The spread of hate speech via social media could be tackled using the same “quarantine” approach deployed to combat malicious software, according to University of Cambridge researchers. Definitions of hate speech vary depending on nation, law and platform, and just…
Tag: SYSTEM SECURITY/HACKERS
Open-source system securing software updates ‘graduates’ to protect leading cloud services
Amazon, Microsoft, Google, and other leading cloud companies have adopted technology developed at NYU Tandon School of Engineering
How vulnerable is your car to cyberattacks?
Even the smartest of smart cars have issues
How vulnerable is your car to cyberattacks?
Even the smartest of smart cars have issues
Wayne State to enhance cybersecurity of chemical process control systems
DETROIT – Smart manufacturing processes are becoming more automated with the help of algorithms that aim to boost profits, reduce resource use and decrease human error. In industries using chemical reactions, separation and transport, these smart manufacturing processes are expected…
Wayne State to enhance cybersecurity of chemical process control systems
DETROIT – Smart manufacturing processes are becoming more automated with the help of algorithms that aim to boost profits, reduce resource use and decrease human error. In industries using chemical reactions, separation and transport, these smart manufacturing processes are expected…
Secure data backup of medical records using secret sharing and secure communications
Prompt restoration of medical records via a satellite link for disaster medical support
Secure data backup of medical records using secret sharing and secure communications
Prompt restoration of medical records via a satellite link for disaster medical support
World’s largest computing society announces 2019 Fellows
58 innovators selected from around the world
A developement kit to protect your data on the web
With a simple click on “I agree”, often without reading any disclaimer about privacy and data management, we give away personal information to get free access to online services. We do not have the possibility to control and negotiate, compelled…
A developement kit to protect your data on the web
With a simple click on “I agree”, often without reading any disclaimer about privacy and data management, we give away personal information to get free access to online services. We do not have the possibility to control and negotiate, compelled…
Data Science Institute researcher designs headphones that warn pedestrians of dangers
You see them all over city streets: pedestrians wearing headphones or earbuds – their faces glued to their phones as they stroll along oblivious to their surroundings. Known as “twalking,” the behavior is not without its dangers. Headphone-wearing pedestrians often…
Data Science Institute researcher designs headphones that warn pedestrians of dangers
You see them all over city streets: pedestrians wearing headphones or earbuds – their faces glued to their phones as they stroll along oblivious to their surroundings. Known as “twalking,” the behavior is not without its dangers. Headphone-wearing pedestrians often…
Cultural differences account for global gap in online regulation — study
Differences in cultural values have led some countries to tackle the spectre of cyber-attacks with increased internet regulation, whilst others have taken a ‘hands-off’ approach to online security – a new study shows. Internet users gravitate towards one of two…
Cultural differences account for global gap in online regulation — study
Differences in cultural values have led some countries to tackle the spectre of cyber-attacks with increased internet regulation, whilst others have taken a ‘hands-off’ approach to online security – a new study shows. Internet users gravitate towards one of two…
Department of Energy announces $80 million for new grid modernization lab call projects
This news release, issued by the U.S. Department of Energy (DOE) on November 6, announces projects funded through the Grid Modernization Initiative’s 2019 Grid Modernization Lab Call to help improve the resiliency and reliability of our nation’s energy infrastructure. DOE’s…
Department of Energy announces $80 million for new grid modernization lab call projects
This news release, issued by the U.S. Department of Energy (DOE) on November 6, announces projects funded through the Grid Modernization Initiative’s 2019 Grid Modernization Lab Call to help improve the resiliency and reliability of our nation’s energy infrastructure. DOE’s…
Measuring online behavioral advertising: One more step to protect users
Dr. Nikolaos Laoutaris has developed two methods to detect ad targeting
Measuring online behavioral advertising: One more step to protect users
Dr. Nikolaos Laoutaris has developed two methods to detect ad targeting
Data science expert Bader looks to Fed funding for info analysis
Data science has reached a point where techniques such as deep learning can beat humans at recognizing objects, although experts are still figuring out how to make explainable predictions from massive data, NJIT distinguished professor David Bader said. Bader leads…
Data science expert Bader looks to Fed funding for info analysis
Data science has reached a point where techniques such as deep learning can beat humans at recognizing objects, although experts are still figuring out how to make explainable predictions from massive data, NJIT distinguished professor David Bader said. Bader leads…
New artificial intelligence system automatically evolves to evade internet censorship
Researchers at the University of Maryland developed a new tool based on genetic evolution that automatically learned to evade censorship in China, India and Kazakhstan
New artificial intelligence system automatically evolves to evade internet censorship
