Computer Sciences

New technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits ...

Security

Security tool guarantees privacy in surveillance footage

Surveillance cameras have an identity problem, fueled by an inherent tension between utility and privacy. As these powerful little devices have cropped up seemingly everywhere, the use of machine learning tools has automated ...

Consumer & Gadgets

Encrypting photos on the cloud to keep them private

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A new study from computer scientists at Columbia Engineering reveals what may be the first way to encrypt personal ...

Engineering

'PrivacyMic': For a smart speaker that doesn't eavesdrop

Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world's smart speakers. The trouble is that they're capable of hearing everything else, ...

Computer Sciences

Two new attacks break PDF certification

A security issue in the certification signatures of PDF documents has been discovered by researchers at Ruhr-Universität Bochum. This special form of signed PDF files can be used, for instance, to conclude contracts. Unlike ...

Software

Team builds first hacker-resistant cloud software system

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety and security of the data of its millions ...

Hardware

Vulnerability found in Apple's T2 security chip

Security firm IronPeak has found a vulnerability in Apple's T2 security chip. They claim in a blog post that the vulnerability allows would-be hackers to gain root access to a wide variety of Apple computers.

Security

Helping companies prioritize their cybersecurity investments

One reason that cyberattacks have continued to grow in recent years is that we never actually learn all that much about how they happen. Companies fear that reporting attacks will tarnish their public image, and even those ...

page 3 from 24