Computer Sciences

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

Security

Microsoft and partners toughen firmware defense

For many people who are not tech professionals, the word "firmware" first appears to them in the negative. News items over the past years have used the word over and over again to report attacks. What is firmware? If software ...

Security

Spy chip planting said to be easy to do and tough to spot

Much too easy: Planting a two-dollar spy chip on hardware with a technique that can be pulled off on a less than $200 budget? Yet that was the work of a proof in concept investigation by a security researcher and tech-watching ...

Security

Protecting smart machines from smart attacks

Machines' ability to learn by processing data gleaned from sensors underlies automated vehicles, medical devices and a host of other emerging technologies. But that learning ability leaves systems vulnerable to hackers in ...

Security

Combination of techniques could improve security for IoT devices

A multi-pronged data analysis approach that can strengthen the security of Internet of Things (IoT) devices—such as smart TVs, home video cameras and baby monitors—against current risks and threats has created by a team ...

Security

Using machine learning to hunt down cybercriminals

Hijacking IP addresses is an increasingly popular form of cyber-attack. This is done for a range of reasons, from sending spam and malware to stealing Bitcoin. It's estimated that in 2017 alone, routing incidents such as ...

Security

Linksys announces motion detection with its mesh Wi-Fi routers

Linksys, a division within Belkin International and Foxconn Interconnect Technology, has announced that it is offering a new motion detection service with its mesh Wi-Fi routers. As part of its announcement, the company said ...

page 1 from 38