Cybersecurity
Articles tagged with Cybersecurity
Barua extracting high resolution harmonic fingerprinting from sparse sampling to disaggregate complex CVDs
No digital content is safe from generative AI, researchers say
Researchers discovered that simple artificial intelligence tools can bypass security techniques meant to protect authentic content from use in deepfakes and facial identity theft. The study found that attackers can easily defeat existing image protection using off-the-shelf AI models and simple commands.
AI fails to make inroads with cybercriminals, study finds
A study analyzing 100 million posts from underground cybercrime communities found that most cybercriminals lack the skills to use AI effectively, and its adoption has limited benefits for their work. However, AI coding assistants are mostly useful for already skilled actors, and poorly secured agentic AI systems pose a significant risk.
New report looks at how AI is impacting software development
The report examines how generative AI tools are transforming software development, offering benefits such as increased productivity but also raising security vulnerabilities and technical debt. Strong software engineering practices are still required to ensure systems are secure, reliable, and maintainable.
Enabling privacy-preserving AI training on everyday devices
Researchers at MIT developed a technique to overcome memory constraints and communication bottlenecks in federated learning, enabling faster and more accurate AI model training. The new framework, FTTE, uses a subset of model parameters and an asynchronous approach to reduce lag time and improve training performance.
Companies disclose more on cybersecurity – but markets remain indifferent
A study by the University of Vaasa and Aalto University finds that mandatory cybersecurity disclosure in the US has increased internal documentation and made cyber risks more visible to senior management, but not affected investor behavior. Companies produced new content describing their cybersecurity governance structures, suggesting ...
Your P@ssw0rds! no longer have to cause anxiety
Researchers at Texas A&M University created HIPPO, a browser extension that generates unique passwords for each website without storing them. Participants preferred HIPPO over traditional password tools for ease and security, reporting higher satisfaction rates.
Generative AI may cut costs in machine-learning systems, but it increases risks of cyberattacks and data leaks, computer scientist says
Computer scientist Micheal Lones warns that using generative AI in machine learning increases the risk of malicious cyberattacks, data leaks, and bias against underrepresented groups. He advises developers to manually evaluate LLM-generated code and outputs to mitigate these risks.
An ethereum-based fully distributed authentication mechanism in VANETs
Researchers introduce EBDA, a novel framework that replaces traditional PKI certificate systems with a blockchain-maintained Graph of Trust (GoT), enabling fully decentralized identity authentication for vehicles. The approach reduces authentication latency by at least 22.93% while maintaining low computational and storage overhead.
NTU Singapore and AUMOVIO launch second phase of partnership to drive innovation for tomorrow’s AI-defined vehicles
The AUMOVIO-NTU Corporate Lab will focus on areas like AI, sustainability, novel materials, and connectivity to develop solutions for safer, smarter, and more sustainable transportation. The joint lab aims to accelerate innovations that can support Singapore's future mobility ecosystem.
Privacy goes public with new database
A new database, led by Harvard computer scientist Salil Vadhan, enables companies to adopt differential privacy framework, providing real-world applications for protected data. The Differential Privacy Deployments Registry aims to promote widespread adoption and refinement of the technology.
Illinois Tech computer science researcher honored by IEEE Chicago Section
Binghui Wang, an Illinois Tech Assistant Professor of Computer Science, has been awarded the 2025 Distinguished Junior R&D Award by the IEEE Chicago Section for his groundbreaking research in AI security and trustworthy machine learning. The award recognizes Wang's impactful work on developing provably secure and trustworthy AI systems.
New approach finds privacy vulnerability and performance are intertwined in AI neural networks
Researchers discovered that key weight parameters contribute to both performance and data-privacy vulnerabilities in AI neural networks. They developed a technique to balance these aspects, achieving better results than existing methods in defending against membership inference attacks.
Deepfake x-rays fool radiologists and AI
A study found that deepfake X-rays can be indistinguishable from authentic images, posing a risk to patient diagnoses and digital medical records. Radiologists and AI models struggled to detect synthetic images, with accuracy ranging from 58% to 92%. Experts recommend implementing advanced digital safeguards to prevent tampering.
How chaos theory could turn every NHS scan into its own fortress
Researchers at the University of East Anglia have developed a new encryption method using chaos theory to protect medical images from cyber-attacks. The approach, called 'image-level protection,' makes each scan its own 'fortress' by making it extremely difficult for hackers to access or decrypt the images without the correct key.
