Please turn on your JavaScript for this page to function normally.
NIST cryptographic system
Encrypted method that measures encounters could slow down or prevent future pandemics

When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part …

5G
5G network slicing vulnerability leaves enterprises exposed to cyberattacks

AdaptiveMobile Security today publicly disclosed details of a major security flaw in the architecture of 5G network slicing and virtualized network functions. The fundamental …

face
Can private data be recovered from “sanitized” images?

Machine learning systems are becoming pervasive not only in technologies affecting our day-to-day lives, but also in those observing them, including face expression …

lock
How to tackle modern agriculture security challenges

According to recent estimates, there will be roughly 10 billion people to feed in 2050. Agricultural production will need to increase by almost 56% to guarantee food security …

malware
Multi-payload Gootloader platform stealthily delivers malware and ransomware

The delivery method for the six-year-old Gootkit financial malware has been developed into a complex and stealthy delivery system for a wide range of malware, including …

Amazon Alexa
Alexa Skills: Security gaps and data protection problems

With the voice commands “Alexa Skills,” users can load numerous extra functions onto their Amazon voice assistant. Amazon screens special voice assistant functions for …

tracking
CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses

As browser-makers move to defang third-party (tracking) cookies, marketers are increasingly switching to alternative tracking techniques. One of these is CNAME cloaking, which …

user
How can we protect ourselves against fake news and manipulation?

The internet has revolutionized our lives – whether in terms of working, finding information or entertainment, connecting with others, or shopping. The online world has …

Zoom
Most zoombombing incidents are inside jobs

Most zoombombing incidents are “inside jobs” according to a study featuring researchers at Binghamton University, State University of New York. As the COVID-19 …

fake news
Researchers develop approach that can recognize fake news

Social media is increasingly used to spread fake news. The same problem can be found on the capital market – criminals spread fake news about companies in order to …

sharing
Researchers develop tool that ensures secure sensitive data sharing

A data privacy tool has been developed to help ensure key datasets – such as those tracking COVID-19 – can be publicly shared with an extra layer of security for sensitive …

search
Tailored AI-generated advice may stop the spread of misinformation

Warnings about misinformation are now regularly posted on Twitter, Facebook, and other social media platforms, but not all of these cautions are created equal. A research from …

Don't miss

Cybersecurity news