A thriving marketplace for SSL and TLS certificates -- small data files used to facilitate confidential communication between organizations' servers and their clients' computers -- exists on a hidden part of the Internet, according to new research by Georgia State University's Evidence-Based Cybersecurity Research Group (EBCS) and the University of Surrey.
A new study debunks a popular, two-decade-old theory about the shape of networks.
Researchers have analyzed the real-time effect of a large-scale hack on automobiles in a major urban environment. Using percolation theory, they analyzed how a large, disseminated hack on automobiles would affect traffic flow in New York City, and they found that it could create citywide gridlock. However, based on these findings the team also developed a risk-mitigation strategy to prevent mass urban disruption -- work they will describe at the 2019 APS March Meeting.
Side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure, a new study suggests.
How good is the research on the success or failure of the system that verifies your identity when you log into a computer, smartphone or other device? Chances are it's not good, and that's a major security and privacy issue that should be fixed, according to a Rutgers University-New Brunswick study that proposes a novel solution.
Many modern laptops and an increasing number of desktop computers are much more vulnerable to hacking through common plug-in devices than previously thought, according to new research.
Researchers from the University of California, Irvine and the University of California, Riverside have uncovered the possibility of an acoustic side-channel attack on the DNA synthesis process, a vulnerability that could present a serious risk to biotechnology and pharmaceutical companies and academic research institutions.
Scientists from UC Irvine and UC Riverside showed they could reconstruct what a researcher was doing by recording the sounds of the lab instrument used. The method accurately detects what type of DNA a DNA synthesizer is making. That means academic, industrial, and government labs are potentially wide open to espionage that could destabilize research, jeopardize product development, and even put national security at risk.
Leading quantum technology experts from around the world have explored their respective regional and national goals for the future of the field, in a new focus issue of Quantum Science and Technology. The first five articles in the collection, covering Australia, Japan, the United States, Canada and the European Union, are published today. They are written by the leading researchers involved in each country or region's initiative.
UC San Francisco researchers have created a proof-of-concept method for ensuring the integrity of clinical trials data with blockchain. The system creates an immutable audit trail that makes it easy to spot any tampering with results -- such as making the treatment look more effective or diminishing side effects. The research will be published Feb. 22 in Nature Communications.