Computer Sciences

Predator and prey in cyber stasis

In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking ...

Machine Learning & AI

Improving security as artificial intelligence moves to smartphones

Smartphones, security cameras, and speakers are just a few of the devices that will soon be running more artificial intelligence software to speed up image- and speech-processing tasks. A compression technique known as quantization ...

Consumer & Gadgets

Google enables use of Android phones as a physical security key

Google has announced that it has made software updates to Chrome and Android that make it possible to use an Android phone (7+) as a physical security key. In their announcement, Google once again claimed that using physical ...

Computer Sciences

Selecting the best features for phishing attack detection algorithms

In recent decades, phishing attacks have become increasingly common. These attacks allow attackers to obtain sensitive user data, such as passwords, usernames, credit card details, etc., by tricking people into disclosing ...

Computer Sciences

Are human brains vulnerable to voice morphing attacks?

A recent research study led by the University of Alabama at Birmingham's Department of Computer Science investigated the neural underpinnings of voice security, and analyzed the differences in neural activities when users ...

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Security

Defending against cyberattacks by giving attackers 'false hope'

With almost every online purchase, a person's personal information—name, date of birth and credit card number—is stored electronically often in the "cloud," which is a network of internet servers. Now, as more people ...

Computer Sciences

A new method to detect false data injection (FDI) attacks

Researchers at Beijing Institute of Technology (BIT) have recently developed a new method to detect false data injection (FDI) attacks on critical infrastructure such as power grids. Their solution, outlined in a paper presented ...

Security

How a personality trait puts you at risk for cybercrime

Impulse online shopping, downloading music and compulsive email use are all signs of a certain personality trait that make you a target for malware attacks. New research from Michigan State University examines the behaviors—both ...

Security

New attacks on graphics processors endanger user privacy

Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer's graphics processing unit, or GPU, to spy on web activity, steal passwords, and break ...

page 1 from 6

Attack

Attack may refer to:

This text uses material from Wikipedia, licensed under CC BY-SA