Security

Nets and high-tech hijackings: Anti-drone systems offer new ways to counter rising threats

Drones have harassed airports and bedeviled local police. They have trespassed over nuclear plants and prisons. On the battlefield, they can kill.

27/05/2025 20:10

'Kisses from Prague': The fall of a Russian ransomware giant

The sudden fall of a ransomware supplier once described as the world's most harmful cybercrime group has raised questions about Moscow's role in its development and the fate of its founder.

27/05/2025 20:02

Dutch intelligence agencies say Russian hackers stole police data in cyberattack

A previously unknown Russian hacker group with suspected ties to the Kremlin was responsible for a cyberattack last year on the Dutch police and has also targeted other Western nations that deliver military support to Ukraine, intelligence agencies announced Tuesday.

27/05/2025 20:00

Secure encryption and decryption with luminescent perovskites

To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal Angewandte Chemie by a Chinese research team. It is based on compounds with carefully modulated luminescent properties that change in response to external stimuli.

27/05/2025 15:26

Dark LLMs: It's still easy to trick most AI chatbots into providing harmful information, study finds

A group of AI researchers at Ben Gurion University of the Negev, in Israel, has found that despite efforts by large language model (LLM) makers, most commonly available chatbots are still easily tricked into generating harmful and sometimes illegal information.

26/05/2025 17:30

Who really benefits from smart tech at home? 'Optimizing' family life can reinforce gender roles

Have you heard of the "male technologist" mindset? It may sound familiar, and you may even know such people personally.

26/05/2025 15:28

M&S cyber-attack: How to protect yourself from sim-swap fraud

Our mobile phone numbers have become a de facto form of identification, but they can be hijacked for nefarious purposes. Just such an attack may have been involved in the recent very damaging cyber-attack on Marks & Spencer (M&S).

22/05/2025 20:12

How a global malware operation was taken down from a federal court in Georgia

The messages seemed innocuous, mundane even. Someone posing as a prospective guest emailed a hotel questions about a purported comment left on Booking.com. Another message was supposedly from that third-party booking site to review negative guest feedback.

22/05/2025 14:20

Cyberattack costs UK retailer Marks & Spencer £300 mn

British clothes-to-food retailer Marks and Spencer on Wednesday said a cyberattack disrupting its online service is set to last through to July and hit group profit by around £300 million ($404 million).

21/05/2025 20:50

Marks & Spencer cyberattack: How can retailers regain customers' trust after a hack?

Several big British retailers have been in the news recently—but not for buoyant sales or new product launches. Firms like Marks & Spencer and Co-op have been hacked, affecting online sales and the range of products available in-store, and forcing them to apologize to customers and other stakeholders. Luxury retailer Harrods also suffered a near-miss.

21/05/2025 16:24

Graph neural networks show promise for detecting money laundering and collusion in transaction webs

A review by researchers at Tongji University and the University of Technology Sydney published in Frontiers of Computer Science, highlights the powerful role of graph neural networks (GNNs) in exposing financial fraud.

19/05/2025 23:37

Hackers strike UK's legal aid agency and compromise data of lawyers and clients

Britain's justice department said Monday that it shut down online services for legal aid recipients and the lawyers paid to help them after a cyberattack compromised personal information including criminal records, national insurance numbers and payment details.

19/05/2025 18:54

What does it mean to 'accept' or 'reject' all cookies, and which should I choose?

It's nearly impossible to use the internet without being asked about cookies. A typical pop-up will offer to either "accept all" or "reject all." Sometimes, there may be a third option, or a link to further tweak your preferences.

19/05/2025 17:42

Paris kidnap bid highlights crypto data security risks

New regulations threaten the security of the personal data of cryptocurrency users and may expose them to "physical danger," the platform at the center of last week's Paris kidnapping attempt has claimed.

18/05/2025 13:08

Governments continue losing efforts to gain backdoor access to secure communications

Reports that prominent American national security officials used a freely available encrypted messaging app, coupled with the rise of authoritarian policies around the world, have led to a surge in interest in encrypted apps like Signal and WhatsApp. These apps prevent anyone, including the government and the app companies themselves, from reading messages they intercept.

16/05/2025 16:15

Coinbase expects data breach to cost it up to $400 mn

Coinbase on Thursday said criminals bribed and duped their way to stealing cryptocurrency from its users, then tried to blackmail the exchange to keep the crime quiet.

16/05/2025 11:34

NFTs in sports: How to be on alert to the dangers of fraud and counterfeiting

Non-fungible tokens (NFTs) are experiencing spectacular growth thanks to the new opportunities they offer for interaction and monetization to fans, clubs and athletes in the sports industry.