For the Tamarin Prover: Levchin Prize for Real-World Cryptography for CISPA researcher Cas Cremers
Cas Cremers and collaborators receive Levchin Prize for Real-World Cryptography for their work on the Tamarin Prover, an open-source analysis tool for cryptographic protocols, which has had a significant impact on the practice of cryptography and its use in real-world systems.
FAU lands $4.5M US Air Force T-1A Jayhawk flight simulator
Florida Atlantic University has received a $4.5 million grant from the US Air Force to establish a high-fidelity platform for autonomous decision-making and real-time sensor fusion research. The T-1A Jayhawk simulator will be used to study cognitive performance, situational awareness, stress and decision-making under pressure.
SwRI earns CMMC Level 2 cybersecurity certification
Southwest Research Institute (SwRI) has achieved CMMC Level 2 certification through an independent assessment, demonstrating a commitment to cybersecurity best practices. The certification covers SwRI's Intelligent Systems and Mechanical Engineering divisions and requires the organization to meet 110 security-related requirements.
Novel SegWit-based optimization enables efficient, single-step transaction validation for Bitcoin networks
Researchers introduced an optimized framework for Bitcoin transaction validation using Segregated Witness technology, skipping repetitive verification steps and reducing validation time by approximately 50%. The 'single-validation' approach enhances the network's scalability without compromising security.
Kennesaw State's Vijay Anand honored as National Academy of Inventors Senior Member
Vijay Anand, Kennesaw State University Associate Professor, recognized for pioneering research in secure computation and intelligent infrastructure. He has led the design of nationally recognized cybersecurity programs and advanced innovations in data exchange and cyber defense.
Oak Ridge National Laboratory launches the Next-Generation Data Centers Institute
The institute will focus on technologies required to operate next-generation AI supercomputer systems reliably while accelerating scientific breakthroughs. It aims to drive innovation in making AI data centers more efficient, reliable, secure, and integrated with the nation's energy system.
New system designed to protect drones from cyber threats
Researchers at Adelaide University have developed a world-first cybersecurity system to protect drones from hacking, signal disruption, and malicious software. The system uses Software-Defined Wide Area Networking (SD-WAN) to act as a smart traffic controller for internet connections, making drones less vulnerable to cyber threats.
Your car’s tire sensors could be used to track you
Researchers at IMDEA Networks Institute discovered that tire pressure sensors in modern cars can be used to track vehicles and infer movement patterns. The study highlights the need for stronger security measures in future vehicle sensor systems.
UC Irvine researchers expose critical security vulnerability in autonomous drones
Researchers from UC Irvine have discovered a critical security vulnerability in autonomous target-tracking drones that can be exploited using an ordinary umbrella. The team demonstrated how attackers could use the 'FlyTrap' attack framework to manipulate drones, drawing them close enough for capture or causing them to crash.
New system tracks blockchain money laundering faster and more accurately
SynapTrack enables faster and more accurate detection of fraudulent activity using blockchains and cryptocurrencies, reducing false positives by a substantial margin. The system has been tested with real-life data from the Bybit hack, tracing hackers with 98% accuracy.
New NSF award supports innovative role-playing game approach to strengthening research security in academia
The project aims to help universities better understand research security by examining human and behavioral dimensions of risk. Structured role-playing games will simulate realistic academic scenarios, encouraging participants to explore trade-offs and motivations that often remain hidden in standard security planning.
Cyber-attacks could disrupt smart factories by targeting time itself, study warns
Researchers at the University of East London identified a critical weakness in Industrial Internet of Things networks that can destabilize factories and safety-critical infrastructure. Attackers can exploit subtle 'delay attacks' to quietly disrupt coordination, making timing just as important as information in highly automated systems.
Most AI bots lack basic safety disclosures, study finds
A new study by the University of Cambridge found that many AI bots lack basic safety disclosures, including transparency about their abilities and potential risks. The 'AI Agent Index' revealed a significant transparency gap, with only four out of thirty agents publishing formal safety and evaluation documents.
People are overconfident about spotting AI faces, study finds
Research from UNSW Sydney and ANU found that people with average face-recognition ability performed only slightly better than chance in spotting AI-generated faces. Even super-recognisers, who excel at recognizing real human faces, were not immune to being fooled by highly realistic AI-generated images.
