Researchers from MIT have developed a new security system that has been shown to outperform Intel's own approach at preventing so-called 'timing attacks' made possible by vulnerabilities like Meltdown and Spectre.
An Indiana University study finds stringent password rules that encourage longer and more complicated passwords significantly lower the risk of personal data breaches, especially among employees at large organizations that handle sensitive data, like universities.
Research carried out at the University of York has suggested that more work is needed to show that digital forensic methods are robust enough to stand-up to interrogation in a court of law.
New research from the UBC Sauder School of Business has quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.
The ongoing transition to electronic health records may increase data breaches involving patient records. An analysis of reported breaches of health data from 2010 through 2017 found that except for 2015, the number of breach reports increased each year. During this time there were 2,149 breaches comprising a total of 176.4 million records. The most common entity breached was a health care provider, with 1,503 breaches (70 percent) compromising a total of 37.1 million records.
There are currently millions of heavily underutilized devices in the World. The storage, networking, sensing and computational power of laptops, smartphones, routers or base stations grows with each new version and product release. Why not put all those extra gigabytes of memory and those powerful processing units to work collaboratively and expand the services available to all of us?
Researchers find AI-generated reviews and comments pose a significant threat to consumers, but machine learning can help detect the fakes.
Hateful text and comments are an ever-increasing problem in online environments, yet addressing the rampant issue relies on being able to identify toxic content. A new study by the Aalto University Secure Systems research group has discovered weaknesses in many machine learning detectors currently used to recognize and keep hate speech at bay.
The properties of quantum mechanics can be utilized, for example, in technology and encrypting messages, but the disadvantage is the occasional disappearing of information. For the first time, a research group consisting of Finnish and Chinese scientists has found a way to fully control the information escaping the qubit.
New research in the INFORMS journal Operations Research has found a way to identify extremists, such as those associated with the terrorist group ISIS, by monitoring their social media accounts, and can identify them even before they post threatening content.