Mathematicians have opened a new chapter in the theory of moonshine, one which begins to harness the power of the pariahs -- sporadic simple groups that previously had no known application.
MSU biometric expert Anil Jain and doctoral student Joshua Engelsma have for the first time designed and created a fake finger containing multiple key properties of human skin. Commonly called a spoof, this fake finger has been used to test two of the predominant types of fingerprint readers to help determine their resilience to spoof attacks.
A new study from the US Army Research Laboratory presents evidence that the number of cyber intrusions can be predicted, particularly when analysts are already observing activities on a company or government organization's computer network.
The cyber team led by Dr. Mordechai Guri, head of research and development for BGU's Cyber Security Research Center (CSRC), shows how IR can be used to create a covert communication channel between malware installed on an internal computer network and an attacker located hundreds of yards outside or even miles away with direct line of sight. The attacker can use this channel to send commands and receive response messages.
Hospitals facing the prospect of ransomware attacks like the one that afflicted British hospitals in May can take many concrete steps to better protect themselves, but some of the most important measures -- such as a national policy not to pay ransoms -- may be tougher to formulate.
Canadian and US researchers have taken an important step towards enabling quantum networks to be cost-effective and truly secure from attack. The experiments, by the team from the University of Calgary, the California Institute of Technology and the National Institute of Standards and Technology, Colorado, prove the viability of a measurement-device-independent quantum key distribution (QKD) system, based on readily available hardware.
The security of wearable fitness trackers could be improved to better protect users' personal data, a study suggests.
The era of fully fledged quantum computers threatens to destroy internet security as we know it. Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology, the Netherlands) and Daniel J. Bernstein (University of Illinois at Chicago, USA) describe today in the journal Nature. In their publication they analyze the options available for this so-called post-quantum cryptography.
Online attackers may be able to purchase -- for as little as a few thousand dollars -- enough personal information to potentially alter voter registration information in as many as 36 states and the District of Columbia. Dubbed 'voter identity theft,' the vulnerability could be exploited by attackers to disenfranchise many voters where voter registration information can be changed online.
A technique which enables digital forensic investigators to assess an individual's internet use rather than simply focusing on traffic through Internet Protocol (IP) addresses has been developed by cyber security experts at the University of Plymouth and is outlined in a study published in the September 2017 issue of Computers & Security.