Security

A RADIANT future for cybersecurity

Stealth cyber-attacks against power grids, water systems and other critical infrastructure often go undetected until it is too late. Led by Dr. Irfan Khan, researchers from the Clean and Resilient Energy Systems (CARES) Laboratory ...

Hardware

Vulnerability in confidential cloud environments uncovered

Some data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now found a vulnerability ...

page 20 from 40