Home / Support / Industry News

Industry News Support

RSS Feed  URL: Security

Security News

Thursday, April 25, 2024
Wednesday, April 24, 2024
Tuesday, April 23, 2024
Monday, April 22, 2024
  • DeFake tool protects voice recordings from cybercriminals
    In what has become a familiar refrain when discussing artificial intelligence (AI)-enabled technologies, voice cloning makes possible beneficial advances in accessibility and creativity while also enabling increasingly sophisticated scams and deepfakes. To combat the potential negative impacts of voice cloning technology, the U.S. Federal Trade Commission (FTC) challenged researchers and technology experts to develop breakthrough ideas on preventing, monitoring and evaluating malicious voice cloning.
Friday, April 19, 2024
  • Linkable and traceable anonymous authentication with fine-grained access control
    Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user's identity in a privacy-preserving way. If enough privacy is provided, malicious users may misuse privacy. Accountability is necessary to avoid abusing anonymity. Previous anonymous authentication schemes can not hold the basic requirements of public linking and tracing while further ensuring access control simultaneously.
Thursday, April 18, 2024
Wednesday, April 17, 2024
Tuesday, April 16, 2024
Monday, April 15, 2024
Saturday, April 13, 2024
  • US House okays renewal of controversial surveillance program
    The US House of Representatives voted Friday to reauthorize an electronic surveillance program targeting foreigners, a practice officials say is critical to national security but criticized by opponents over concerns for American citizens' privacy.
Thursday, April 11, 2024
Wednesday, April 10, 2024
Monday, April 8, 2024
  • 'Is this a deepfake?' Why we're asking the wrong question
    Over the past year, the prevalence and potential dangers of deepfakes have raised concerns related to personal privacy, business ethics and even election interference.
  • Protecting art and passwords with biochemistry
    Security experts fear Q-Day, the day when quantum computers become so powerful that they can crack today's passwords. Some experts estimate that this day will come within the next ten years. Password checks are based on cryptographic one-way functions, which calculate an output value from an input value. This makes it possible to check the validity of a password without transmitting the password itself: the one-way function converts the password into an output value that can then be used to check its validity in, say, online banking.
Friday, April 5, 2024
  • Sanction the use of cyberweapons, not the weapons themselves, concludes expert review
    A recent analysis by Helene Pleil, research associate at the Digital Society Institute (DSI) at ESMT Berlin, alongside colleagues from Technical University Darmstadt, outlines that rapid technological progress, a lack of political will and uniform definitions, as well as the dual use of cyber tools, are the main challenges facing effective cyber arms control which is vital for foreign and security policy. As cyberspace is increasingly used in conflicts, cyber arms control needs to be addressed as well.
Thursday, April 4, 2024
  • Computer scientists discover gap in the latest security mechanisms used by some chips
    Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using shared cloud computing resources. Known as confidential computing, this approach protects sensitive data while it is being processed by isolating it in an area that is impenetrable to other users and even to the cloud provider. But computer scientists at ETH Zurich have now proven that it is possible for hackers to gain access to these systems and to the data stored in them.
  • An anonymous coder nearly hacked a big chunk of the internet. How worried should we be?
    Outside the world of open-source software, it's likely few people would have heard about XZ Utils, a small but widely used tool for data compression in Linux systems. But late last week, security experts uncovered a serious and deliberate flaw that could leave networked Linux computers susceptible to malicious attacks.
  • New privacy-preserving robotic cameras obscure images beyond human recognition
    From robotic vacuum cleaners and smart fridges to baby monitors and delivery drones, the smart devices being increasingly welcomed into our homes and workplaces use vision to take in their surroundings, taking videos and images of our lives in the process.

   Current feed:  RSS image   or click here for current World News.

SoftRoots Industry News Support

RSS Feed  URL: Security

Security News

Thursday, April 25, 2024
Wednesday, April 24, 2024
Tuesday, April 23, 2024
Monday, April 22, 2024
  • DeFake tool protects voice recordings from cybercriminals
    In what has become a familiar refrain when discussing artificial intelligence (AI)-enabled technologies, voice cloning makes possible beneficial advances in accessibility and creativity while also enabling increasingly sophisticated scams and deepfakes. To combat the potential negative impacts of voice cloning technology, the U.S. Federal Trade Commission (FTC) challenged researchers and technology experts to develop breakthrough ideas on preventing, monitoring and evaluating malicious voice cloning.
Friday, April 19, 2024
  • Linkable and traceable anonymous authentication with fine-grained access control
    Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user's identity in a privacy-preserving way. If enough privacy is provided, malicious users may misuse privacy. Accountability is necessary to avoid abusing anonymity. Previous anonymous authentication schemes can not hold the basic requirements of public linking and tracing while further ensuring access control simultaneously.
Thursday, April 18, 2024
Wednesday, April 17, 2024
Tuesday, April 16, 2024
Monday, April 15, 2024
Saturday, April 13, 2024
  • US House okays renewal of controversial surveillance program
    The US House of Representatives voted Friday to reauthorize an electronic surveillance program targeting foreigners, a practice officials say is critical to national security but criticized by opponents over concerns for American citizens' privacy.
Thursday, April 11, 2024
Wednesday, April 10, 2024
Monday, April 8, 2024
  • 'Is this a deepfake?' Why we're asking the wrong question
    Over the past year, the prevalence and potential dangers of deepfakes have raised concerns related to personal privacy, business ethics and even election interference.
  • Protecting art and passwords with biochemistry
    Security experts fear Q-Day, the day when quantum computers become so powerful that they can crack today's passwords. Some experts estimate that this day will come within the next ten years. Password checks are based on cryptographic one-way functions, which calculate an output value from an input value. This makes it possible to check the validity of a password without transmitting the password itself: the one-way function converts the password into an output value that can then be used to check its validity in, say, online banking.
Friday, April 5, 2024
  • Sanction the use of cyberweapons, not the weapons themselves, concludes expert review
    A recent analysis by Helene Pleil, research associate at the Digital Society Institute (DSI) at ESMT Berlin, alongside colleagues from Technical University Darmstadt, outlines that rapid technological progress, a lack of political will and uniform definitions, as well as the dual use of cyber tools, are the main challenges facing effective cyber arms control which is vital for foreign and security policy. As cyberspace is increasingly used in conflicts, cyber arms control needs to be addressed as well.
Thursday, April 4, 2024
  • Computer scientists discover gap in the latest security mechanisms used by some chips
    Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using shared cloud computing resources. Known as confidential computing, this approach protects sensitive data while it is being processed by isolating it in an area that is impenetrable to other users and even to the cloud provider. But computer scientists at ETH Zurich have now proven that it is possible for hackers to gain access to these systems and to the data stored in them.
  • An anonymous coder nearly hacked a big chunk of the internet. How worried should we be?
    Outside the world of open-source software, it's likely few people would have heard about XZ Utils, a small but widely used tool for data compression in Linux systems. But late last week, security experts uncovered a serious and deliberate flaw that could leave networked Linux computers susceptible to malicious attacks.
  • New privacy-preserving robotic cameras obscure images beyond human recognition
    From robotic vacuum cleaners and smart fridges to baby monitors and delivery drones, the smart devices being increasingly welcomed into our homes and workplaces use vision to take in their surroundings, taking videos and images of our lives in the process.

   Current feed:  RSS image   or click here for current World News.