Over the past decade, digital cameras have been widely adopted in various aspects of our society, and are being massively used in mobile phones, security surveillance, autonomous vehicles, and fa...
Mobile devices use facial recognition technology to help users quickly and securely unlock their phones, make a financial transaction or access medical records. But facial recognition technologie...
https://techxplore.com/news/2022-08-deepfakes-expose-vulnerabilities-facial-recognition.html
A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer, MIT r...
https://techxplore.com/news/2022-08-mitigate-potential-side-channel-vulnerability-multicore.html
Cryptographers love an enigma, a problem to solve—and this one has it all. Indestructible codes, secret notes, encryption and decryption.
https://techxplore.com/news/2022-08-whatsapp-messages-encryptedbut-traceable.html
As the amount of data stored in devices and shared over the internet continuously increases, computer scientists worldwide are trying to devise new approaches to secure communications and protect...
https://techxplore.com/news/2022-07-twin-physically-unclonable-functions-pufs.html
In modern cryptosystems, users generate public and private keys that guarantee security based on computational complexity and use them to encrypt and decrypt information. Recently however, modern...
https://techxplore.com/news/2022-07-key-technology-quantum-cryptography-commercialization.html
Touch screens on mobile devices can be attacked and manipulated via charging cables and power supply units. This is what researchers at the System Security Lab at TU Darmstadt have discovered tog...
https://techxplore.com/news/2022-07-thwarting-socket-team-explores-mobile.html
Digital information is everywhere in the era of smart technology, where data is continuously generated by and communicated among cell phones, smart watches, cameras, smart speakers and other devi...
https://techxplore.com/news/2022-07-smart-chip-low-power-platform.html
Deep learning techniques have recently proved to be highly promising for detecting cybersecurity attacks and determining their nature. Concurrently, many cybercriminals have been devising new att...
https://techxplore.com/news/2022-07-deep-technique-dsn-amplification.html
An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyberattacks.
https://techxplore.com/news/2022-06-simple-tool-websites-curb-hacking.html
Advances in computer vision and machine learning have made it possible for a wide range of technologies to perform sophisticated tasks with little or no human supervision. From autonomous drones ...
Researchers are pushing to outpace hackers and develop stronger protections that keep data safe from malicious agents who would steal information by eavesdropping on smart devices.
https://techxplore.com/news/2022-06-methods-efficiently-analog-to-digital-powerful.html
William Shakespeare might have been talking about Apple's recently released M1 chip via his prose in A Midnight Summer's Dream: "And though she be but little, she is fierce."
https://techxplore.com/news/2022-06-hardware-vulnerability-apple-m1-chip.html
Malicious agents can use machine learning to launch powerful attacks that steal information in ways that are tough to prevent and often even more difficult to study.
https://techxplore.com/news/2022-06-web-browsing-safe-hackers.html
A team of engineers at the University of California San Diego has demonstrated for the first time that the Bluetooth signals emitted constantly by our mobile phones have a unique fingerprint that...
https://techxplore.com/news/2022-06-bluetooth-track-smartphones.html
As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data ...
https://techxplore.com/news/2022-06-radio-hardware-tampering.html
From banking to communication our modern, daily lives are driven by data with ongoing concerns over privacy. Now, a new EPFL paper published in Nature Computational Science argues that many promi...
https://techxplore.com/news/2022-06-privacy-preserving-mechanism.html
Many internet-connected devices—let's use smart speakers as an example—share data to the cloud when you interact with them. How do you know your speaker isn't always listening? How do you kno...
https://techxplore.com/news/2022-05-peekaboo-smart-home-privacy.html
In October 2017, tech giant Yahoo! disclosed a data breach that had leaked sensitive information of over 3 billion user accounts, exposing them to identity theft. The company had to force all aff...
https://techxplore.com/news/2022-05-randomly-electrons-cyber.html
A new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second has been created by researchers at Cardiff University.
https://techxplore.com/news/2022-05-method-cyberattacks.html
For years, organizations have taken a defensive "castle-and-moat" approach to cybersecurity, seeking to secure the perimeters of their networks to block out any malicious actors. Individuals with...
https://techxplore.com/news/2022-05-zero-trust-architecture-cybersecurity-insider-threats.html
Video-conferencing platforms such as Skype, Microsoft Teams, Zoom and Google Meet allow people to communicate remotely with others in different parts of the world. The COVID-19 pandemic and the s...
https://techxplore.com/news/2022-05-strategy-discern-real-virtual-video.html
Researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than using previous systems.
https://techxplore.com/news/2022-05-approach-faster-ransomware.html
Crafty hackers can make a tool to eavesdrop on some 6G wireless signals in as little as five minutes using office paper, an inkjet printer, a metallic foil transfer and a laminator.
https://techxplore.com/news/2022-05-eavesdroppers-hack-6g-frequency-diy.html
Algorithms recommend products while we shop online or suggest songs we might like as we listen to music on streaming apps.
https://techxplore.com/news/2022-05-efficient-protocol-user-private-algorithms.html
Apple, Google and Microsoft said Thursday they are looking to get rid of passwords and replace them with a more secure way to access accounts or devices.
https://techxplore.com/news/2022-05-tech-titans-ditch-passwords.html
CyLab researchers have been studying privacy nutrition labels for over a decade, so when Apple introduced privacy labels in their app store a little over a year ago, the researchers were eager to...
A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians at the University of Copenhagen have sol...
https://techxplore.com/news/2022-04-scientific-advance-tool-hackers.html
With nearly 84% of the world's population now owning a smartphone, and our dependence on them growing all the time, these devices have become an attractive avenue for scammers.
https://techxplore.com/news/2022-04-mobile-virus-youll-carefully.html
A growing number of studies suggest that machine learning algorithms can leak a considerable amount of information included in the data used to train them through their model parameters and predi...
https://techxplore.com/news/2022-04-involve-poisoning-machine.html