Security News - Software vulnerabilities, data leaks, malware, viruses https://techxplore.com/security-news/ en-us The latest news on cyber security, network security, software vulnerabilities, data leaks, malware, and viruses Corporate collaboration bolsters quantum encryption Toshiba Europe and global telecommunications corporation Orange say they have achieved a significant advance in securing network communications from ever-more powerful computer attacks. https://techxplore.com/news/2023-06-corporate-collaboration-bolsters-quantum-encryption.html Security Tue, 27 Jun 2023 16:38:06 EDT news607102677 Attackers can break voice authentication with up to 99% success within six tries: Study Computer scientists at the University of Waterloo have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries. https://techxplore.com/news/2023-06-voice-authentication-success.html Computer Sciences Tue, 27 Jun 2023 06:24:16 EDT news607065846 Fitness app loophole allows access to home addresses Despite attempts to anonymize user data, the fitness app Strava allows anyone to find personal information—including home addresses—about some users. The finding, which is detailed in a new study, raises significant privacy concerns. https://techxplore.com/news/2023-06-app-loophole-access-home.html Consumer & Gadgets Wed, 07 Jun 2023 14:18:01 EDT news605366279 AI clones made from user data pose uncanny risks Imagine, if you will, a digital doppelgänger. A clone that looks, talks and behaves just like you, created from the depths of artificial intelligence, reflecting your every mannerism with eerie precision. As thrilling as it might sound, how would you feel about it? https://techxplore.com/news/2023-06-ai-clones-user-pose-uncanny.html Security Mon, 05 Jun 2023 13:50:48 EDT news605191845 'Hot pixels' attack steals data through CPU readings A team of security researchers at Georgia Tech, the University of Michigan and Ruhr University Bochum in Germany has reported a new form of side-channel attack that capitalizes on power and speed management methods used by graphics processing units and systems on a chip (SoCs). https://techxplore.com/news/2023-05-hot-pixels-cpu.html Hardware Wed, 31 May 2023 09:30:03 EDT news604727043 Can quantum computing protect AI from cyber attacks? AI algorithms are everywhere. They underpin nearly all autonomous and robotic systems deployed in security applications. This includes facial recognition, biometrics, drones and autonomous vehicles used in combat surveillance and military targeting applications. https://techxplore.com/news/2023-05-quantum-ai-cyber.html Security Fri, 26 May 2023 10:10:07 EDT news604314602 Study tests the potential of two quantum machine learning algorithms for malware classification Over the past decades, cyber attackers have become increasingly skilled at compromising systems and circumventing security measures. As a result, detecting and accurately identifying malware is a pressing challenge for many businesses and individuals worldwide. https://techxplore.com/news/2023-05-potential-quantum-machine-algorithms-malware.html Security Thu, 25 May 2023 09:30:01 EDT news604140871 Team develops new 'attacker' device to improve autonomous car safety Modern cars and autonomous vehicles use millimeter wave (mmWave) radio frequencies to enable self-driving or assisted driving features that ensure the safety of passengers and pedestrians. This connectivity, however, can also expose them to potential cyberattacks. https://techxplore.com/news/2023-05-team-device-autonomous-car-safety.html Security Wed, 24 May 2023 13:48:57 EDT news604154935 DarkBERT learns language of the Dark Web Two types of people thrive in the distant hidden recesses of the Dark Web. One type consists of the good guys: whistleblowers, freedom fighters, journalists, the intelligence community and law enforcement agencies, all generally waging the good fight against power, greed and tyranny. https://techxplore.com/news/2023-05-darkbert-language-dark-web.html Internet Tue, 23 May 2023 14:20:01 EDT news604070247 Brute-force test attack bypasses Android biometric defense Chinese researchers say they successfully bypassed fingerprint authentication safeguards on smartphones by staging a brute force attack. https://techxplore.com/news/2023-05-brute-force-bypasses-android-biometric-defense.html Software Mon, 22 May 2023 14:58:45 EDT news603986310 AMD fTPM vulnerability