Borders, regulation and global social media
Tag: SYSTEM SECURITY/HACKERS
The law of Facebook: Borders, regulation and global social media
Borders, regulation and global social media
Hey, Alexa, who else is listening right now?
UC to use NSF grant to explore smart speaker security
Hey, Alexa, who else is listening right now?
UC to use NSF grant to explore smart speaker security
Who’s a bot and who’s not
A new study reveals behavioral differences between bots and humans that could inform new machine learning algorithms for bot detection software
8th Heidelberg Laureate Forum postponed until 2021
Digital platforms connect researchers this year
UTSA Professor wins grant to protect wearable tech and mobile devices
Assistant Professor Dr. Murtuza Jadliwala of the Computer Science (CS) Department has been awarded the National Science Foundation’s (NSF) Faculty Early Career Development or CAREER grant. This most prestigious $499,512, 5-year award for early career faculty funds Jadliwala’s research on…
ACM SIGWEB to sponsor and organize leading international web conference series
ACM, the Association for Computing Machinery, and the International World Wide Web Conference Committee (IW3C2) today announced an agreement to transfer full legal and financial sponsorship of The Web Conference series of conferences from IW3C2 to ACM’s Special Interest Group…
Beyond encryption: Protecting consumer privacy while keeping survey results accurate
A new methodology permanently alters survey datasets to protect consumers’ privacy — when data is shared — while still preserving a level of reasonable accuracy for these datasets
Critical ‘starbleed’ vulnerability in FPGA chips identified
FPGA chips are part of many safety-critical applications; they have one particular valuable feature: they are individually reprogrammable — but with this feature also comes a risk
New silicon chip ‘fingerprint’ for stronger hardware security at low cost
Novel PUF silicon fingerprinting technique achieves long-term stability using machine learning, eliminates conventional attack points via physical hiding, and reduces cost of chip design and testing drastically
New silicon chip ‘fingerprint’ for stronger hardware security at low cost
Novel PUF silicon fingerprinting technique achieves long-term stability using machine learning, eliminates conventional attack points via physical hiding, and reduces cost of chip design and testing drastically
Bluetooth signals from your smartphone could automate COVID-19 contact tracing
A system that enables smartphones to transmit ‘chirps’ to nearby devices could notify people if they have been near an infected person
Future quantum computers may pose threat to today’s most-secure communications
Quantum computers that are exponentially faster than any of our current classical computers and are capable of code-breaking applications could be available in 12 to 15 years, posing major risks to the security of current communications systems, according to a…
Balcan named recipient of ACM Grace Murray Hopper Award for machine learning innovations
Foundational contributions to minimally-supervised learning recognized
COVID-19 contact tracing apps: 8 privacy questions governments should ask
As part of their efforts to slow the outbreak of coronavirus, governments, research institutions and industry are developing contact tracing apps to record interactions between people. The apps warn users if one of the people they have been recorded as…
Army researchers measure reliability, confidence for next-gen AI
ADELPHI, Md. (March 30, 2020) – A team of Army and industry researchers have developed a metric for neural networks–computing systems modeled loosely after the human brain–that could assess the reliability and confidence of the next generation of artificial intelligence…
ACM launches industry-focused journal on digital threats
First issue looks at incident response and security teams
In politics and pandemics, trolls use fear, anger to drive clicks
Fake Facebook ads placed by Russians in 2016 earned 9 times more clicks than typical ads
Sandia initiatives to protect US energy grid and nuclear weapons systems
ALBUQUERQUE, N.M. — To deter attempts to disable U.S. electrical utilities and to defend U.S. nuclear weapon systems from evolving technological threats, Sandia National Laboratories has begun two multiyear initiatives to strengthen U.S. responses. Power Grid One is focused on…
Cross-technology communication in the Internet of Things significantly simplified
Whether networked vehicles that warn of traffic jams in real time, household appliances that can be operated remotely, “wearables” that monitor physical activity, or industrial plants that detect possible production errors in time and notify technical support, the number of…
Cross-technology communication in the Internet of Things significantly simplified
Whether networked vehicles that warn of traffic jams in real time, household appliances that can be operated remotely, “wearables” that monitor physical activity, or industrial plants that detect possible production errors in time and notify technical support, the number of…
Julien Gamba, awarded with the 2020 Norton LifeLock/Symantec Fellowship
Julien Gamba, predoctoral researcher at IMDEA Networks Institute, has been awarded with one of the 2020 NortonLifeLock Research Group Graduate Fellowship. This is one of the most selective world Fellowships in the area of cybersecurity. As in previous editions (the…
Researchers expose vulnerabilities of password managers
Some commercial password managers may be vulnerable to cyber-attack by fake apps, new research suggests.
Next gen 911 services are highly vulnerable to cyberattacks — Ben-Gurion researchers
NORTH CAROLINA…March 11, 2020 – Despite a previous warning by Ben-Gurion University of the Negev (BGU) researchers, who exposed vulnerability in the 911 system due to distributed denial of service attacks (DDoS), the next generation of 911 systems that now…
How secure are four and six-digit mobile phone PINs?
