SoftRoots Industry News Support
Security News
Wednesday, December 3, 2025
- Yes, the government can track your location, but usually not by spying on you directly
If you use a mobile phone with location services turned on, it is likely that data about where you live and work, where you shop for groceries, where you go to church and see your doctor, and where you traveled to over the holidays is up for sale. And U.S. Immigration and Customs Enforcement is one of the customers.
- New defense system for transport smart-tech could save lives
A new system for detecting unusual and potentially harmful data sharing between in-vehicle smart-tech and traffic management technology could prevent 9 out of 10 cyber attacks.
Tuesday, December 2, 2025
- India mandates pre-installation of government cyber safety app on all smartphones
India's telecoms ministry has directed smartphone manufacturers to pre-install a government-run cybersecurity app on all new devices, according to a government order, raising concerns of data privacy and user consent in one of the largest handset markets in the world.
Monday, December 1, 2025
- Crypto hacks: Price drops often outweigh direct losses
In the crypto world, reports of cyberattacks tend to focus mainly on the funds that vanish immediately. A new study by researchers at the Complexity Science Hub (CSH) now shows that the indirect consequences—such as falling token prices and eroding trust—can multiply the financial impact of such attacks, with investors bearing the brunt. The work is published in The Journal of Finance and Data Science.
Sunday, November 30, 2025
- We built AI friends but forgot the safeguards
Recently, a popular AI Companion company made headlines by announcing it would ban users under 18 from open-ended chats with its AI characters, with the full restriction to taking effect on 25 November 2025.
Friday, November 28, 2025
- How 'digital twins' could help prevent cyber-attacks on the food industry
Earlier this year, a cyberattack on British retailer Marks & Spencer caused widespread disruption across its operations. Stock shortages, delayed deliveries, and logistical chaos rippled through the retailer's network.
- Engineering identity: Anonymous data remains vulnerable to re-identification through basic details
We create and consume data continuously. This data is specific to us, but when consolidated, this shared data can be of immense value. The value is not only for population level insights.
- This common action is putting you at risk of being deepfaked
As we move further into the Computer Age, fake news, digital deceit and widespread use of social media are having a profound impact on every element of society, from swaying elections and manipulating science-proven facts, to encouraging racial bias and exploiting women.
Thursday, November 27, 2025
- French soccer federation hit by cyber-attack, member data stolen
The French soccer federation has been hit by a cyber-attack that resulted in the theft of data relating to members, it said on Thursday.
- New insight into why LLMs are not great at cracking passwords
Large language models (LLMs), such as the model underpinning the functioning of OpenAI's conversational platform ChatGPT, have proved to perform well on various language-related and coding tasks. Some computer scientists have recently been exploring the possibility that these models could also be used by malicious users and hackers to plan cyber-attacks or access people's personal data.
- Beer giant Asahi not engaging with hackers after cyberattack
Japanese beer giant Asahi said on Thursday it had not received any specific demand from the hackers behind a "sophisticated and cunning" cyberattack that could have leaked the data of around two million people.
Tuesday, November 25, 2025
- Stress and a toxic workplace culture can cause insider cybersecurity threats
While most organizations address cybersecurity issues with technology and surveillance, Emmanuel Anti's research argues that empathy may be a more effective defense. His doctoral dissertation at the University of Vaasa explores insider deviance, and how understanding the human elements related to it can lead to stronger, more sustainable cybersecurity practices.
- Q&A: Expert discusses developer preparation for controlling super-intelligent AI
The dream of an artificial intelligence (AI)-integrated society could turn into a nightmare if safety is not prioritized by developers, according to Rui Zhang, assistant professor of computer science and engineering in the Penn State School of Electrical Engineering and Computer Science.
Monday, November 24, 2025
- Integrated approach to cybersecurity key to reducing critical infrastructure vulnerability
As our society becomes more digital and interconnected, the systems that keep it running face growing vulnerability to cyber threats. Bahaa Eltahawy's doctoral dissertation at the University of Vaasa, Finland, shows that safeguarding these networks requires a holistic approach.
