Overall, the results demonstrated that in a real-life friendship scenario we can detect people who have the strongest friendship ties as well as malicious users, even on Twitter,' the researchers say. 'Our method outperforms other anomaly detection methods and we believe that it has considerable potential for a wide range of applications particularly in the cyber-security arena.'
US Army-funded researchers at the University of California in Los Angles have found a proverbial smoking gun signature of the long sought-after Majorana particle, and the find, they say, could block intruders on sensitive communication networks.
It may sound like a futuristic device out of a spy novel, a computer the size of a pinhead, but according to new research from the University of New Hampshire, it might be a reality sooner than once thought. Researchers have discovered that using an easily made combination of materials might be the way to offer a more stable environment for smaller and safer data storage, ultimately leading to miniature computers.
Researchers at the National Institute of Standards and Technology (NIST) have developed a method for generating numbers guaranteed to be random by quantum mechanics. Described in the April 12 issue of Nature, the experimental technique surpasses all previous methods for ensuring the unpredictability of its random numbers and may enhance security and trust in cryptographic systems.
Someone who starts mining a crypto-currency shortly after it is listed on exchanges can potentially earn higher returns than average. But a speculator who enters the market shortly after the currency is listed might potentially earn lower returns. These are some of the findings from a study where computer scientists estimated the potential profitability of mining versus speculating for 18 crypto-currencies that are not Bitcoin and Litecoin -- known under the general label of altcoin.
A recent study published in the Journal of Management Information Systems suggests information security managers and supervisors could have greater success in motivating employees to act more securely by avoiding cold, authoritative commands, and instead create security messages that are relatable and provide options for how employees can better protect information and respond to threats.
The murky ecosystem of ransomware payments comes into focus in a forthcoming paper by university and industry researchers. It provides the first detailed account of the ransomware payment ecosystem, from initial attack to cash-out. Ransomware attacks, which encrypt and hold a computer user's files hostage in exchange for payment, extort millions of dollars from individuals each month, and comprise one of the fastest-growing forms of cyber attack.
A new study by researchers Nikolaos Gatsis, David Akopian and Ahmad F. Taha from the UTSA Department of Electrical and Computer Engineering describes a computer algorithm that mitigates the effects of spoofed GPS attacks on electrical grids and other GPS-reliant technologies. This new algorithm has the potential to help cybersecurity professionals to better detect and prevent cyber attacks in real time.
Ten new attacks and nine prior attacks on 4G LTE networks were outlined in a paper.
'It only took 30 minutes to find passwords for most of the devices and some of them were found only through a Google search of the brand,' says Omer Shwartz, a Ph.D. student and member of Dr. Oren's lab. 'Once hackers can access an IoT device, like a camera, they can create an entire network of these camera models controlled remotely.'