Quantum breakthrough uses light’s quirky properties to boost 3D imaging, paving the way for enhanced performance in self-driving cars, medical imaging and deep-space communications
Tag: SYSTEM SECURITY/HACKERS
Engage with the world’s most talented mathematicians and computer scientists in Heidelberg
The Heidelberg Laureate Forum enables selected young researchers to profoundly network with the laureates of mathematics and computer science
Want to catch a photon? Start by silencing the sun
Quantum breakthrough uses light’s quirky properties to boost 3D imaging, paving the way for enhanced performance in self-driving cars, medical imaging and deep-space communications
Cryptographic ‘tag of everything’ could protect the supply chain
Tiny, battery-free ID chip can authenticate nearly any product to help combat losses to counterfeiting
Magnet-controlled bioelectronic implant could relieve pain
Rice engineer’s MagNI can be wirelessly charged and programmed with magnetic fields
Cyber researchers at Ben-Gurion University fool autonomous vehicle systems with phantom images
BEER-SHEVA, ISRAEL…February 18, 2020 – Researchers from Ben-Gurion University of the Negev’s (BGU) Cyber Security Research Center have found that they can cause the autopilot on an autonomous vehicle to erroneously apply its brakes in response to “phantom” images projected…
Rice boosts ‘internet of things’ security — again
Engineers’ custom circuits would make systems 14,000 times harder to crack than current tech
LTE vulnerability: Attackers can impersonate other mobile phone users
They can thus start a subscription at the expense of others or publish secret company documents under someone else’s identity
Four University of Houston faculty members elected to National Academy of Inventors
Research ranges from better batteries to better ways of diagnosing Alzheimer’s disease
Four University of Houston faculty members elected to National Academy of Inventors
Research ranges from better batteries to better ways of diagnosing Alzheimer’s disease
Autonomous vehicle technology may improve safety for US Army convoys, report says
U.S. Army convoys could be made safer for soldiers by implementing autonomous vehicle technology to reduce the number of service members needed to operate the vehicles, according to a new study from the RAND Corporation. “The Army is interested in…
Autonomous vehicle technology may improve safety for US Army convoys, report says
U.S. Army convoys could be made safer for soldiers by implementing autonomous vehicle technology to reduce the number of service members needed to operate the vehicles, according to a new study from the RAND Corporation. “The Army is interested in…
Software updates slowing you down?
Texas A&M researchers, along with computer scientists at Intel Labs, have designed a tool to identify the source of errors caused by software updates.
Software updates slowing you down?
Texas A&M researchers, along with computer scientists at Intel Labs, have designed a tool to identify the source of errors caused by software updates.
Feds back Rice computer scientist’s security strategy
Ang Chen wins prestigious National Science Foundation CAREER Award
Feds back Rice computer scientist’s security strategy
Ang Chen wins prestigious National Science Foundation CAREER Award
Story tips: Fusion squeeze, global image mapping, computing mental health, Na+ batteries
Fusion – Squeezing the code The prospect of simulating a fusion plasma is a step closer to reality thanks to a new computational tool developed by scientists in fusion physics, computer science and mathematics at Oak Ridge National Laboratory. Harnessing…
Giving cryptocurrency users more bang for their buck
Routing scheme boosts efficiency in networks that help speed up blockchain transactions
Giving cryptocurrency users more bang for their buck
Routing scheme boosts efficiency in networks that help speed up blockchain transactions
Researchers develop first all-optical, stealth encryption technology at Ben-Gurion University
Optical end-to-end solution includes encryption, transmission, decryption, and detection
AEPD and CNIL award their data protection prizes to a team including researchers from IMDEA Networks
The award-winning article is ‘An Analysis of Pre-installed Android Software’ by Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador and Narseo Vallina-Rodriguez
Researchers develop first all-optical, stealth encryption technology at Ben-Gurion University
Optical end-to-end solution includes encryption, transmission, decryption, and detection
AEPD and CNIL award their data protection prizes to a team including researchers from IMDEA Networks
The award-winning article is ‘An Analysis of Pre-installed Android Software’ by Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador and Narseo Vallina-Rodriguez
Hey Google, are my housemates using my smart speaker?
UBC research shows more needs to be done to alleviate user concerns about privacy and security
Hey Google, are my housemates using my smart speaker?
UBC research shows more needs to be done to alleviate user concerns about privacy and security
The great e-scooter hack
Micromobility vehicles, such as e-scooters, zip in and out of traffic. In San Antonio alone, over 12,000 scooters are on the road. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion.