uncovered Researchers at the Technical University of Berlin say they uncovered a new vulnerability in AMD's Trusted Platform Module (TPM). The flaw exposes firmware TPMs, or fTPMs, to attack. https://techxplore.com/news/2023-05-amd-ftpm-vulnerability-uncovered.html Hardware Wed, 03 May 2023 17:00:01 EDT news602351146 Research shows how hackers can target smart meters to destabilize electricity grid A power transmission grid can be destabilized by hackers who manipulate smart meters to create an oscillation in electricity demand, researchers in the Oregon State University College of Engineering have shown. https://techxplore.com/news/2023-05-hackers-smart-meters-destabilize-electricity.html Energy & Green Tech Wed, 03 May 2023 14:04:41 EDT news602341387 Online predators target children's webcams, study finds There has been a tenfold increase in sexual abuse imagery created with webcams and other recording devices worldwide since 2019, according to the the Internet Watch Foundation. https://techxplore.com/news/2023-05-online-predators-children-webcams.html Internet Wed, 03 May 2023 12:48:25 EDT news602336899 New side-channel attack vulnerability found in Intel CPU Add one more vulnerability to the list of side-channel attacks that have long dogged Intel CPUs. https://techxplore.com/news/2023-04-side-channel-vulnerability-intel-cpu.html Computer Sciences Wed, 26 Apr 2023 17:30:02 EDT news601748456 Using quantum physics to secure wireless devices From access cards and key fobs to Bluetooth speakers, the security of communication between wireless devices is critical to maintaining privacy and preventing theft. Unfortunately, these tools are not foolproof and information on how to hack, clone and bypass these systems is becoming easier to find. https://techxplore.com/news/2023-04-quantum-physics-wireless-devices.html Engineering Wed, 26 Apr 2023 12:33:21 EDT news601731198 A review of existing studies investigating online romance fraud Online romance fraud is an increasingly common phenomenon, which can affect people of all ages worldwide. This type of fraud occurs when a malicious individual or members of a criminal organization engage with users online pretending to be romantically interested in them, while trying to trick them into sending money or sharing confidential information with them. https://techxplore.com/news/2023-04-online-romance-fraud.html Computer Sciences Thu, 13 Apr 2023 09:30:01 EDT news600522398 Tor joins forces with VPN company to create new browser for increased privacy Cookies. Fingerprinting. Tracking. Surveillance. Spyware. Geostalking. https://techxplore.com/news/2023-04-tor-vpn-company-browser-privacy.html Internet Tue, 04 Apr 2023 16:09:54 EDT news599843387 Making the Internet of Things more secure With wearable fitness trackers, car key fobs and smart home devices, the Internet of Things (IoT) has become ubiquitous in our lives. Unfortunately, much of this flow of information is vulnerable to malicious activity and attacks, as securing the IoT has not kept pace with new technological advances. https://techxplore.com/news/2023-03-internet.html Computer Sciences Thu, 30 Mar 2023 15:56:02 EDT news599410561 Researchers exploit vulnerabilities of smart device microphones and voice assistants Guenevere Chen, an associate professor in the UTSA Department of Electrical and Computer Engineering, recently published a paper on USENIX Security 2023 that demonstrates a novel inaudible voice trojan attack to exploit vulnerabilities of smart device microphones and voice assistants—like Siri, Google Assistant, Alexa or Amazon's Echo and Microsoft Cortana—and provide defense mechanisms for users. https://techxplore.com/news/2023-03-exploit-vulnerabilities-smart-device-microphones.html Security Thu, 23 Mar 2023 06:06:57 EDT news598770409 Australian report cites 'datafication' of childhood To protect privacy in our homes we may build fences, grow shrubs, hang curtains and install security cameras. https://techxplore.com/news/2023-03-australian-cites-datafication-childhood.html Security Tue, 21 Mar 2023 14:38:05 EDT news598628279 This is what happens when your phone is spying on you Smartphone spyware apps that allow people to spy on each other are not only hard to notice and detect, they also will easily leak the sensitive personal information they collect, says a team of computer scientists from New York and San