New Study: Cybersecurity isn’t just a safeguard — it can help businesses perform better
A new study by Binghamton University School of Management reveals that businesses can improve their performance when they openly discuss and address cybersecurity issues. The research found a positive correlation between cybersecurity readiness and firm performance, suggesting that proactive measures can lead to better outcomes.
University of Tennessee and UCOR extend partnership through MOU renewal
The University of Tennessee and UCOR have strengthened their partnership to provide training and educational opportunities for students and workforce development in nuclear and criticality safety. The MOU renewal will include projects, research, and curriculum focused on these areas.
Tech companies need to unite and make device security easier for users
Researchers say tech companies need to adopt user-centered approaches to create authentication systems that are secure by design. They call for more inclusive and consistent methods, avoiding one-size-fits-all models that burden users with complex security rules.
Smarter machine-learning models improve phishing website detection
New machine-learning tools significantly improve phishing site detection accuracy, surpassing 95% precision/recall. The study evaluates ten classifiers across three public datasets using URL, domain, and content features.
Experts show how major UK food crisis might occur
A new report by Anglia Ruskin University and the University of York identifies key weaknesses in the UK's food system and recommends interventions to prevent disruptions from escalating into a crisis. The study suggests increasing energy security, diversifying food value chains, and promoting varied diets to reduce risks.
Security analysis of blockchain-based cryptocurrency
Researchers investigate real-world blockchain security incidents to extract representative attack patterns and categorize them into six classes based on standard blockchain architecture layers. The study also evaluates current detection and defense strategies, highlighting their strengths and limitations.
Dario Fiore receives ERC Proof of Concept to develop the VERIFHE Project
The VERIFHE project aims to develop an open-source library for verifiable homomorphic encryption, enabling private and reliable inference. The ERC Proof of Concept grant will support the development of practical tools for machine learning services.
Misleading text in the physical world can hijack AI-enabled robots
Researchers have identified a new vulnerability in AI-powered robots, where malicious text on signs or objects can hijack their decision-making. The study, led by UC Santa Cruz professors Alvaro Cardenas and Cihang Xie, presents the first academic exploration of environmental indirect prompt injection attacks against embodied AI systems.
Excellence and impact recognized by world’s preeminent computing society
The Association for Computing Machinery has named 72 new Fellows for their technical innovations and service to the field. The honorees represent the top 1% of professionals worldwide, with contributions in AI for healthcare, computer graphics, data management, and more.
Agents team up to strengthen AI safety checks
A new approach uses multiple LLM agents collaborating through iterative interactions to improve AI safety checks, outperforming existing methods in F1-score and achieving better trade-offs between catching harmful and harmless prompts. The system divides work into two teams: generator and analyzer, with logs capturing past mistakes and...
The sky is full of secrets: Glaring vulnerabilities discovered in satellite communications
Researchers found that nearly half of geostationary satellite communications are not encrypted, putting sensitive data such as cellular texts, voice calls, and military information at risk. The study led to immediate action from companies like T-Mobile, Walmart, and KPU Telecom, which enabled encryption in response to the findings.
Young people risk drifting into serious online offenses through a slippery slope of high-risk digital behavior
New research from the University of East London reveals widespread online risk-taking among young people, with many engaging in illegal behavior before crossing a legal boundary. The study highlights clear pathways into cybercrime, often driven by risk, opportunity, and lack of understanding about online laws.
Young people risk drifting into serious online offenses through a slippery slope of high-risk digital behavior
A new study reveals that young people are at risk of engaging in serious online offenses through gradual progression from low-risk behaviors like digital piracy. Researchers found that nearly half reported engaging in illegal online behavior early on, with many describing a pattern of repeat offending.
What does cybersecurity look like in the quantum age?
A recent paper highlights the need for defense mechanisms covering software, programs, and physical components of quantum computing systems. Key findings include the risk of crosstalk, intellectual property theft, and lack of end-to-end protection, emphasizing the need for safeguarding quantum computers from ground up.
CISPA researcher Andreas Zeller named IEEE Fellow
Andreas Zeller recognized for his work on automated debugging and security testing, with a total of nine Test of Time Awards. He is one of the few researchers to receive two ERC Advanced Grants from the European Research Council.
