Machine learning & AI

5 ways artificial intelligence could shape our lives

Tech evangelists habitually brim with enthusiasm over artificial intelligence's potential to transform our lives, and the crowds at this year's Web Summit were no exception.

Telecom

Security gap allows eavesdropping on mobile phone calls

Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum have shown that this ...

Security

Ransomware attack before holiday leaves companies scrambling

Businesses around the world rushed Saturday to contain a ransomware attack that has paralyzed their computer networks, a situation complicated in the U.S. by offices lightly staffed at the start of the Fourth of July holiday ...

Computer Sciences

How hackers can 'poison' open-source code

Cornell Tech researchers have discovered a new type of online attack that can manipulate natural-language modeling systems and evade any known defense—with possible consequences ranging from modifying movie reviews to manipulating ...

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

page 4 from 40