Consumer & Gadgets

Why computer security advice is more confusing than it should be

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would ...

Security

NIST retires SHA-1 cryptographic algorithm due to vulnerabilities

The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST). ...

Computer Sciences

Sensor imperfections are perfect for forensic camera analysis

In a project aimed at developing intelligent tools to fight child exploitation, University of Groningen computer scientists have developed a system to analyze the noise produced by individual cameras. This information can ...

Machine learning & AI

Q&A: How to make AI systems learn better

Artificial intelligence systems are smart. They can recognize patterns better than humans, for example. Yet humans are still very much needed. How can you better steer those AI systems? LIACS lecturer Jan van Rijn wrote a ...

Security

Global race to patch critical computer bug

Security experts around the world raced Friday to patch one of the worst computer vulnerabilities discovered in years, a critical flaw in open-source code widely used across industry and government in cloud services and enterprise ...

Security

Massive cyberattack grows beyond US, heightening fears

A devastating cyberattack on US government agencies has also hit targets worldwide, with the list of victims still growing, according to researchers, heightening fears over computer security and espionage.

page 1 from 2