research
Countries that retaliate too much against cyberattacks make things worse for themselves
During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet …
Engineers design transistor that disguises key computer chip hardware from hackers
A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …
Face recognition software making progress at recognizing masked faces
A study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress at recognizing …
Malware may trick biologists into generating dangerous toxins in their labs
An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion …
Using drones to improve 5G network security
The introduction of 5G will change the way we communicate, multiply the capacity of the information highways, and allow everyday objects to connect to each other in real time. …
Researchers bring deep learning to IoT devices
Deep learning is everywhere. This branch of artificial intelligence curates your social media and serves your Google search results. Soon, deep learning could also check your …
Even the world’s freest countries aren’t safe from internet censorship
The largest collection of public internet censorship data ever compiled shows that even citizens of what are considered the world’s freest countries aren’t safe …
Researchers break Intel SGX by creating $30 device to control CPU voltage
Researchers at the University of Birmingham have managed to break Intel SGX, a set of security functions used by Intel processors, by creating a $30 device to control CPU …
ML tool identifies domains created to promote fake news
Academics at UCL and other institutions have collaborated to develop a machine learning tool that identifies new domains created to promote false information so that they can …
Holiday gifts getting smarter, but creepier when it comes to privacy and security
A Hamilton Beach Smart Coffee Maker that could eavesdrop, an Amazon Halo fitness tracker that measures the tone of your voice, and a robot-building kit that puts your kid’s …
New side-channel attacks allow access to sensitive data on Intel CPUs
An international team of security researchers is presenting new side-channel attacks (CVE-2020-8694 and CVE-2020-8695), which use fluctuations in software power consumption to …
Developing a quantum network that exchanges information across long distances by using photons
Researchers at the University of Rochester and Cornell University have taken an important step toward developing a communications network that exchanges information across …