Recognized for its research outcome related to PIM-based AI processor using TSMC’s multi-bit RRAM
Tag: SYSTEM SECURITY/HACKERS
Team streamlines neural networks to be more adept at computing on encrypted data
BROOKLYN, New York, Wednesday, July 21, 2021 – This week, at the 38th International Conference on Machine Learning (ICML 21), researchers at the NYU Center for Cyber Security at the NYU Tandon School of Engineering are revealing new insights into…
New technology shows promise in detecting, blocking grid cyberattacks
Researchers from Idaho National Laboratory and New Mexico-based Visgence Inc. have designed and demonstrated a technology that can block cyberattacks from impacting the nation’s electric power grid. During a recent live demonstration at INL’s Critical Infrastructure Test Range Complex, the…
Computer Scientist proves safety claims of the programming language Rust
ACM and ETAPS Doctoral Dissertation Award and Otto-Hahn-Medaille
University of Illinois at Urbana-Champaign graduate receives ACM Doctoral Dissertation Award
Dissertation makes foundational contributions to security of cyber-physical systems
Encrypting photos on the cloud to keep them private
A new technique can keep images safe on Google Photos, Flickr, Imgur
At UTA, Joe Cloud has helped build a supercomputer and developed robots for space
UTA doctoral student earns Tau Beta Pi Fellowship
ARPHA expands to computer science with International Journal of Universal Computer Science
The scholarly publisher and technology provider Pensoft and its self-developed publishing platform ARPHA welcome The International Journal of Universal Computer Science (J.UCS) to their portfolio . With this addition, the publisher, best known for a wide range of biodiversity-themed journals,…
Business professors study ideal responses to ransomware attacks
A pair of College of Business professors and their doctoral student at The University of Texas at Arlington are exploring how ransomware attacks sometimes pit organizations against the law enforcement agencies trying to protect them.
Data breaches: Most victims unaware when shown evidence of multiple compromised accounts
It’s been nine years since the LinkedIn data breach, eight years since Adobe customers were victims of cyber attackers and four years since Equifax made headlines for the exposure of private information of millions of people.
New invention keeps qubits of light stable at room temperature
Researchers from University of Copenhagen have developed a new technique that keeps quantum bits of light stable at room temperature instead of only working at -270 degrees. Their discovery saves power and money and is a breakthrough in quantum research.
A backdoor in mobile phone encryption from the 90s still exists
It is very unlikely that this security gap has been created by accident
uOttawa researchers partner with RabbitRun to enhance network connectivity for small businesses
The COVID-19 pandemic has exposed the frustrations of how poor connectivity in a home office can wreak on online meetings. The ramifications of a weak connection in a small-office and home-office (or SOHO) does not end there: imagine the consequences…
UTSA cyber researcher awarded $500K grant to develop defense against ransomware attacks
UTSA gets a boost in its efforts to lead the charge in protecting the nation’s cyber infrastructure
Economic crime is going uninvestgated as Police hide behind the veil of Action Fraud
Fraud is going uninvestigated by police who are “hiding behind the veil” of the Action Fraud national crime reporting agency. In his paper published this week in Policing , Professor Mark Button, director of the Centre for Counter Fraud Studies…
ACM recognizes luminaries whose service benefits all who participate in computing
Five honored for contributions to education, broadening participation, policy, and humanitarian efforts
Quantum holds the key to secure conference calls
The world is one step closer to ultimately secure conference calls, thanks to a collaboration between Quantum Communications Hub researchers and their German colleagues, enabling a quantum-secure conversation to take place between four parties simultaneously. The demonstration, led by Hub…
Pacific Northwest National Laboratory’s shadow figment technology foils cyberattacks
Make-believe shadow world is designed to sidetrack hackers, buying time for the good guys
Hardware-software contracts for secure speculation, Best Paper Award at the 42nd IEEE Symposium
IMDEA Software Institute researchers Marco Guarnieri and Pepe Vila together with Boris Köpf (Microsoft Research) and Jan Reineke (Saarland University) won a best paper award at the 42nd IEEE Symposium on Security and Privacy (S&P) for their paper “Hardware-Software Contracts…
What is the true cost to companies of IT security?
Research project led by the University of Göttingen develops assessment method of information technology security for businesses
Two new attacks break PDF certification
A security issue in the certification signatures of PDF documents has been discovered by researchers at Ruhr-Universität Bochum. This special form of signed PDF files can be used, for instance, to conclude contracts. Unlike a normal PDF signature, the certification…
Integrated cyber attack analysis platform “NIRVANA Kai” supports IPv6
Succeeded in real-time visualization of packets flowing in the vast address space of IPv6
New protocol makes Bitcoin transactions more secure and faster than Lightning
A protocol has been developed at TU Wien that makes transactions with cryptocurrencies such as Bitcoin faster and more secure.
