Please turn on your JavaScript for this page to function normally.
search
Tailored AI-generated advice may stop the spread of misinformation

Warnings about misinformation are now regularly posted on Twitter, Facebook, and other social media platforms, but not all of these cautions are created equal. A research from …

eavesdropping
Bugs in Signal, other video chat apps allowed attackers to listen in on users

Bugs in several messaging/video chat mobile apps allowed attackers to spy on targeted users’s surroundings. The vulnerabilities – in Signal, Google Duo, Facebook …

numbers
Research team develops fast and affordable quantum random number generator

An international research team has developed a fast and affordable quantum random number generator. The device created by scientists from NUST MISIS, Russian Quantum Center, …

question
Users can be manipulated to share private information online

Online users are more likely to reveal private information based on how website forms are structured to elicit data, Ben-Gurion University of the Negev (BGU) researchers have …

drone
Operational planning simulation for defense against an attacking drone swarm

The 2018 Winter Olympics in PyeongChang, South Korea stunned the world when they put on a dazzling light show made up of a record-breaking 1,218 drones, all dancing in …

question
A new approach to scanning social media helps combat misinformation

Rice University researchers have discovered a more efficient way for social media companies to keep misinformation from spreading online using probabilistic filters trained …

IoT
Researchers develop tool that automates device programming in the IoT

The Internet of Things (IoT) has ushered in a new era, with everyday items evolving into what we now refer to as cyber-physical systems. These systems are physical mechanisms …

Internet
Countries that retaliate too much against cyberattacks make things worse for themselves

During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet …

Joerg Appenzeller computer chip
Engineers design transistor that disguises key computer chip hardware from hackers

A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …

NIST mask research
Face recognition software making progress at recognizing masked faces

A study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress at recognizing …

DNA
Malware may trick biologists into generating dangerous toxins in their labs

An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion …

5G
Using drones to improve 5G network security

The introduction of 5G will change the way we communicate, multiply the capacity of the information highways, and allow everyday objects to connect to each other in real time. …

Don't miss

Cybersecurity news