How much personal information can our phone apps gather through location tracking? To answer this question, two researchers – Mirco Musolesi (University of Bologna, Italy) and Benjamin Baron (University College London, UK) – carried out a field study using an…
Tag: SYSTEM SECURITY/HACKERS
Blockchain-based copyright protect
Researchers from the UOC have analysed applications for multimedia content protection and management that are based on this technology
Finnish study shows how the uncertainty in the Bitcoin market responds to cyberattacks
A total of 1.1 million bitcoin were stolen in the 2013-2017 period. Given the current price for Bitcoin exceeding $40,000, the corresponding monetary equivalent of losses is more than $44 billion highlighting the societal impact of this criminal activity. The…
Tests reveal cybersecurity vulnerabilities of common seismological equipment
Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points. Common security issues such as non-encrypted data, insecure protocols, and poor user…
Design and deployment of COVID-19 technology responses and finding ways to make things
As governments try to mitigate the spread of COVID-19, many are turning to contact tracing, including apps that track your location and electronic check-in QR codes. But with that technology come questions of personal safety, privacy, trust, control and collective…
Personal data, fodder for cyberwarfare? New models for stepping up cybersecurity
Although organizations invest in resources to protect their data, many fail to acknowledge the dangers of poorly managing the digital world
UTSA and Dell partner to spur innovation in cybersecurity and data science
(SAN ANTONIO, February 4, 2020) – The University of Texas at San Antonio (UTSA) received a technology grant via special discounts from Dell Technologies to support advanced technologies and a new research infrastructure platform at the university. Through the substantial…
‘Zoombombing’ research shows legitimate meeting attendees cause most attacks
BINGHAMTON, NY — Most zoombombing incidents are “inside jobs” according to a new study featuring researchers at Binghamton University, State University of New York. As the COVID-19 virus spread worldwide in early 2020, much of our lives went virtual, including…
INL researchers publish book to prevent cybersecurity disruptions, train workforce
Two cybersecurity researchers at Idaho National Laboratory have published a new book to help train employees at public utilities to recognize cybersecurity vulnerabilities and develop measures to defend their networks from increasingly sophisticated cyberattacks. Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed…
Team to develop automated-driving tech for people with cognitive impairments
LAWRENCE — A research team based at the University of Kansas School of Engineering is one of 10 semifinalists in the U.S. Department of Transportation’s Inclusive Design Challenge , which seeks to make self-driving cars accessible to people with disabilities.…
Bentham Science launches new journal, ‘The Chinese Journal of Artificial Intelligence’
Bentham Science is pleased to announce the launch of new subscription-based journal, The Chinese Journal of Artificial Intelligence . The first issue of the journal will be available online by the start of the year, 2021. Dr. Dunwei Gong is…
2020 ACM Fellows recognized for work that underpins contemporary computing
International group composed of leaders across all of computing’s disciplines
The fix is in
Giovanni Vigna and former students are developing a better way to address vulnerabilities at the source-code level
Stevens creates entangled photons 100 times more efficiently than previously possible
Ultra-bright photon source brings scalable quantum photonics within reach
Police investigators of online child abuse at risk of mental harm
Police who investigate online crimes against children, and protect wider society from seeing images of violence against young people, are themselves at risk of moral injury and other psychological harms.
New transistor design disguises key computer chip hardware from hackers
WEST LAFAYETTE, Ind. — A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University engineers have demonstrated a way to…
Tech makes it possible to digitally communicate through human touch
WEST LAFAYETTE, Ind. — Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentially let your body…
New cyberattack can trick scientists into making toxins or viruses — Ben-Gurion University researchers
BEER-SHEVA, Israel…November 30, 2020 – An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion University of the Negev cyber-researchers. According to a new paper just published…
Mason to lead regional hub for national cybersecurity advanced manufacturing innovation partnership
George Mason University is poised to be named a managing member in the Cybersecurity Manufacturing Innovation Institute (CyManII), a $111 million public-private partnership led by the University of Texas at San Antonio. CyManII will have a five-year corporative agreement with…
An app may make digital contact tracing for COVID-19 more private and secure
With an award from the National Science Foundation, researchers at WPI and Virginia Tech are developing an app with technology to protect a user’s personal information and identity
The role of drones in 5G network security
A study by Giovanni Geraci and researchers at Mississippi State University, which aims to improve the security of advanced wireless networks against a series of eavesdropping, interference and identity theft
SGS and Graz University of Technology open Lamarr Security Research
The non-profit research center focuses on information security and establishing trust in digital systems and products
Computer scientists launch counteroffensive against video game cheaters
Cheat detection system could gracefully kick out cheating players
System brings deep learning to ‘internet of things’ devices
Advance could enable artificial intelligence on household appliances while enhancing data security and energy efficiency
PLATYPUS: New vulnerabilities discovered in Intel processors
Power side-channel attacks are attacks that exploit fluctuations in power consumption to extract sensitive data such as cryptographic keys. Because power measurements with a malware were previously too inaccurate, such attacks required physical access to the target device and special…
SwRI hacks electric vehicle charging to demonstrate cybersecurity vulnerabilities
Project disrupted EV charging process by simulating man-in-the-middle attack
Tiny device enables new record in super-fast quantum light detection
Researchers have developed a tiny device that paves the way for higher performance quantum computers and quantum communications, making them significantly faster than the current state-of-the-art.
