Computer Sciences

Outsmarting the PIN code

A PIN code is usually required at the checkout when paying large sums by credit card. ETH researchers have now discovered a flaw in the security system of some credit cards.

Computer Sciences

Foiling illicit cryptocurrency mining with artificial intelligence

Los Alamos National Laboratory computer scientists have developed a new artificial intelligence (AI) system that may be able to identify malicious codes that hijack supercomputers to mine for cryptocurrency such as Bitcoin ...

Security

Using a smartphone and audio software to pick a physical lock

A trio of researchers has found a way to pick an ordinary physical lock using a smartphone with special software. The three, Soundarya Ramesh, Harini Ramprasad, and Jun Han, gave a talk at a workshop called HotMobile 2020 ...

Internet

Zerologon: Microsoft addressing severe network exploit

A Dutch security firm reported last week that it uncovered a severe Windows vulnerability last month that allowed hackers to take over network administrator privileges with a single click.

Software

Apple error approves MacOS malware

Oops. Apple, which recently stepped up efforts to guarantee malware is tracked and blocked before it can infect its Macs, has acknowledged the first breach of its notarization process.

page 1 from 5