. Credit: Millions of Australians have had their privacy breached in recent cyber attacks against Optus, Medibank and other companies. Cybercriminals stole sensitive health and financial data that can be used ...

Red Cross eyes digital emblem for cyberspace protection

Officials hope a digital emblem would help protect computer systems of medical facilities from cyberattacks, much as the Red Cross emblem protect those who work in conflict zones. When Red Cross staff work in conflict zones, their recognisable red-on-white ...

Researchers discover security loophole allowing attackers to use Wi-Fi to see through walls

Overview of Wi-Peep. Credit: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2022). DOI: 10.1145/3495243.3560530 A research team based out of the University of Waterloo has developed a drone-powered device that can use Wi-Fi networks ...

OpenSSL, a widely used encryption library, patches serious vulnerabilities

Credit: Unsplash/CC0 Public Domain Websites and companies that rely on OpenSSL should patch their systems as soon as possible. The developer of Open SSL, a widely used open-source encryption library, released Tuesday a patch to fix two high severity ...

Worried about identity theft? What to do to minimize your risk

Credit: CC0 Public Domain I’m a victim of identity theft. Thieves stole my wallet out of my purse and were able to find out everything else they needed to steal my identity online. They exploited a system that the ...

Smart windows that can polarize sunlight could offer a low energy alternative to Wi-Fi

Illustration of the polarizer effect on the polarized light. Credit: IEEE Photonics Journal (2022). DOI: 10.1109/JPHOT.2022.3200833 Sunshine streaming through a window could be directly harnessed for wireless data transmission to electronic devices. KAUST researchers have designed a smart glass ...

The White House is hosting its second international summit against ransomware

Why it matters: The US government is once again meeting with global partners to try and develop an effective strategy to fight (and win) the war against ransomware. Tech companies like Microsoft are joining as well, bringing their valuable, first-hand ...

Laser attack blinds autonomous vehicles, deleting pedestrians and confusing cars

A schematic of the attack, which can delete lidar data from a region in front of a vehicle, leading to unsafe vehicle movement. Below, showing the deletion of lidar data for a pedestrian in front of a vehicle, visible ...

Apple Launches Consolidated Security Site

Apple has created a new Apple Security Research website that consolidates all the company’s security resources in one place: a security blog, the Apple Platform Security Guide, information on the company’s security bounty and research device programs, and a ...

Blockchain could be the key to nuclear material safeguards

Blockchain offers a strong system for tracking nuclear material where the digital record cannot be amended, but it also needs to provide confidentiality. Credit: Shutterstock Did you know that many countries still rely on paper-based systems to keep track ...

AVG Won’t Uninstall? Here’s how to fix it

While AVG is a great antivirus and security application, there are certain scenarios where you may want to uninstall it. For instance, you might be upgrading your system and want to avoid any conflicts between the antivirus and the ...

White House invites dozens of nations for ransomware summit

FBI Director Christopher Wray speaks during a news conference on Aug. 10, 2022, in Omaha, Neb. The White House is bringing together three dozen nations, the European Union and a slew of private-sector companies for a two-day summit starting ...

UK police fail to meet 'legal and ethical standards' in use of facial recognition, say experts

The process of using facial recognition for identification, or one-to-many facial recognition. First, a probe image of a person is captured. Then, the probe image is compared with a watchlist of known facial images to determine if there is ...

Study finds a mathematical link between sociopolitical events and advanced cyberattacks

Methodological scheme. Credit: Security and Communication Networks (2022). DOI: 10.1155/2022/5784674 An interdisciplinary team of researchers from the Universidad Carlos III de Madrid (UC3M) has created a mathematical model which makes it possible to explain, according to different sociopolitical variables, ...

Australian health insurer says data of all customers hacked

People walk past a Medibank branch in Sydney, Wednesday, Oct. 26, 2022. Medibank, Australia’s largest health insurer, said a cybercriminal had hacked the personal data of all its 4 million customers as the government introduced legislation that would increase ...

US charges Ukrainian 'Raccoon Infostealer' with cybercrimes

A Ukrainian man being held by the Dutch authorities has been charged in the US with computer fraud for infecting millions of computers with malware. A Ukrainian man has been charged with computer fraud for allegedly infecting millions of ...


Drizly agrees to tighten data security after alleged breach

Majority of people don't want use of their personal data to result in harm or corporate profit

Clearview AI fined (again) for violating the GDPR with its facial recognition technology

New airport checkpoint cuts queues and improves passenger security

Australia flags new corporate penalties for privacy breaches

Health system discloses breach tied to online data tracker

FIDO Authenticate Keynote Talk Calls for 'Radical' Industry Transparency on Multifactor Authentication Use

How to Check for a Keylogger on Your Computer

Hacker holds Australian health insurer's data for ransom

A game of numbers: How air defense systems work and why Ukraine is eager for more protection

The vulnerability of transformers-based malware detectors to adversarial attacks

What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant

Synchrotron X-ray microdiffraction image screening method based on federated learning

Microsoft extends brute-force attack protections to local Windows accounts

Drones helped hackers penetrate a financial firm's network remotely

TypoSwype: An image recognition tool to detect typosquatting attacks

Extracting personal information from anonymous cell phone data using machine learning

Are virtual private networks actually private?

LA Unified cyberattack woes and uncertainties could be long-lasting, experts say

Protecting identities of panelists in market research

US airport websites hit by suspected pro-Russian cyberattacks

Sensors can tap into mobile vibrations to eavesdrop remotely, researchers find

New kind of attack called 'downcoding' demonstrates flaws in anonymizing data

AI-driven 'thermal attack' system reveals computer and smartphone passwords in seconds

Source code for Alder Lake BIOS was posted to GitHub

Info expected to emerge slowly in hospital chain cyberattack

Binance crypto exchange hit by latest digital currency hack

Hospital chain attack part of ongoing cybersecurity concerns

Cyberattack takes down Colorado's main website

Australian police make first arrest in Optus hack probe

Australia updates law to protect data after Optus hack

As ransomware attacks increase, new algorithm may help prevent power blackouts

Team demonstrates that basic mechanism for internet security can be broken

Why blockchain could mean fewer hassles for students and workers proving their credentials

TikTok and others scrape your data whether you use their apps or websites or not

Hackers release data after LA school district refuses to pay ransom

Hack puts Latin American security agencies on edge

Cyberattack reveals Mexico president's health scare

From sleep habits to pets, Amazon devices are learning more. Much more

Police say hacker concealed ID in Australian privacy breach

Chaos: a powerful malware infecting multiple systems and architectures

Australia flags tough new data protection laws this year

The same app can pose a bigger security and privacy threat depending on the country where you download it

Australia demands Optus pay for new customer ID documents

Cyberattacks a top concern across all business sizes, economic uncertainty a close second, new survey shows

Australian board directors urged to boost cybersecurity skills

Australian police probe purported hacker's ransom demand

New report offers blueprint for regulation of facial recognition technology

Hackers leak French hospital patient data in ransom fight

Python affected by 15-year-old bug that keeps on giving

Quantum encryption to boost European autonomy

Cyberattack steals passenger data from Portuguese airline

'Bad buzz': Gaming industry reels from 'Grand Theft Auto' hack

LA Unified cyberattackers demand ransom

Deepfake audio has a tell: Researchers use fluid dynamics to spot artificial imposter voices

Hackers accessed data on some American Airlines customers

'Grand Theft Auto' maker says game code stolen

Hackers are spreading malware through YouTube channels promoting game cheats

Color image encryption using an improved version of stream cipher and chaos

Hacker claims to breach Uber, security researcher says

Top Car News Car News