Security

Using game theory to model poisoning attack scenarios

Poisoning attacks are among the greatest security threats for machine learning (ML) models. In this type of attack, an adversary tries to control a fraction of the data used to train neural networks and injects malicious ...

Security

Maestro: a new attack that orchestrates malicious flows with BGP

Researchers at the University of Tennessee have recently identified the Maestro attack, a new link flooding attack (LFA) that leverages plane traffic control engineering techniques to concentrate botnet-sourced distributed ...

Computer Sciences

Predator and prey in cyber stasis

In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking ...

Machine Learning & AI

Improving security as artificial intelligence moves to smartphones

Smartphones, security cameras, and speakers are just a few of the devices that will soon be running more artificial intelligence software to speed up image- and speech-processing tasks. A compression technique known as quantization ...

Consumer & Gadgets

Google enables use of Android phones as a physical security key

Google has announced that it has made software updates to Chrome and Android that make it possible to use an Android phone (7+) as a physical security key. In their announcement, Google once again claimed that using physical ...

Computer Sciences

Selecting the best features for phishing attack detection algorithms

In recent decades, phishing attacks have become increasingly common. These attacks allow attackers to obtain sensitive user data, such as passwords, usernames, credit card details, etc., by tricking people into disclosing ...

Computer Sciences

Are human brains vulnerable to voice morphing attacks?

A recent research study led by the University of Alabama at Birmingham's Department of Computer Science investigated the neural underpinnings of voice security, and analyzed the differences in neural activities when users ...

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Security

Defending against cyberattacks by giving attackers 'false hope'

With almost every online purchase, a person's personal information—name, date of birth and credit card number—is stored electronically often in the "cloud," which is a network of internet servers. Now, as more people ...

Computer Sciences

A new method to detect false data injection (FDI) attacks

Researchers at Beijing Institute of Technology (BIT) have recently developed a new method to detect false data injection (FDI) attacks on critical infrastructure such as power grids. Their solution, outlined in a paper presented ...

page 1 from 7

Attacker

In some sports, an attacker is a specific type of player, usually one whose role involves aggressive play. Heavy attackers are usually placed up front so they can score some points for the team.

In football, attackers are also referred to as strikers.

This text uses material from Wikipedia, licensed under CC BY-SA