At the IEEE Symposium on Security and Privacy this week, researchers from MIT's Computer Science and Artificial Intelligence Laboratory are presenting a new system that uses Bitcoin's security machinery to defend against online identity theft.
Newcastle University's cyber team have found a simple new way to prevent forgery of official documents such as certificates and passports.
Since the global supply chain for additive manufacturing (AM)-- also called 3-D printing-- requires companies to share CAD files within the organization or with outside parties via email or cloud, intellectual-property thieves and malefactors have many opportunities to filch a manufacturer's design files to produce counterfeit parts. Researchers have discovered ways for manufacturers to turn the tables on thieves by deliberately embedding hidden flaws in CAD files to thwart intellectual property theft.
An international team of researchers has uncovered the mechanism that allowed Volkswagen to circumvent US and European emission tests over at least six years before the Environmental Protection Agency put the company on notice in 2015 for violating the Clean Air Act. During a year-long investigation, researchers found code that allowed a car's onboard computer to determine that the vehicle was undergoing an emissions test.
A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly used features in popular apps.
By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner.
The very design features that make Bitcoin technology appealing to its users are also weaknesses being exploited for the theft of the cryptocurrency -- new research reveals. Transparent design features are supposed to promote trust in Bitcoin. However, computer scientists at Lancaster University and Universiti Teknologi MARA (Malaysia) show that these features are presenting opportunities for fraud- undermining trust in the currency.
As cybersecurity experts scramble to stop another wave of ransomware and malware scams that have infected computers around the world, computer science experts at the University of Houston are 'phishing' for reasons why these types of attacks are so successful.
Writing in the International Journal of Collaborative Intelligence, researchers from Nigeria suggest that botnets and cyber attacks could interfere with infrastructure, healthcare, transportation, and power supply to as devastating an effect as the detonation of explosives of the firing of guns.
University of Washington researchers have conducted a new study that explores the attitudes and concerns of both parents and children who play with internet-connected toys. Through a series of in-depth interviews and observations, the researchers found that kids didn't know their toys were recording their conversations, and parents generally worried about their children's privacy when they played with the toys.