Researchers at the University of Maryland developed a new tool based on genetic evolution that automatically learned to evade censorship in China, India and Kazakhstan
£3m Cyber-SHIP Lab offers opportunity to address maritime cyber security challenges
A unique new research facility designed to address the key cyber security challenges facing the shipping industry is being established at the University of Plymouth. The £3million Cyber-SHIP Lab, supported by funding from Research England, part of UK Research and…
In classical and quantum secure communication practical randomness is incomplete
Random bit sequences are key ingredients of various tasks in modern life and especially in secure communication. In a new study researchers have determined that generating true random bit sequences, classical or quantum, is an impossible mission. Based on these…
£3m Cyber-SHIP Lab offers opportunity to address maritime cyber security challenges
A unique new research facility designed to address the key cyber security challenges facing the shipping industry is being established at the University of Plymouth. The £3million Cyber-SHIP Lab, supported by funding from Research England, part of UK Research and…
In classical and quantum secure communication practical randomness is incomplete
Random bit sequences are key ingredients of various tasks in modern life and especially in secure communication. In a new study researchers have determined that generating true random bit sequences, classical or quantum, is an impossible mission. Based on these…
£3m Cyber-SHIP Lab offers opportunity to address maritime cyber security challenges
A unique new research facility designed to address the key cyber security challenges facing the shipping industry is being established at the University of Plymouth. The £3million Cyber-SHIP Lab, supported by funding from Research England, part of UK Research and…
In classical and quantum secure communication practical randomness is incomplete
Random bit sequences are key ingredients of various tasks in modern life and especially in secure communication. In a new study researchers have determined that generating true random bit sequences, classical or quantum, is an impossible mission. Based on these…
Major conference explores challenges and opportunities in cybersecurity
CCS 2019 program addresses security in variety of environments, Including cloud, IoT, social media and elections
World’s largest computing society announces 2019 distinguished members
Geographically diverse group cited for educational, engineering, and scientific contributions
Preventing cyber security attacks lies in strategic, third-party investments, study finds
Companies that want to keep data safe need to strengthen every vendor handling data
Supporting women in cybersecurity through INI and EWF partnership
INI student Irina Dumitrescu receives full-tuition fellowship to study information security at Carnegie Mellon University
Combination of techniques could improve security for IoT devices
UNIVERSITY PARK, Pa. — A multi-pronged data analysis approach that can strengthen the security of Internet of Things (IoT) devices — such as smart TVs, home video cameras and baby monitors — against current risks and threats has created by…
Scientists improve voiceprint collection
Researchers from HSE University and Nizhny Novgorod State Linguistic University (LUNN) have developed a new method for ensuring quality in automatic voice recording. Resistant to background noise of 10dB and higher, the new algorithm can operate in real-time, making it…
Product authentication at your fingertips
UC Riverside-led research brings rapid and reversible switching of plasmonic color to solids
EPFL researchers invent low-cost alternative to Bitcoin
The cryptocurrency Bitcoin is limited by its astronomical electricity consumption and outsized carbon footprint. A nearly zero-energy alternative sounds too good to be true, but as School of Computer and Communication Sciences (IC) Professor Rachid Guerraoui explains, it all comes…
European quantum experts meet in Helsinki to discuss the progress & future of quantum technologies
* Organised by the Finnish Presidency, Aalto University, VTT Technical Research Centre of Finland, the Academy of Finland, and the Quantum Flagship, the event will take place on October 17-18. * Representatives from the quantum technology communities will review present…
UT Dallas alumnus earns Presidential Early Career Award for Scientists, Engineers
Professor’s lab invitation fueled computer scientist’s passion for research
$3M grant to create cybersecurity modeled after human body
University of Arizona electrical and computer engineering researchers are training a future cybersecurity workforce and creating bioinspired methods for keeping computers secure
Computer science has a role to play in tackling climate change
Artificial intelligence and a devoted European supercomputer would allow climate models to produce real-time forecasts for specific locations
Bots might prove harder to detect in 2020 elections
New study by USC researchers shows bots evolving to better mimic humans during elections
ACM RecSys conference showcases the latest in recommender systems
Impact on industries including healthcare, fashion, and news examined
Heidelberg Laureate Forum — A magnet for mathematics and computer science
200 young talents Provide 200 mathematicians and computer scientists the opportunity to network with peers from utterly different backgrounds and enthusiasm is a natural by product. Find out what drives the young scientists, what motivated them to pursue a career…
Attackers could be listening to what you type
SMU researchers were able to detect what is typed with remarkable accuracy using just a smartphone
App allows inspectors to find gas pump skimmers faster
Bluetana detects skimmers’ Bluetooth signature and is more accurate than other apps