Election 2020 chatter on Twitter busy with bots, conspiracy theorists, USC study finds
The partisan divide — among the bots
New control architecture defends complex interconnected systems against cyberattacks
Researchers have developed a novel control architecture that defends complex, interconnected systems previously vulnerable to cyberattacks. Details were published in IEEE/CAA Journal of Automatica Sinica . Distributed systems are becoming more and more essential in everyday life. From power plants…
FAU awarded U.S. AFOSR grant to improve learning and operation of AI systems
FAU College of Engineering and Computer Science Researchers Receive $653,393 U.S. Air Force Office of Scientific Research Grant for Better and Safer Artificial Intelligence
Research to bring more secure software for autonomous battlefield operations
WEST LAFAYETTE, Ind. — Drones and other unmanned machines can save human lives on the battlefield, but adversaries could hack into their artificial intelligence software. Purdue University will be leading research in partnership with Princeton University on ways to protect…
Individuals may legitimize hacking when angry with system or authority
University of Kent research has found that when individuals feel that a system or authority is unresponsive to their demands, they are more likely to legitimize hacker activity at an organization’s expense
Aspiring cyber entrepreneur is latest EWF INI Fellow
INI student Ruchi Banerjee receives full-tuition fellowship to study information security at Carnegie Mellon University
New website predicts likelihood of cyber attacks between nations
Cyber Attack Predictive Index ranks a dozen possible scenarios
Bringing a power tool from math into quantum computing
Scientists design a novel quantum circuit that calculates the fast Fourier transform, an indispensable tool in all fields of engineering
Fellow at Sandia Labs appointed to National Quantum Initiative Advisory Committee
ALBUQUERQUE, N.M. — Sandia National Laboratories Fellow Gil Herrera has been appointed to the newly established U.S. National Quantum Initiative Advisory Committee. Herrera is one of two committee members representing the Department of Energy national laboratories. He joins 20 others…
Tracking the trackers: uOttawa researchers launch COVID-19 Global Pandemic App Watch
The Global Pandemic App Watch will track the uptake of COVID-19 contact-tracing and exposure-notification apps around the world
ACM announces new conference on AI in finance
Inaugural conference to be held October 14-16
Predictive Science Research Gets Major Boost Thanks to the Department of Energy
The Oden Institute at UT Austin Selected by DOE for Major Predictive Science Research Cooperative
Virtual Heidelberg Laureate Forum – Experiment to Experience
Over the past week, the diverse program of the Virtual Heidelberg Laureate Forum (HLF) materialized one session at a time. Many aspects of the actual Forum were mirrored and though replicating the depth of in-person exchanges is impossible, compelling alternatives…
Researchers exploit weaknesses of master game bots
UNIVERSITY PARK, Pa. — If you’ve ever played an online video game, you’ve likely competed with a bot — an AI-driven program that plays on behalf of a human. Many of these bots are created using deep reinforcement learning, which…
The secretive networks used to move money offshore
Researchers have uncovered a highly unusual network pattern within the Panama Papers, showing how fortunes can be easily hidden in secretive offshore shell corporations, and how these remain difficult to trace and take down
ITMO Researchers Develop Unique Printing Technology for ‘Invisible’ Images
Researchers from ITMO University’s ChemBio Cluster have developed an inkjet printing technology that makes it possible to produce images that can only be seen in polarized light – such as when using a smartphone screen.
Detecting fake online photos, videos with a computerized brain
Nearly $1.2 million in grants will help University of Missouri researchers create an intelligent computer detection system
Staying one step ahead to stop hackers in their tracks
US Army grant helps UH researchers develop techniques to detect, deceive cyber attackers
Researchers discover cyber vulnerabilities affecting bluetooth based medical devices
The Greyhound framework, named after the breed of dogs known for their hunting abilities, was designed and implemented by an SUTD-led research team to systematically sniff out security lapses in Wi-Fi and Bluetooth enabled devices.
Researcher vaccinating integrated circuits interconnected with attack-immune architecture
Sai Manoj Pudukotai Dinakarrao, Assistant Professor, Electrical and Computer Engineering, is developing a technique to detect and defend against hardware Trojans (HT) in integrated circuits (ICs) by adapting techniques inspired by the human immune system and vaccination. The mechanism he…
The Phish scale: NIST’s new tool helps IT staff see why users click on fraudulent emails
Researchers at the National Institute of Standards and Technology (NIST) have developed a new tool called the Phish Scale that could help organizations better train their employees to avoid a particularly dangerous form of cyberattack known as phishing. By 2021,…
Protecting genomic privacy
Computer and data sciences researcher improving privacy for global genomic data sharing network, supported by $1.2 million NIH grant
Popular messenger services are extremely insecure
Study by TU Darmstadt and University of Würzburg: WhatsApp, Signal & Co: Billions of users vulnerable to privacy attacks