Researchers used artificial intelligence to design an invisibility cloak to conceal antennas or small communication devices from infrared light or microwave detectors...New Scientist From ACM TechNews | November 17, 2022
Researchers found privacy flaws in apps used in the U.S. to track people waiting for immigration court dates, those in juvenile detention systems, and those on...New Scientist From ACM TechNews | September 9, 2022
Researchers trained an artificial intelligence-powered algorithm to identify individuals based their hand vibrations when holding a smartphone.
New Scientist From ACM TechNews | August 22, 2022
Princeton University's Arvind Narayanan and colleagues found 75% of 120 top-ranked English-language websites permit weak passwords.
New Scientist From ACM TechNews | June 24, 2022
Renegade staff theoretically could insert undetectable backdoors in third-party artificial intelligence (AI) algorithms, enabling hackers to commandeer the AIs...New Scientist From ACM TechNews | May 12, 2022
A circuit board's power consumption can reveal malicious tampering designed to facilitate Trojan attacks to steal sensitive data or crash a device when triggered...New Scientist From ACM TechNews | April 20, 2022
Researchers at China's Zhejiang University found driverless cars could be fooled into seeing red traffic lights as green.
New Scientist From ACM TechNews | April 18, 2022
Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...New Scientist From ACM TechNews | March 11, 2022
Scientists found fake profiles produced by artificial intelligence on the business social network LinkedIn can easily deceive people.
New Scientist From ACM TechNews | February 28, 2022
Researchers found that people have a hard time distinguishing images of human faces created by artificial intelligence from images of real faces.
New Scientist From ACM TechNews | February 18, 2022
Researchers have determined that birthday wishes on Twitter can inadvertently expose private data that could jeopardize recipients' online security.
New Scientist From ACM TechNews | February 8, 2022
Freely available voice-mimicking software can deceive people and voice-activated tools like smart assistants, according to University of Chicago scientists.
New Scientist From ACM TechNews | October 14, 2021
Researchers at George Washington University say they have built a tool that would allow users to expose fake news without endangering their privacy. The Fuzzy Anonymous...New Scientist From ACM TechNews | September 20, 2021
A computer model developed by researchers at New York’s University of Albany can determine whether an image of a face is a deepfake by examining its pupils.
New Scientist From ACM TechNews | September 15, 2021
A study of 81 million email messages sent from January 1994 to July 2021 found that only 0.06% of the emails were encrypted.
New Scientist From ACM TechNews | September 13, 2021
It takes an average of 77 days from detection for Google to remove apps that may contain malware from the Google Play Store, accoriding to a recent analysis.
New Scientist From ACM TechNews | August 19, 2021
Dubai is creating a network of pre-positioned drone bases so police can respond to incidents with drones anywhere in the city within a minute.
New Scientist From ACM TechNews | July 26, 2021
A cyberattack may have been involved in a naval confrontation this week between Russia and a British warship in the Black Sea that never really happened.
New Scientist From ACM TechNews | June 25, 2021
Researchers at Spain's Institute of Photonic Sciences have taken a step toward a secure quantum Internet by using crystals to execute quantum teleportation of information...New Scientist From ACM TechNews | June 4, 2021