15/05/2025 20:00

Coinbase said cyber crooks stole customer information and demanded $20 million ransom payment

Coinbase, the largest cryptocurrency exchange based in the U.S., said Thursday that criminals had improperly obtained personal data on the exchange's customers for use in crypto-stealing scams and were demanding a $20 million payment not to publicly release the info.

15/05/2025 18:20

Mathematical method allows individuals to prove their locations without revealing them

Location data is considered particularly sensitive—its misuse can have serious consequences. Researchers at the Technical University of Munich (TUM) have developed a method that allows individuals to cryptographically prove their location—without revealing it. The foundation of this method is the so-called zero-knowledge proof with standardized floating-point numbers.

15/05/2025 17:10

Retail cyber-attacks reflective of 'patchwork' IT infrastructures and weak regulatory systems, says expert

Too many businesses are treating cybersecurity as an optional extra rather than a necessary investment, says a Bayes Business School expert in technology and innovation, responding to recent cyber-attacks on Co-op and Marks & Spencer and an attempted breach at Harrod's.

15/05/2025 16:42

Ransomware attacks drive majority of US health data breaches, analysis shows

A new study led by researchers from Michigan State University, Yale University and Johns Hopkins University reveals that ransomware attacks—which involve a hacker putting encryption controls into a file and then demanding a ransom to unlock the files—have become the primary driver of health care data breaches in the United States, compromising 285 million patient records over 15 years.

14/05/2025 23:04

M&S cyberattacks used a little-known but dangerous technique—and anyone could be vulnerable

The cyberattack that has targeted Marks & Spencer's (M&S) is the latest in a growing wave of cases involving something called sim-swap fraud. While the full technical details remain under investigation, a report in the Times suggests that cyber attackers used this method to access M&S internal systems, possibly by taking control of an employee's mobile number and convincing IT staff to reset critical login credentials.

14/05/2025 20:15

Computer scientists discover new security vulnerability in Intel processors

Anyone who speculates on likely events ahead of time and prepares accordingly can react quicker to new developments. What practically every person does every day, consciously or unconsciously, is also used by modern computer processors to speed up the execution of programs. They have so-called speculative technologies which allow them to execute instructions on reserve that experience suggests are likely to come next. Anticipating individual computing steps accelerates the overall processing of information.

13/05/2025 22:30

How we think about protecting data: Game-based study reveals how context shapes decisions

How should personal data be protected? What are the best uses of it? In our networked world, questions about data privacy are ubiquitous and matter for companies, policymakers, and the public.

13/05/2025 18:50

Customer data stolen in Marks & Spencer cyberattack

British retailer Marks & Spencer said on Tuesday that some personal data of its customers was stolen in a cyberattack that has crippled its online services for weeks.

13/05/2025 13:23

Quantum computers could crack the security codes used by satellites

Satellites are the invisible backbone of modern life. They guide airplanes, help us find our way with GPS, deliver TV and the internet, and even help emergency services respond to disasters. But a new kind of computer—quantum computers—could put all of this at risk.

12/05/2025 18:43

What lessons in cyber resilience can be learned from the UK high street attacks?

Dr. Patricia Esteve-Gonzalez from Oxford University's Global Cyber Security Capacity Center (GCSCC), Department of Computer Science, and Luna Rohland from the World Economic Forum Center for Cybersecurity, outline how organizations can take a strategic approach to minimizing the impacts of cyber-attacks.

12/05/2025 16:56

Decentralized finance is booming, and so are the security risks

When the first cryptocurrency, Bitcoin, was proposed in 2008, the goal was simple: to create a digital currency free from banks and governments. Over time, that idea evolved into something much bigger: "decentralized finance," or "DeFi."

08/05/2025 19:37

Smart home devices used to monitor domestic workers raise safety concerns

The growing use of smart home devices is undermining the privacy and safety of domestic workers. New research from King's College London reveals how surveillance technologies reinforce a sense of constant monitoring and control by domestic workers' employers, increasing their vulnerability and impacting their mental well-being.

07/05/2025 21:32

Dramatic rise in publicly downloadable deepfake image generators, study finds

Researchers from the Oxford Internet Institute (OII) at the University of Oxford have uncovered a dramatic rise in easily accessible AI tools specifically designed to create deepfake images of identifiable people, finding nearly 35,000 such tools available for public download on one popular globally accessible online platform, for example.

07/05/2025 18:53