New app makes Bitcoin more secure
More than 90% of users don’t know if their mobile wallet is potentially compromised; now, there’s an app for that
The fate of the planet
Unconventional takes on pandemics and nuclear defense could protect humanity from catastrophic failure
EPSRC-funded research into cyber security risk for low-carbon mobility-as-a-service (MaaS)
A Cranfield-led consortium has won funding that will look into the cyber security risks posed by a digitally-enabled, low-carbon transport service. The funding has been awarded by the Engineering and Physical Sciences Research Council (EPSRC), part of the UK Research…
Resilience against replay attacks in computer systems
From power grids and telecommunications to water supply and financial systems, digital data controls the infrastructure systems on which society relies. These complex, multi-tier systems depend on layered communications to accomplish their tasks – yet every point of contact becomes…
NYU Tandon announces 2021 S&K scholarship recipients
BROOKLYN, New York, Wednesday, March 31, 2021 – As part of its ongoing commitment to addressing the need for developing cybersecurity experts now nearing 3.5 million worldwide , the NYU Tandon School of Engineering has awarded the 2021 S&K Scholarships…
NIST develops privacy-preserving ‘encounter metrics’ that could slow down future pandemics
When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of urgent efforts to fight COVID-19, a science is rapidly developing…
Identifying banknote fingerprints can stop counterfeits on streets
In 2016 the Bank of England introduced plastic (polymer) banknotes, alongside 50 other countries that use polymer banknotes Counterfeit polymer banknotes on the streets have increased over the last few years, therefore the need to prevent and identify counterfeit banknotes…
A matter of privacy
Yu-Xiang Wang receives a prestigious Early CAREER Award from National Science Foundation to advance differential privacy applications
Cyber security experts launch guidelines to help police crackdown on organised crime
The white paper, published today (March 22) by REPHRAIN, the National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online in collaboration with the Dutch National Police, offers a solution to big data problems that tend to hamper police…
COVID-19 related cyber-attacks leveraged government announcements
Billions of people’s lives changed across the world when the pandemic began, as we experienced a ‘new normal’ with more people being online than ever before With this there came a surge of unique cyber-crime related circumstances affecting society and…
Deplhi study considers risk to individuals who disclose personal information online
Literature review and Delphi survey co-authored by City, University of London’s Dr Lyn Robinson reveals priorities for protecting personal privacy online.
Facial recognition ID with a twist: Smiles, winks and other facial movements for access
New algorithm makes ID verification more secure by tracking facial motion
Brown researchers explore possibilities for an ultra-secure gun registry
PROVIDENCE, R.I. [Brown University] — Proposals to create a national gun registry have long been met with fierce opposition from gun rights advocates. While proponents say a registry would help in tracking guns used in crimes, opponents worry that it…
How to spot deepfakes? Look at light reflection in the eyes
University at Buffalo deepfake spotting tool proves 94% effective with portrait-like photos, according to study
Professors supporting DHS vulnerability management, risk modeling and analytics
Paulo Costa, Associate Professor, Cyber Security Engineering/Systems Engineering and Operations Research (CYSE/SEOR), Peggy Brouse, Professor, (CYSE/SEOR), and Duminda Wijesekera, Professor and Chair, Cyber Security Engineering (CYSE), are working with the U.S. Department of Homeland Security (DHS). The researchers are conducting…
Skoltech team shows how Turing-like patterns fool neural networks
Skoltech researchers were able to show that patterns that can cause neural networks to make mistakes in recognizing images are, in effect, akin to Turing patterns found all over the natural world. In the future, this result can be used…
Using artificial intelligence to generate 3D holograms in real-time
A new method called tensor holography could enable the creation of holograms for virtual reality, 3D printing, medical imaging, and more — and it can run on a smartphone.
Lifting the lid on how domestic abusers use technology
New research into how domestic abusers are using computers and other digital technology to monitor, threaten and humiliate their victims will help guide future police investigations. The increased availability of new technology has given perpetrators even more opportunities and methods…
NYU Tandon alum and mentor Dan Guido elected to Scholarship for Service Hall of Fame
BROOKLYN, New York, Friday, March 5, 2021 – Dan Guido, an alumni of the NYU Tandon School of Engineering , is the sixth inductee into the CyberCorps: Scholarship for Service (SFS) Hall of Fame since inaugural class of honorees in…
A new and non-intrusive method for preventing cyber attacks on Android devices
SMU Office of Research and Tech Transfer – Cyber attacks on mobile devices are on the rise, with over 100 million attacks reported per year since 2018. Despite this, recent security research shows that most companies have unprotected data and…
Cutting off stealthy interlopers: a framework for secure cyber-physical systems
New approach to detect and recover from sophisticated cyberattacks in real time
Study reveals extent of privacy vulnerabilities with Amazon’s Alexa
A recent study outlines a range of privacy concerns related to the programs that users interact with when using Amazon’s voice-activated assistant, Alexa. Issues range from misleading privacy policies to the ability of third-parties to change the code of their…
Heat-free optical switch would enable optical quantum computing chips
In a potential boost for quantum computing and communication, a European research collaboration reported a new method of controlling and manipulating single photons without generating heat. The solution makes it possible to integrate optical switches and single-photon detectors in a…
Choosing Canada’s automotive future
A new expert panel report from the Council of Canadian Academies
Cybersecurity researchers build a better ‘canary trap’
A new artificial intelligence system generates fake docs to fool adversaries
Privacy issues and security risks in Alexa Skills
With the voice commands “Alexa Skills,” users can load numerous extra functions onto their Amazon voice assistant. However, these Skills can often have security gaps and data protection problems, as a team of researchers from the Horst Görtz Institute for…
Sustainable but smartly: Tackling security and privacy issues in smart agriculture
Scientists discuss the emerging security challenges that come with integrating technology in modern agriculture and suggest measures to tackle them