Security

AI clones made from user data pose uncanny risks

Imagine, if you will, a digital doppelgänger. A clone that looks, talks and behaves just like you, created from the depths of artificial intelligence, reflecting your every mannerism with eerie precision. As thrilling as ...

Hardware

'Hot pixels' attack steals data through CPU readings

A team of security researchers at Georgia Tech, the University of Michigan and Ruhr University Bochum in Germany has reported a new form of side-channel attack that capitalizes on power and speed management methods used by ...

Security

Data dampens drug trade on the dark web

Taking down the drug trade with data. New research in the INFORMS journal Information Systems Research showcases the power of data and analytics in understanding how drug transactions on the dark web may be disrupted. The ...

Security

Can quantum computing protect AI from cyber attacks?

AI algorithms are everywhere. They underpin nearly all autonomous and robotic systems deployed in security applications. This includes facial recognition, biometrics, drones and autonomous vehicles used in combat surveillance ...

Security

Safe aid: Protecting privacy in humanitarian operations

EPFL researchers have worked with the International Committee of the Red Cross (ICRC) to develop a first of its kind, digital system to support humanitarian aid distribution. The design uses tokens to decentralize the storage ...

page 1 from 40