Computer Sciences

How hackers can 'poison' open-source code

Cornell Tech researchers have discovered a new type of online attack that can manipulate natural-language modeling systems and evade any known defense—with possible consequences ranging from modifying movie reviews to manipulating ...

Electronics & Semiconductors

Vulnerability found in Kindle e-reader

A team of researchers at security firm Check Point Research has discovered a vulnerability in Kindle e-readers—one that could allow hackers to take over the device, delete data and potentially gain access to Amazon account ...

page 13 from 27