Computer Sciences

Beating hackers at bug hunting

An innovative new collaboration between EPFL's HexHive Laboratory and Oracle has developed automated, far-reaching technology in the ongoing battle between IT security managers and attackers, hoping to find bugs before the ...

Computer Sciences

More efficient security for cloud-based machine learning

A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach holds promise for using cloud-based neural networks for medical-image ...

Internet

Here are the countries that have bans on TikTok

The U.S. and Canada issued orders this week banning the use of TikTok on government-issued mobile devices as privacy and cybersecurity concerns about the video-sharing app grow.

Security

The story behind that little padlock in your browser

Whenever you see a little padlock in the address bar of your internet browser, as well as when you use apps, email and messaging, you're relying on something called 'transport layer security' or TLS. It's a protocol that ...

Security

What to do if your identity was stolen in mass identity breach

News recently that a malware attack at Detroit-based Wolverine Solutions Group, which handles mailing and other services for hundreds of health care companies, potentially exposed the personal information of hundreds of thousands ...

page 11 from 26