- Five crucial ways LLMs can endanger your privacy
The privacy concerns around large language models like ChatGPT, Anthropic and Gemini are more serious than just the data the algorithms ingest, according to a Northeastern University computer science expert.
Thursday, November 20, 2025
- AI is providing emotional support for employees, but is it a valuable tool or privacy threat?
As artificial intelligence tools like ChatGPT become an increasingly popular avenue for people seeking personal therapy and emotional support, the dangers that this can present—especially for young people—have made plenty of headlines. What hasn't received as much attention is employers using generative AI to assess workers' psychological well-being and provide emotional support in the workplace.
Wednesday, November 19, 2025
- Roblox set to start checking people's ages. But it will need to do more to keep kids safe
Online gaming giant Roblox has just announced it will start checking users' ages from early December in an attempt to stop children and teenagers talking with adults.
Tuesday, November 18, 2025
- WhatsApp security vulnerability discovered by researchers
IT-Security Researchers from the University of Vienna and SBA Research identified and responsibly disclosed a large-scale privacy weakness in WhatsApp's contact discovery mechanism that allowed the enumeration of 3.5 billion accounts. In collaboration with the researchers, Meta has since addressed and mitigated the issue.
- Security vulnerability identified in EV charging protocol
Southwest Research Institute identified a security vulnerability in a standard protocol governing communications between electric vehicles (EV) and EV charging equipment. The research prompted the Cybersecurity & Infrastructure Security Agency (CISA) to issue a security advisory related to the ISO 15118 vehicle-to-grid communications standard.
- Dangers to consider as AI gets smarter, more rapidly adopted
A recent study at UC Davis had AI chatbots send messages to people's phones to remind them to get their steps in. Those messages were interactive. Sometimes the chatbot would tell a joke based on this example provided by the research team:
- Smartphone sharing demands a new approach to cybersecurity, report finds
Does your partner know the password to your phone? Probably.
Monday, November 17, 2025
- An AI lab says Chinese-backed bots are running cyber espionage attacks. Experts have questions
Over the past weekend, the US AI lab Anthropic published a report about its discovery of the "first reported AI-orchestrated cyber espionage campaign."
- Researchers unveil first-ever defense against cryptanalytic attacks on AI
Security researchers have developed the first functional defense mechanism capable of protecting against "cryptanalytic" attacks used to "steal" the model parameters that define how an AI system works.
Friday, November 14, 2025
- Anthropic warns of AI-driven hacking campaign linked to China
A team of researchers has uncovered what they say is the first reported use of artificial intelligence to direct a hacking campaign in a largely automated fashion.
Wednesday, November 12, 2025
- Study to better understand West African based cyber-crime could be key to combating online fraud
A University of Portsmouth-led study could help to inform the development of policy and interventions to reduce the risk of people falling prey to online and telephone scams.
- Five minutes of training boosts ability to spot AI-generated fake faces
Five minutes of training can significantly improve people's ability to identify fake faces created by artificial intelligence, new research shows.
Tuesday, November 11, 2025
- Online age checking is creating a treasure trove of data for hackers
A variety of websites now have processes designed to verify the ages of their users. These checks are carried out in several ways. For instance, AI can be used to analyze whether a photo of the person looks old enough for the age threshold on a website.
- AI agents open door to new hacking threats
Cybersecurity experts are warning that artificial intelligence agents, widely considered the next frontier in the generative AI revolution, could wind up getting hijacked and doing the dirty work for hackers.
- Automatic C to Rust translation technology provides accuracy beyond AI
As the C language, which forms the basis of critical global software like operating systems, faces security limitations, KAIST's research team is pioneering core original technology research for the accurate automatic conversion to Rust to replace it. By proving the mathematical correctness of the conversion, a limitation of existing artificial intelligence (LLM) methods, and solving C language security issues through automatic conversion to Rust, they presented a new direction and vision for future software security research.
Monday, November 10, 2025
- Poisoned pixels: New AI tool to fight malicious deepfake images
Monash University and the Australian Federal Police (AFP) are teaming up to turn the tech tables on cybercriminals through a dose of digital poison.
Current feed: