Computer Sciences

Supercomputers can spot cyber threats

Identifying cybersecurity threats from raw internet data can be like locating a needle in a haystack. The amount of internet traffic data generated in a 48-hour period, for example, is too massive for one or even 100 laptops ...

Computer Sciences

Securing the 'internet of things' in the quantum age

MIT researchers have developed a novel cryptography circuit that can be used to protect low-power "internet of things" (IoT) devices in the coming age of quantum computing.

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

page 1 from 2