Diego. https://techxplore.com/news/2023-03-spying.html Consumer & Gadgets Tue, 14 Mar 2023 10:20:37 EDT news598008031 'Indirect prompt injection' attacks could upend chatbots ChatGPT's explosive growth has been breathtaking. Barely two months after its introduction last fall, 100 million users had tapped into the AI chatbot's ability to engage in playful banter, argue politics, generate compelling essays and write poetry. https://techxplore.com/news/2023-03-indirect-prompt-upend-chatbots.html Security Thu, 09 Mar 2023 10:05:09 EST news597578703 Two types of dataset poisoning attacks that can corrupt AI system results A team of computer science researchers with members from Google, ETH Zurich, NVIDIA and Robust Intelligence, is highlighting two kinds of dataset poisoning attacks that could be used by bad actors to corrupt AI system results. The group has written a paper outlining the kinds of attacks that they have identified and have posted it on the arXiv preprint server. https://techxplore.com/news/2023-03-dataset-poisoning-corrupt-ai-results.html Security Tue, 07 Mar 2023 11:10:02 EST news597408762 A new inference attack that could enable access to sensitive user data As the use of machine learning (ML) algorithms continues to grow, computer scientists worldwide are constantly trying to identify and address ways in which these algorithms could be used maliciously or inappropriately. Due to their advanced data analysis capabilities, in fact, ML approaches have the potential to enable third parties to access private data or carry out cyberattacks quickly and effectively. https://techxplore.com/news/2023-03-inference-enable-access-sensitive-user.html Security Tue, 07 Mar 2023 09:30:01 EST news597327570 A new AI-based tool to detect DDoS attacks Cybercriminals are coming up with increasingly savvy ways to disrupt online services, access sensitive data or crash internet user's devices. A cyber-attack that has become very common over the past decades is the so-called Distributed Denial of Service (DDoS) attack. https://techxplore.com/news/2023-02-ai-based-tool-ddos.html Computer Sciences Tue, 28 Feb 2023 09:50:01 EST news596713789 Are our pets leaking information about us? Pet and animal-related apps are creating cybersecurity risks to their owners, new research has shown. https://techxplore.com/news/2023-02-pets-leaking.html Consumer & Gadgets Mon, 27 Feb 2023 19:00:02 EST news596734526 Hackers could try to take over a military aircraft; can a cyber shuffle stop them? A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner or spacecraft, according to new research. However, the research also shows these defenses must be designed to counter increasingly sophisticated algorithms used to break them. https://techxplore.com/news/2023-02-hackers-military-aircraft-cyber-shuffle.html Computer Sciences Thu, 23 Feb 2023 15:20:04 EST news596388002 How digital twins could protect manufacturers from cyberattacks Detailed virtual copies of physical objects, called digital twins, are opening doors for better products across automotive, health care, aerospace and other industries. According to a new study, cybersecurity may also fit neatly into the digital twin portfolio. https://techxplore.com/news/2023-02-digital-twins-cyberattacks.html Engineering Thu, 23 Feb 2023 14:36:42 EST news596385398 Study shows VR users in the metaverse can be identified using head and hand motion data A team of computer scientists from UC Berkeley, RWTH Aachen and Unanimous AI, has found that users moving around virtually in the metaverse can be identified using nothing more than data received from head and hand sensors. The group has been studying privacy issues regarding users engaging with virtual reality ecosystems and has found that makers of VR games can easily identify who is involved by analyzing head and hand motion data. They published a paper on the arXiv preprint server. https://techxplore.com/news/2023-02-vr-users-metaverse-motion.html Security Wed, 22 Feb 2023 11:04:53 EST news596286289 US Census data vulnerable to attack without enhanced privacy measures, shows study Computer scientists at the University of Pennsylvania School of Engineering and Applied Science have designed a "reconstruction attack" that proves U.S. Census data is vulnerable to exposure and theft. https://techxplore.com/news/2023-02-census-vulnerable-privacy.html Computer Sciences Tue, 21 Feb 2023 11:07:22 EST news596200037