Securing AI systems against growing cybersecurity threats
The SHASAI project addresses cybersecurity risks in AI systems from design to real-world operation, combining secure hardware and software, risk-driven engineering, and real-world validation. The project will demonstrate its methods and tools in three diverse scenarios, supporting Europe's efforts to promote trustworthy AI.
ACM honors 2025 Distinguished Members for driving the future of computing
The Association for Computing Machinery has named 61 new Distinguished Members, recognized for their contributions to AI for healthcare, data management, human-computer interaction, and other areas. The recipients include experts from top universities, corporations, and research institutions worldwide.
ERC Consolidator Grant awarded to CISPA researcher Rayna Dimitrova
Rayna Dimitrova's SyReP project aims to eliminate the separation between decision-making and data in software development, enabling developers to specify system behavior and generate implementation automatically. The ERC Consolidator Grant will support her research on novel symbolic algorithms and realizability certificates.
Online tracking and privacy on hospital websites
Researchers analyzed 12 years of hospital website data and found pixel tracking in 66% of observations, significantly increasing breach risk. Hospitals using third-party pixels saw a 1.4 percentage point increase in breach probability compared to baseline rates.
The weakest link in healthcare cybersecurity is often not the software but the people who use it
A new study by Pius Ewoh argues that healthcare cybersecurity requires socio-technical solutions, not just technical fixes. The framework combines human behaviour monitoring, organisational learning, and intelligent incident-response capabilities to identify and prevent vulnerabilities.
Stress and a toxic workplace culture can cause insider cybersecurity threats
A new study by Emmanuel Anti at the University of Vaasa suggests that empathetic security models can strengthen cybersecurity practices and prevent insider threats. The research proposes co-creating cybersecurity policies with employees, focusing on understanding their needs, motivations, and emotional well-being.
Goethe University and the Initiative for CryptoCurrencies and Contracts partner to advance transatlantic cybersecurity research
The partnership aims to develop solutions for emerging digital threats through joint research initiatives in cryptography, AI security, and blockchain technology. The collaboration will facilitate researcher mobility and identify opportunities for collaborative funding.
An integrated approach to cybersecurity is key to reducing critical infrastructure vulnerability
Bahaa Eltahawy's dissertation highlights the importance of integrated cybersecurity strategies for protecting critical infrastructure. The study reveals that current standards have limitations and proposes a model that expands protection into seven domains.
Smartphone sharing demands a new approach to cybersecurity
A study by Griffith University researchers reveals that smartphone sharing is a growing issue, with 20% of identity theft perpetrators being current or former intimate partners. The study argues that one-user/one-device threat models are inadequate for addressing interpersonal cybersecurity risks.
SwRI identifies security vulnerability in EV charging protocol
Researchers at SwRI discovered a security vulnerability in the Signal Level Attenuation Characterization (SLAC) protocol used in electric vehicle-to-grid communications. The team successfully modeled and replicated a machine-in-the-middle attack that could manipulate or halt EV charging processes.
Researchers unveil first-ever defense against cryptanalytic attacks on AI
Security researchers have developed a defense mechanism that protects against cryptanalytic parameter extraction attacks on AI systems. By making neurons in the same layer similar to each other, the defense creates a barrier of similarity that makes it difficult for attacks to proceed.
NSF-funded team will use AI and other tools to build next-generation secure computer chips
A University of Delaware team, funded by NSF, creates next-generation secure computer chips using AI and game theory. The project aims to predict attacks and set new benchmarks for global hardware security, enabling the design of safer and more trustworthy systems.
Security flaws in portable genetic sequencers risk leaking private DNA data
Researchers from the University of Florida discovered critical security vulnerabilities in portable genetic sequencers, exposing them to potential attacks and data breaches. The devices' reliance on insecure connections to laptops or unsecured networks amplifies these risks.
University of Houston reaffirmed as National Center of Cybersecurity Excellence
The University of Houston has been redesignated by the NSA as a Center for Academic Excellence in Cyber Research (CAE-R) through 2029. This recognition underscores UH's growing role in advancing research and workforce training to strengthen US resilience against evolving cyber threats.
What factors determine the severity and outcomes of cyberwarfare between countries?
A game theoretical model of cyberwarfare assesses Attacker and Defender costs, revealing that networks with fewer attack vectors benefit Defenders. Converging technological capabilities amplify conflicts, while centralized government control can provoke more aggressive attacks.