Security

Forensic system cuts IoT attack analysis time by three-quarters

A new forensic framework designed specifically for the Internet of Things (IoT) is discussed in the International Journal of Electronic Security and Digital Forensics. This deep learning-driven system offers benefits over ...

Computer Sciences

'Rosetta stone' for database inputs reveals serious security issue

The data inputs that enable modern search and recommendation systems were thought to be secure, but an algorithm developed by Cornell Tech researchers successfully teased out names, medical diagnoses and financial information ...

Security

What can technology do to stop AI-generated sexualized images?

The global outcry over the sexualization and nudification of photographs—including of children—by Grok, the chatbot developed by Elon Musk's artificial intelligence company xAI, has led to urgent discussions about how such ...

Security

What does cybersecurity look like in the quantum age?

Quantum computers promise unprecedented computing speed and power that will advance both business and science. These same qualities also make them a prime target for malicious hackers, according to Swaroop Ghosh, professor ...

page 11 from 40