Computer Sciences

A practical guide for analyzing manipulated audio files

The working group on Forensic Speech and Audio Analysis at the European Network of Forensic Science Institutes (ENFSI) has released a practical guide for forensic laboratories and forensic scientists involved in the analysis ...

Security

Protecting US critical infrastructure from cyberattacks

Over the past year, there has been a sharp increase in cyberattacks using malware to target the systems of critical infrastructure such as utility companies, government agencies and organizations that provide services and ...

Electronics & Semiconductors

Chemists' dye method holds promise for long-term data storage

In the digital age, every byte of data needs to go somewhere—and preferably stay there a long time. That last part is a major problem when it comes to data-storage systems, which typically last less than 20 years. A group ...

Engineering

New twist on DNA data storage lets users preview stored files

Researchers from North Carolina State University have turned a longstanding challenge in DNA data storage into a tool, using it to offer users previews of stored data files—such as thumbnail versions of image files.

Computer Sciences

Two new attacks break PDF certification

A security issue in the certification signatures of PDF documents has been discovered by researchers at Ruhr-Universität Bochum. This special form of signed PDF files can be used, for instance, to conclude contracts. Unlike ...

Electronics & Semiconductors

New approach to DNA data storage makes system more dynamic, scalable

Researchers from North Carolina State University have developed a fundamentally new approach to DNA data storage systems, giving users the ability to read or modify data files without destroying them and making the systems ...

Security

Report: Ransomware takes down online currency exchange

A week after a malicious virus infected its network, the London-based foreign currency exchange company Travelex had yet to restore digital sales and was reported infected with ransomware by hackers threatening to release ...

Internet

Smart software for smart devices

Almost everywhere one turns, one sees someone using a smartphone or other mobile, internet-connected device. Commonly, usage of such devices is not to make and receive phone calls as one might expect but the use of countless ...

page 1 from 2