The Great E-Scooter Hack
New research exposes security risk for e-scooters and riders
The Great E-Scooter Hack
New research exposes security risk for e-scooters and riders
ACM signs new open-access agreements with four leading universities
New ACM open publishing model promises to accelerate ACM’s transition to full open access
ACM FAT* conference asks: ‘Are algorithmic systems fair?’
Premier conference in exciting and fast-growing research area
HP-NTU corporate lab showcases R&D innovations
Announces digital manufacturing skills development program for the fourth industrial revolution
ACM FAT* conference asks: ‘Are algorithmic systems fair?’
Premier conference in exciting and fast-growing research area
HP-NTU corporate lab showcases R&D innovations
Announces digital manufacturing skills development program for the fourth industrial revolution
Detecting and mitigating network attacks with a multi-prong approach
To solve a problem, you must first see the problem. More than that, whatever fallout the problem is causing must be controlled while you solve it. That’s the approach an international team of researchers has taken for combatting network attacks.…
Detecting and mitigating network attacks with a multi-prong approach
To solve a problem, you must first see the problem. More than that, whatever fallout the problem is causing must be controlled while you solve it. That’s the approach an international team of researchers has taken for combatting network attacks.…
Detecting and mitigating network attacks with a multi-prong approach
To solve a problem, you must first see the problem. More than that, whatever fallout the problem is causing must be controlled while you solve it. That’s the approach an international team of researchers has taken for combatting network attacks.…
First TU Graz-SAL Research Labs push top-level research in electronics-based systems
Whether car, smartphone or tablet, today microelectronics is found in almost every electronic device and forms the basis of the Internet of Things (IoT) in which billions of smart devices are networked to form intelligent systems. The electronic components have…
Software detects backdoor attacks on facial recognition
RESEARCH Triangle Park, N.C. — As the U.S. Army increasingly uses facial and object recognition to train artificial intelligent systems to identify threats, the need to protect its systems from cyberattacks becomes essential. An Army project conducted by researchers at…
First TU Graz-SAL Research Labs push top-level research in electronics-based systems
Whether car, smartphone or tablet, today microelectronics is found in almost every electronic device and forms the basis of the Internet of Things (IoT) in which billions of smart devices are networked to form intelligent systems. The electronic components have…
Software detects backdoor attacks on facial recognition
RESEARCH Triangle Park, N.C. — As the U.S. Army increasingly uses facial and object recognition to train artificial intelligent systems to identify threats, the need to protect its systems from cyberattacks becomes essential. An Army project conducted by researchers at…
New security system to revolutionize communications privacy
New computer chip enables information to be sent from user to user using a one-time un-hackable communication Technology overcomes major threat of quantum computers, which are soon predicted to be able to crack existing communication methods The method uses existing…
New security system to revolutionize communications privacy
New computer chip enables information to be sent from user to user using a one-time un-hackable communication Technology overcomes major threat of quantum computers, which are soon predicted to be able to crack existing communication methods The method uses existing…
‘Inconsistent and misleading’ password meters could increase risk of cyber attacks
Password meters are frequently made available to help users secure their personal data against the threats posed by cyber criminals. However, the ‘inconsistent and misleading’ advice offered on some of the world’s most popular websites could actually be doing more…
‘Inconsistent and misleading’ password meters could increase risk of cyber attacks
Password meters are frequently made available to help users secure their personal data against the threats posed by cyber criminals. However, the ‘inconsistent and misleading’ advice offered on some of the world’s most popular websites could actually be doing more…
Open-source system securing software updates ‘graduates’ to protect leading cloud services
Amazon, Microsoft, Google, and other leading cloud companies have adopted technology developed at NYU Tandon School of Engineering
A prestigious recognition
Computer hardware and software professors are honored by the Association for Computing Machinery
Successful satellite launch for Graz University of Technology, Austria
ESA’s OPS-SAT mission to test new space technology in orbital flight
Open-source system securing software updates ‘graduates’ to protect leading cloud services
Amazon, Microsoft, Google, and other leading cloud companies have adopted technology developed at NYU Tandon School of Engineering
A prestigious recognition
Computer hardware and software professors are honored by the Association for Computing Machinery
Online hate speech could be contained like a computer virus, say Cambridge researchers
The spread of hate speech via social media could be tackled using the same “quarantine” approach deployed to combat malicious software, according to University of Cambridge researchers. Definitions of hate speech vary depending on nation, law and platform, and just…