Computer Sciences

A deep learning technique to generate DNS amplification attacks

Deep learning techniques have recently proved to be highly promising for detecting cybersecurity attacks and determining their nature. Concurrently, many cybercriminals have been devising new attacks aimed at interfering ...

Consumer & Gadgets

Google/Apple's contact-tracing apps susceptible to digital attacks

Since the beginning of the COVID-19 pandemic, scientists and health authorities have relied on contact-tracing technologies to help manage the spread of the virus. Yet there's a major flaw in a framework that many of these ...

Computer Sciences

New computing architecture protects sensitive private data

As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for computing architectures. Applications that process ...

Internet

Safer web surfing with a new method for detecting malicious modes

With the ever-increasing importance of the Internet in our lives, there are growing attempts to exploit software vulnerabilities in our PCs for personal benefit. One way to do so is by infecting the victim's PC with a malicious ...

page 1 from 3