Apple and Android implement a number of measures to protect their users’ devices. An international team of IT security experts has investigated how useful they are.
Intel processors are still vulnerable to attack
Computer scientists at KU Leuven have once again exposed a security flaw in Intel processors. Jo Van Bulck, Frank Piessens, and their colleagues in Austria, the United States, and Australia gave the manufacturer one year’s time to fix the problem.…
University of Arizona professor Gregory Ditzler Wins NSF CAREER Award
Electrical and computer engineering researcher is making sure machine learning technologies like autonomous vehicles and facial recognition stay secure.
ACM publishes new journal on the Internet of Things
New publication chronicles one of the most transformative developments of the 21st century
IT startup develops novel blockchain-based approach for secure linking of databases
In order to bring this Software, called “ChainifyDB” to market, the Federal Ministry of Education and Research is supporting the Saarbrücken researchers’ start-up, which is currently being founded, with 840,000 euros. “Our software resembles keyhole surgery. With a barely noticeable…
ACM publishes new journal on the Internet of Things
New publication chronicles one of the most transformative developments of the 21st century
IT startup develops novel blockchain-based approach for secure linking of databases
In order to bring this Software, called “ChainifyDB” to market, the Federal Ministry of Education and Research is supporting the Saarbrücken researchers’ start-up, which is currently being founded, with 840,000 euros. “Our software resembles keyhole surgery. With a barely noticeable…
Researchers identify novel cybersecurity approach to protect Army systems
ADELPHI, Md. — Researchers at the Army’s corporate laboratory in collaboration with the University of California, Riverside have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies. Networked…
Carl Kesselman honored with IEEE Medal for Career Achievements in Computing
Dean’s Professor of Industrial and Systems Engineering and Information Sciences Institute Fellow has been awarded the Harry H. Goode Memorial Award
Researchers identify novel cybersecurity approach to protect Army systems
ADELPHI, Md. — Researchers at the Army’s corporate laboratory in collaboration with the University of California, Riverside have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies. Networked…
Carl Kesselman honored with IEEE Medal for Career Achievements in Computing
Dean’s Professor of Industrial and Systems Engineering and Information Sciences Institute Fellow has been awarded the Harry H. Goode Memorial Award
Cyber toolkit a ‘complete package’ for detectives, companies
WEST LAFAYETTE, Ind. – A growing number of law enforcement agencies from across the world want to use Purdue University technology to help them track down cybercriminals with a toolkit that also can help companies stop insider threats and technology-facilitated…
Bennett, Brassard and Shor win the Frontiers of Knowledge Award in Basic Sciences
The BBVA Foundation Frontiers of Knowledge Award in Basic Sciences has gone in this twelfth edition to Charles Bennett, Gilles Brassard and Peter Shor for their ‘outstanding contributions to the field of quantum computation and communication’
To predict an epidemic, evolution can’t be ignored
When scientists try to predict the spread of something across populations–anything from a coronavirus to misinformation–they use complex mathematical models to do so. Typically, they’ll study the first few steps in which the subject spreads, and use that rate to…
To predict an epidemic, evolution can’t be ignored
When scientists try to predict the spread of something across populations–anything from a coronavirus to misinformation–they use complex mathematical models to do so. Typically, they’ll study the first few steps in which the subject spreads, and use that rate to…
Tracking communication networks and the diffusion of information
At the APS March Meeting in Denver, scientists will present their research on the ways people use networks to share information — beginning with communication
Computer scientists’ new tool fools hackers into sharing keys for better cybersecurity
DEEP-Dig (DEcEPtion DIGging) ushers intruders into a decoy site so the computer can learn from hackers’ tactics
Computer scientists’ new tool fools hackers into sharing keys for better cybersecurity
DEEP-Dig (DEcEPtion DIGging) ushers intruders into a decoy site so the computer can learn from hackers’ tactics
New sandboxing approach in web browser increases security
A powerful new approach to securing web browsers, using a tool called WebAssembly, is getting its first real-world application in the Firefox browser. Developed by a team of researchers from The University of Texas at Austin, the University of California…
New ACM journal explores how technology is transforming government
In inaugural issue, pioneers look at the development and future of digital democracy
Researchers develop framework that improves Firefox security
Computer scientists develop a technique to protect browsers from buggy third-party libraries
New sandboxing approach in web browser increases security
A powerful new approach to securing web browsers, using a tool called WebAssembly, is getting its first real-world application in the Firefox browser. Developed by a team of researchers from The University of Texas at Austin, the University of California…
New ACM journal explores how technology is transforming government
In inaugural issue, pioneers look at the development and future of digital democracy
Researchers develop framework that improves Firefox security
Computer scientists develop a technique to protect browsers from buggy third-party libraries
Engage with the world’s most talented mathematicians and computer scientists in Heidelberg
The Heidelberg Laureate Forum enables selected young researchers to profoundly network with the laureates of mathematics and computer science