Researchers at the University of Florida can detect audio deepfakes by measuring acoustic and fluid dynamic distinctions between organic and synthetic voice samples...Ars Technica From ACM TechNews | September 21, 2022
Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.
Ars Technica From ACM TechNews | August 3, 2022
A researcher at security firm Intezer identified a new malware that can steal YouTube content creators' authentication credentials.
Ars Technica From ACM TechNews | July 12, 2022
Researchers have discovered at least 80 routers in North America and Europe have been infected by a remote access Trojan as part of a larger hacking campaign.
Ars Technica From ACM TechNews | July 7, 2022
Austrian security researcher Martin Herfurt has demonstrated that electric vehicle company Tesla's updated near-field communication key card can be hacked.
Ars Technica From ACM TechNews | June 10, 2022
Security researchers have found that the supposedly hard-to-counterfeit digital driver's licenses in use in New South Wales, Australia, actually can be altered...Ars Technica From ACM TechNews | May 25, 2022
Sultan Qasim Khan at U.K.-based security firm NCC Group devised an exploit for unlocking Teslas and countless other devices.
Ars Technica From ACM TechNews | May 23, 2022
Apple, Google, and Microsoft are launching a "joint effort" to "expand support for a common password-less sign-in standard created by the FIDO Alliance and the...Ars Technica From ACM TechNews | May 9, 2022
Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.
Ars Technica From ACM TechNews | May 6, 2022
Researchers at the U.K.’s University of Oxford found that iOS apps can still track users without explicit permission.
Ars Technica From ACM TechNews | April 25, 2022
Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads...Ars Technica From ACM TechNews | April 7, 2022
A researcher found that Yandex, known as "Russia's Google," embedded code in apps for mobile devices that allows data to be sent to servers in Russia.
Ars Technica From ACM TechNews | April 4, 2022
A proof-of-concept "browser in the browser" exploit could phish passwords using a malicious site that does not contain suspicious domains or substitute letters....Ars Technica From ACM TechNews | March 29, 2022
Polkit, a system-wide privilege manager for Unix-like operating systems, contains a 12-year-old memory-corruption vulnerability.
Ars Technica From ACM TechNews | January 31, 2022
Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers. ...Ars Technica From ACM TechNews | January 18, 2022
Researchers at China's Qihoo 360 reported that the EWDoor malware has infected the networking devices of thousands of AT&T Internet customers in the U.S.
Ars Technica From ACM TechNews | December 9, 2021
Researchers uncovered a security feature bypass vulnerability in Microsoft's Windows Hello system that permitted them to manipulate a USB webcam to unlock a Windows...Ars Technica From ACM TechNews | July 26, 2021
Chinese video game publisher Tencent has added a facial recognition system to more than 60 of its China-specific smartphone games.
Ars Technica From ACM TechNews | July 16, 2021